Get to know your counselor!
The little Zumi that could
Command line trivia
Acronym adventure
Cyber Grab Bag 1
Cyber Grab Bag 2
100

This counselor has a tetris addiction

Melvin

100
You can program Zumi using this coding language

Python

100

This command allows you to navigate through the linux file system

Change directory (cd)

100

LAN stands for this

Local Area Network

100

A firewall can be both _______ and ________ or a combination of the two

Software and Hardware

100

This phase of penetration testing is when you get approval to access a device or system

Permission

200

This counselor has two dogs

Caitlyn

200

The drive mode icon allows you to freely control Zumi, this mode allowed us to run the Jupyter lessons

Learn mode

200

This command allows you to list the files in a directory

List (ls)

200

TCP stands for

Transmission Control Protocol

200
Stealing people's information over a phone call is known as this

Vishing

200

The act of psychological manipulation of people is known as

Social engineering

300

This counselor majored in music

Louis

300

This major component of Zumi is also a delicious dessert

Raspberry Pi

300

This file with user account information shows you the password hashes

/etc/shadow

300

This service runs on TCP port 80

HTTP (Hyper Text Transfer Protocol)

300

These pfSense parameters control the flow of traffic

Accept, Drop, and Reject

300

Black and Grey Hat hackers start at this phase of penetration testing

Information Gathering

400

This counselor likes to learn about different cultures and engage in activities from them

Jykeim

400

When launching the Jupyter notebook and preparing to code Zumi, you must do this first before you begin

Import libraries

400

"chmod 765"

Explain this octal file permission set

Owner has all the permissions,

Group has the permissions to read and write,

Everyone else has the rights to read and execute

400

When using the ping command, these kinds of packets appear in Wireshark

ICMP (Internet Control Message Protocol)

400

What command do you use to change the intro image in Metasploit

banner

400

This type of shell connection used for exploiting involves having the target machine communicate with the attacker machine

Reverse shell

500

This counselor transferred into ODU from Thomas Nelson Community College

Patrick

500

These teachers are Zumi masters! Name one of the two teachers who demonstrated Zumi for the camp

Dr. Jiang and/or Mr. McDonald

500

This firewall utility uses policy chains to allow or block traffic

Iptables

500

EAPOL stands for this

Extensible Authentication Protocol (over LAN)

(Four Way Handshake)

500

List all six of the GenCyber concepts

Confidentiality, Integrity, Availability, Think like an adversary, Defense in Depth, and Keep it Simple

500

Name the three policy chains that Iptables uses

Input, forward, and output