Programming
Cryptography
Cybersecurity Fundamentals
Ethical Hacking
Personal, Corporate & National Security
100

The name of the free computer you got today.

What is Raspberry Pi 400?

100

Another name for Caesar Cipher

What is a Shift Cipher?

100

The practice of protection of internet-connected systems such as hardware, software and data from cyberattacks.

What is Cybersecurity?

100

A virtual computer running inside a physical computer.

What is a Virtual Machine?

100

Data protection, device security, & online privacy

What are the three pillars of personal cybersecurity?

200

Name of the programming language you will be using during GenCyber camp.

What is Scratch 3?

200

The inverse of encryption.

What is Decryption?

200

An example of analogy of cybersecurity

What is home security?

200

69.89.31.226

What does IPv4 look like?

200

Download from legitimate sources & remove any apps you no longer use/need.

What are two things you can do to improve device security related to apps?

300

The name of the operating system Raspberry Pi is using.

What is Linux Debian?

300

An average number of attempts in breaking a cipher text of a message using Caesar Cipher.

What is 13 in shift cipher?

300

Something of value that is stored digitally.

What is Digital Asset?

300

The main function of this is to identify a network interface on a machine.

What is the main function of IPv4?

300

Local Physical Storage and Cloud Storage

What are the two types of backups used?

400

Identify two uses of programming.

How are Mobile Apps, Video Games, Data Analytics, Websites & Software being built?

400

Hiding a digital message in a digital picture of a cat.

What is Steganography?

400

Identify three examples of devices that store digital assets.

What are mobile phones, computers, IoT devices, cars, credit/debit card and/or WiFi routers?

400

Identify two common Hypervisors

What are VMware Server, VMware Player, VMware Workstation, Oracle VM VirtualBox, Microsoft Virtual PC, or Microsoft HyperV?

400
This is used to prevent phishing emails.

What is bookmark?

500

Identify two reasons why programming is important in Cybersecurity field.

How to read & interpret  the code to detect the weak areas for malicious activities and writing code to improve security important in Cybersecurity field?

500

A word is encrypted using Caesar Cipher as BZIQV.  The third letter of that word is 'A'.  The decrypted word is______ using a shift of _____.

What is the encryption of TRAIN in Caesar Cipher using a shift of 8?

500

Identify three examples of Digital Assets.

What are bank account, digital wallet, social media, website logins, medical information, email, text and/or apps?

500

March, 2013

When was Kali Linux officially released to the public?

500

Identify a reason to place SmartTV, game. consoles or security camera on a separate guest wifi network.

How to prevent loss of personal information with malware hit on everyday devices