Cybersecurity Tools
Ethics
Random Cybersecurity
Well Known Hacks
Cybersecurity Acronyms
100

Which command line tool did you use earlier this week to conduct traffic analysis?

tshark
100

How long do images, posts, or any other content that you upload onto the internet last?

Forever

100

The gaining of remote access to a shell or terminal as the administrator on that host is called?

Infiltration

100

This very sophisticated hack was deployed in 2010. It was able to determine its exact location and environment, to then destroyed a sizeable number of Iran's nuclear centrifuges.

Stuxnet

100

What does TCP stand for?


Transmission Control Protocol


200

This popular and powerful program can be used to probe systematic vulnerabilities on networks and servers. It also includes a large and extensible database of automated exploits that can be used once the first step of the kill chain has been concluded.

Metasploit Framework

200

This philosophic study pertains to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.

Cyberethics 

200

Recovering deleted files, webpages, chat logs, and emails are all examples of 

Computer Forensic Capabilities

200

What is the most notorious Ransomware exploit?

CryptoLocker

200

2FA stands for this

2 Factor Authentication

300

This filter:

"tcp.port eq 25 or icmp"

 will do what?

Show only SMTP (port 25) and ICMP traffic

300

The threatening, lying, spreading rumors, gossiping, creating hate groups or fake profiles are different types of examples of?


Cyberbullying


300

This delivery system is used for the payload


Exploit


300

Which type of Cyberattack did Netflix Launch Against Itself to Help Save the Internet

DDoS or Distributed Denial of Service

300

The network security technology originally built for detecting vulnerability exploits against a target application or computer extended by adding the ability to block threats in addition to detecting them is this

IDS/IPS (Intrusion Detection Systems/Intrusion Protection Systems)

400

This popular and powerful program can be used to probe systematic vulnerabilities on networks and servers. It also includes a large and extensible database of automated exploits that can be used once the first step of the kill chain has been concluded.


Metasploit Framework


400

This philosophic study pertains to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.


Cyberethics 


400

Recovering deleted files, webpages, chat logs, and emails are all examples of 


Computer Forensic Capabilities


400

This malware program  includes a back door for administrative control over the target computer by distributing Remote Access Trojans is what? 

RAT (Remote Access Trojan)

400

This acronym was introduced on day for of the camp:

 msf 

What does it stand for?

Metasploit Framework

500

These 3 password cracking tools were introduced on day 3. 


JtR, Cain and Abel, and AirCrack-NG


500

The set of social conventions that facilitate interaction over networks, ranging from mailing lists to blogs and forums.

Netiquette

500

This command-line firewall utility  uses policy chains to allow or block traffic. When a connection tries to establish itself on your system, the utility looks for a rule in its list to match it to. If it doesn’t find one, it resorts to the default action.

iptables

500

This worm infects Windows computers by encrypting files on the PC's hard drive, making them impossible for users to access, then demands a ransom payment in bitcoin in order to decrypt them

WannaCry

500

The acronym AES stands for this?

Advanced Encryption Standard