Imitation Game
Networking Stuff
Malware, Viruses and Trojans...oh my!
Secret messages
Other stuff
100

What was the name of the main character in the movie?

What is Alan Turing

100

A set of rules or conventions that govern networks

What are protocols

100

A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory.

What is a virus or worm?

100

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

What is a encryption

100

CIA stands for

What is confidentiality, integrity, and availability

200

What was the name of the machine used by the Germans to hide messages they sent in plain sight? 

What is a the Enigma Machine

200

A unique number assigned to all devices

What is IP Address

200

This type of malware holds a user's information hostage until you pay money

What is ransonware?

200

taking a secret message and reproducing the original message using an algorithm

What is a decryption

200

This controls traffic between networks

What is a router

300

What is the place that  Alan Turing and his team worked in? For an extra point, what Unit were they in? 

What is Bletchely Park

300

This protocol ensures the packets are put back together correctly

What is TCP

300

The name of the malware that took down an Iranian Nuclear Power Plant

What is stuxnet

300

A type of encryption that shifts characters a certain amount of spaces

What is a Caesar Cipher?

300

Software designed to block malware from entering protected networks. Screen incoming and outgoing traffic for anomalies and potential threats.

What is a firewall

400

In the application process to get on the code breaking team, what did the applicants have to solve?

What is a crossword puzzle?

400

This system converts www.google.com to its IP address

What is DNS

400
The acronym DDOS stands for...

What is Distributed Denial of Service

400

Using the Atbash Encryption method, xivvp would be...

What is creek?

400

A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.

What is a patch

500

In real life the name of the machine created was called the BOMBE.   In the movie, what was it called?

What is Christopher?

500

IPV6 has this many bits

What is 128

500

In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. It is successful because its victims innately want to trust other people and are naturally helpful.

What is social engineering?

500

In a Random Substitution cipher using Frequency Analysis, what are two of the most common letters to look for? 


What is T, E, N, S, A

500

An ethical hacker

What is a white hat hacker?