What was the name of the main character in the movie?
What is Alan Turing
A set of rules or conventions that govern networks
What are protocols
A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory.
What is a virus or worm?
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
What is a encryption
CIA stands for
What is confidentiality, integrity, and availability
What was the name of the machine used by the Germans to hide messages they sent in plain sight?
What is a the Enigma Machine
A unique number assigned to all devices
What is IP Address
This type of malware holds a user's information hostage until you pay money
What is ransonware?
taking a secret message and reproducing the original message using an algorithm
What is a decryption
This controls traffic between networks
What is a router
What is the place that Alan Turing and his team worked in? For an extra point, what Unit were they in?
What is Bletchely Park
This protocol ensures the packets are put back together correctly
What is TCP
The name of the malware that took down an Iranian Nuclear Power Plant
What is stuxnet
A type of encryption that shifts characters a certain amount of spaces
What is a Caesar Cipher?
Software designed to block malware from entering protected networks. Screen incoming and outgoing traffic for anomalies and potential threats.
What is a firewall
In the application process to get on the code breaking team, what did the applicants have to solve?
What is a crossword puzzle?
What is Distributed Denial of Service
Using the Atbash Encryption method, xivvp would be...
What is creek?
A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
What is a patch
In real life the name of the machine created was called the BOMBE. In the movie, what was it called?
What is Christopher?
IPV6 has this many bits
What is 128
In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. It is successful because its victims innately want to trust other people and are naturally helpful.
What is social engineering?
In a Random Substitution cipher using Frequency Analysis, what are two of the most common letters to look for?
What is T, E, N, S, A
An ethical hacker
What is a white hat hacker?