Databases
Binary/Hex/Dec
Hashing
Social Engineering
Web Development
100

What does DBMS stand for?

Database Management System 

100

What is the Decimal representation of binary number 101?

5

100

Which algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash?

SHA-256

100

It is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. What is it?

Phishing

100

What does DNS stand for?

Domain Name Servers

200

Which command lists the total occurrences of data in a column?

Count

200

What is the Decimal value of FF (hex)?

255

200

Which Hashing method continues to be widely used, in spite of its well-documented weaknesses and deprecation by security experts?

MD5

200

It is the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. What is it?

Spearphishing

200

what does the <h1> </h1> tag do?

Defines an HTML heading 

300

what contains a lot of tables put together for data storage and access?

A Database

300

what is the Binary representation of decimal number 38?

100110

300

How many bits is a MD5 hash?

128 bits

300

It is an attack that often involves using a faked phone number to create a sense of trust...what is it?

Spoofing

300

What does http stand for?

Hypertext Transfer Protocol

400

What is a wildcard character?

 Substitute any other character(s) in a string.

400

What is 00010011 00110111 in hex?

1337

400

What is the MD in hashing stands for?

Message digest

400

What are the three basic types of tactics used to gather information?

Phone, In-Person, Digital

400

He invented the World Wide Web. Who is he?

Tim Berners-Lee

500

What does the asterisk (*) do in SQL?

Selects all fields of the table or result set.

500

what is 42 (decimal) in hex?

2a

500

Difference between Encryption and hashing?

Encryption is reversible, hashing is one-way

500

What are the four steps in the Social Engineering Cycle? 

Information Gathering, Developing Relationship, Exploitation, Execution

500

What is the difference between a Static Web page and a Dynamic Web page?

Static Web pages are those with content that cannot change without a developer editing its source code, while dynamic Web pages can display different content from the same source code.