Cybersecurity from the get go
Looking through windows
What our grandparents get wrong
Hack the screen
Phish and Chips
100

This acronym stands for the process of verifying a user’s identity, often via passwords, biometrics, or tokens.

What is authentication?

100

Where did the server come from

Engineering lab/ robotics lab

100

Honey my wifi isn't working 

Let’s check if it’s just your device or the whole house. Try turning the Wi-Fi off and on again on your phone or computer. If that doesn’t work, we might need to unplug your router for 30 seconds and plug it back in.

100

This 2015 TV series follows a hacker named Elliot as he battles corrupt corporations and his own mind.

What is Mr. Robot?

100

This is the number of layers in the OSI model.

7

200

This type of software acts like a digital guard dog, monitoring network traffic for suspicious activity.

What is an Intrusion Detection System (IDS)?

200

What was the first drawing done on the far window done by Alexis 

Bee hive with bees for the honey pot

200

The face e book isn't working, I need to see what my grandkids are doing

- help them through the sign in process

- redownload the app/ update

- needs to be re-added to the homescreen

200

What was that bee movie we watched called?

The Beekeeper

200

This kind of phishing targets a specific high-value individual, often using detailed personal information.

Spear is personal information and whaling is targeting a CEO

300

This cybersecurity concept means regularly testing your defenses by simulating attacks.

What is penetration testing (pen testing)?

300

What are the cyber professors names? 

Aaron Rodriguez, Adam Zeiner, Dr. Becote, Sarah Bunce, Dan Wilkins 


If you say Aaron Jones you lose 5 points

300

This prince in Egypt needs moneys and asked me to send him money through a link, can you help me with this please 

Answer- just no

They aren't real 

Explain why clicking on random links is unsafe and are usually (most of the time) scams 

300

Who is Edward Snowden and why did he move?

He is a former CIA/NSA hacker who got kicked out of the US and moved to Russia since he stole secret documents (based off a true story)

300

When your computer starts moving slower than a turtle on a treadmill, it might be infected with this “slow and steady” malware.

This can be any malware that affects the computers resources. plus trojan horse is just the dilivery method

400

This security measure encrypts your web traffic, shown by “https://” and a padlock in your browser’s address bar. 

What is SSL/TLS encryption?

400

What is the misspelled word on the its all about cyber window

OSINT (OSNIT)
400

I can't hear you! Speak up please!

Let’s make sure the volume is turned up and not muted. I’ll also check if the speakers or headphones are plugged in properly.

400

What is the bestest estest estestsssssss scooby doo movie of all time that was released in 2001 that shocased Phantom Virus

Scooby-Doo and the Cyber Chase

400

This sneaky method hides malicious code inside an innocent-looking file—kind of like the Trojan horse, but geekier.

What is steganography?

500

This class of attacks abuses weaknesses in the way TLS certificates are validated, allowing attackers to impersonate legitimate websites by exploiting flaws like improper hostname verification or trusted CA compromises.

What is a TLS/SSL Man-in-the-Middle (MITM) Attack?

500

List the MITRE ATT&CK® Framework  

  • Reconnaissance

  • Resource Development

  • Initial Access

  • Execution

  • Persistence

  • Privilege Escalation

  • Defense Evasion

  • Credential Access

  • Discovery

  • Lateral Movement

  • Collection

  • Command and Control (C2)

  • Exfiltration

  • Impact

500

Hey yo kiddo, if my computer says it's using Wi-Fi, does that mean it's safe? 

Not necessarily. Just because you're connected to Wi-Fi doesn't mean the network is secure. If you're on a public or unencrypted Wi-Fi (like in a coffee shop or airport), your data could be intercepted by attackers. For safety, always use password-protected networks and consider using a VPN to encrypt your traffic.

500

In the book 'The Girl with the Dragon Tattoo (2005), what was Lisbeth Salander's profession?

She was a skilled hacker, The novel touches on themes of hacking, surveillance, and cybercrime. 

500

This phishing method doesn’t use email at all—instead, attackers create fake websites or login portals to trick users into entering credentials.

What is pharming or spoofed websites?