Windows Security
Linux Security
Networking & Firewalls
Cyber Threats
Competition Rules
100

Where do you go in Windows to change user account permissions?

Control Panel -> User Accounts

100

What command lists all files and directories in Linux?

ls

100

What does a firewall do?

Blocks or allows network traffic based on security rules

100

What type of malware locks files and demands payment to unlock them?

Ransomware

100

How many operating systems do teams usually secure in a competition round?

Three (Windows, Linux, and sometimes Windows Server)

200

What is the default firewall in Windows?

Windows Defender Firewall

200

How do you change file permissions in Linux?

chmod

200

What is the purpose of a subnet mask?

It defines which part of an IP address is the network and which part is the host

200

What does phishing aim to steal?

Personal information (passwords, credit card info, etc.)

200

What are two common scoring categories in CyberPatriots?

Correcting security issues & answering forensics questions

300

What command is used to list all active user accounts in Windows CMD?

Net User

300

What file stores user account information in Linux?

/etc/passwd

300

What is the default port for HTTPS traffic?

Port 443

300

What does DDoS stand for?

Distributed Denial of Service

300

What does “hardening an image” mean in CyberPatriots?

Improving security by fixing vulnerabilities and misconfigurations

400

In Windows Group Policy Editor, where can you enforce password complexity rules?

Computer Configuration → Windows Settings → Security Settings → Account Policies → Password Policy

400

What command checks running processes in Linux?

ps aux

400

What protocol is used to securely transfer files over a network?

SFTP (SSH File Transfer Protocol)

400

What is an example of a brute-force attack?

Trying many password combinations until the correct one is found

400

What happens if you delete an important system file during a competition?

You may lose points or break the system

500

Name a service (there are multiple) that should typically be disabled on a competition Windows image for security.

Remote Desktop, FTP, and Telnet

500

How do you check open ports on a Linux system?

netstat -tulnp or ss -tulnp

500

What is the difference between a stateful and stateless firewall?

A stateful firewall tracks active connections, while a stateless firewall only checks packets against a set of rules.

500

What is a zero-day attack?

An attack that exploits an unknown vulnerability before a fix is available

500

In the competition, what is the purpose of the Packet Tracer Challenge?

To test networking skills, including router and switch configurations