1
Programming
2
Cryptography
3
Cybersecurity Fundamentals
4
Ethical Hacking
5
Personal, Corporate & National Security
6
Random
100

This data type is a variable with a value of either True or False. 

What is Boolean?

100

The word that is encrypted to UGHNZPIY when the Vigenere cipher is used with key MOON. 

What is Istanbul?

100

A malicious program that uses a computer network to replicate.

What is Worm?

100

It is a virtual computer running inside a physical computer. 

What is Virtual Machine?

100

Three pillars of personal cybersecurity 

What are Data Protection, Device Security and Online Privacy?

100

The number of bits in 1 GB

What is 8,000,000,000 bits?

200

Microsoft Windows 10, Apple Mac OS, Linux Debian are three examples of system software. 

What is Operating System?

200

The decryption of the ciphertext GYOEOADR that was generated using the Rail Fence cipher with the zigzag \ \ \... and key = 4. 

What is Good Year?

200

Often used as a general term that refers to a wide variety of damaging software programs.

What is Malware?

200

A Linux-based penetration testing platform that provides a broad array of testing tools. 

What is Kali Linux?

200

Expand this acronym: CIA.

What is Confidentiality, Integrity, Availability

200

Employees should supply this after they login to the VPN using their usernames/passwords.

What is MFA (or  2SV)?

300

A set of instructions which a program will follow to do:  A, then B and then C. 

What is Algorithm?

300

The word that has the second letter “y”  and is encrypted to JFILY when the shift cipher is used.

What is Cyber?

300

A type of malicious software designed to block access to a computer system until a sum of money is paid. 

What is Ransomware?

300

Three ways to obtain IPv4 address from a Linux operating system. (three command lines

What are ip a, IP address and ifconfig?

300

This is the percentage of all data breaches investigated were traced back to a carelessly-opened email with malicious links. 

What is 93%?

300

A software layer installed on the physical hardware. 

What is Hypervisor?

400

With this flow control structure, you can write a code that repeats a sequence until a certain condition is met which is also called a loop. 

What is Iteration?

400

A technique that guarantees data integrity. 

What is Hashing?

400

Attackers who lacks knowledge necessary to perform attack on their own. 

What are Script Kiddies?

400

Used in the third step in ethical hacking. 

What is Metasploit?

400

This is an example for people who visited pro-democracy websites in Hong Kong were infected by a malware infection  (three-word vocabulary)

What is an example of Watering Hole Attack?

400

This is the name of the organization for which  the digital computer ABNER was designed in 1951.

What is NSA?

500

A collection of data, usually of the same data type.

What is an Array?

500

The practice of hiding messages or information within other non-secret text or data,  for example hiding a message in  a picture of a building.

What is Steganography?

500

Definition of Zero Trust

What is the strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction called?

500

 A vulnerable application name.

What is an icecast?

500

Name of the United States military hacking unit. 

Who is Cyber Command? 

500

The name of the first man-portable radio encryption system that was "a heavy burden to bear".

What is KY-38 Nestor?