Programming
This data type is a variable with a value of either True or False.
What is Boolean?
The word that is encrypted to UGHNZPIY when the Vigenere cipher is used with key MOON.
What is Istanbul?
A malicious program that uses a computer network to replicate.
What is Worm?
It is a virtual computer running inside a physical computer.
What is Virtual Machine?
Three pillars of personal cybersecurity
What are Data Protection, Device Security and Online Privacy?
The number of bits in 1 GB.
What is 8,000,000,000 bits?
Microsoft Windows 10, Apple Mac OS, Linux Debian are three examples of system software.
What is Operating System?
The decryption of the ciphertext GYOEOADR that was generated using the Rail Fence cipher with the zigzag \ \ \... and key = 4.
What is Good Year?
Often used as a general term that refers to a wide variety of damaging software programs.
What is Malware?
A Linux-based penetration testing platform that provides a broad array of testing tools.
What is Kali Linux?
Expand this acronym: CIA.
What is Confidentiality, Integrity, Availability?
Employees should supply this after they login to the VPN using their usernames/passwords.
What is MFA (or 2SV)?
A set of instructions which a program will follow to do: A, then B and then C.
What is Algorithm?
The word that has the second letter “y” and is encrypted to JFILY when the shift cipher is used.
What is Cyber?
A type of malicious software designed to block access to a computer system until a sum of money is paid.
What is Ransomware?
Three ways to obtain IPv4 address from a Linux operating system. (three command lines
What are ip a, IP address and ifconfig?
This is the percentage of all data breaches investigated were traced back to a carelessly-opened email with malicious links.
What is 93%?
A software layer installed on the physical hardware.
What is Hypervisor?
With this flow control structure, you can write a code that repeats a sequence until a certain condition is met which is also called a loop.
What is Iteration?
A technique that guarantees data integrity.
What is Hashing?
Attackers who lacks knowledge necessary to perform attack on their own.
What are Script Kiddies?
Used in the third step in ethical hacking.
What is Metasploit?
This is an example for people who visited pro-democracy websites in Hong Kong were infected by a malware infection (three-word vocabulary)
What is an example of Watering Hole Attack?
This is the name of the organization for which the digital computer ABNER was designed in 1951.
What is NSA?
A collection of data, usually of the same data type.
What is an Array?
The practice of hiding messages or information within other non-secret text or data, for example hiding a message in a picture of a building.
What is Steganography?
Definition of Zero Trust.
What is the strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction called?
A vulnerable application name.
What is an icecast?
Name of the United States military hacking unit.
Who is Cyber Command?
The name of the first man-portable radio encryption system that was "a heavy burden to bear".
What is KY-38 Nestor?