Physical Security
Networking
Cryptography
OSINT
100

What is the practice of unlocking a lock by manipulating the components of the lock device without the original key?

Lock Picking

100

What is a computer that is portable and suitable for use while traveling?

Laptop

100

Decipher (kvvy) using ceaser cipher and a shift of 7

door

100

What is the trail of data you leave when using the internet.

Digital footprint


200

what is a cyber security risk that originates from within an organization?

Insider threat

200

Which cable is used to provide internet connection?

Ethernet cable

200

Decipher this 

(olssv)

using ceasar cipher

hello

200

Which website allows people to visit archived versions of Web sites.

the wayback machine

300

The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

Social Engineering

300
What does RAM stand for 

Random Access memory

300

Decipher this binary

011101110110100101101110

win

300

What does OSINT stand for?

Open-source intelligence

400

What are the 5 levels of physical security?

Minimum.

Low-level.

Medium.

High-level.

Maximum.

400

Which port number does the protocol DHCP use?

67/68

400

Which group has posted several cryptographic challenges in order to recruit ?

Cicada 3301

400

How many star reviews does the university of Leeds have?

4.4 stars

500

Give 10 examples of physical security measures

Security guard, fences, walls, locks, CCTV, biometric scanners, Alarm systems, ID cards, good lighting

500

What are the seven layers of the OSI model

#1. The Physical Layer.

#2. The Data Link Layer.

#3. The Network Layer.

#4. The Transport Layer.

#5. The Session Layer.

#6. The Presentation Layer.

#7. The Application Layer.

500

Decipher

4C4A41486A66696C79

ECTAcyber

500

What is the name of the theater at Leeds university (hint: it is near the old bar and waki maki)

Riley Smith Theatre