Partly Cloudy With A Chance of Services
Don't Forget The Cyber of I.T.
Don't get locked out! Key Encryption
Come On You Should Know This
Command That's Familiar!
100

A Hybrid Cloud is a mix of these two types of clouds.

What is a mix of Public and Private clouds

100

This type of attack requires a carrier file to self-replicate

What is a virus 

100
It uses asymmetric key encryption

What is PGP (Pretty good privacy)

100

Cain and Abel

John the Ripper 

Hashcat are examples of this kind of tool

What are password cracking software

100

The Caesar (ROT) cipher, shifts each letter to the left this many characters.

What is 8

200

IaaS Stands for this.

What is

(Infrastructure As A Service)

200

It is the strongest wireless signal encryption

What is WPA

200

A private signing key and a public verification key are pare of this.

What is Asymmetric key encryption

200

Daily Double

An event signaling an IDS to produce an alarm with no attack has taken place is classified as this

What is a false positive.

200

The following command 

steghide extract -sf mary-lamb.jpg

What is decrypt the hidden messages stored inside the image mary-lamp.jpg

300

SaaS Stands for this in cloud computing

What is (Software As A Service)?

300

Continually bombarding a targeted network with fake requests is this

What is a DoS attack

300

Daily Double 

For the WPA2 security standard, you should use 802.11(this letter)

What is 802.11i

300

Data Diddling, involves this to data before it is processed by the computer.

What is alter it.

300

The command 

nslookup -type=mx starwars.com should return this type of MX values

What are "Preference =" values

400

PaaS  Stands for

What is

(Platform As A Service)?

400

Daily Double

You need this to set up a wireless access point

What is SSID

400

Of the following this is NOT a type of virus:

Tunneling

Boot Sector

Macro

Wrapper

What is Wrapper

400

Ephemeral Data is 

Data that is lost after disconnection or power down like RAM

400

It's the difference between these two commands:

echo "mclake234AOIjlwe;aoiealtna;lbvoinenser" > hash.txt

echo "mclake234AOIjlwe;aoiealtna;lbvoinenser" >> hash.txt

What is one creates the file if it does not already exist and overwrites the value

The other appends to the file if it exists

500

The key to cloud computing is delivery of services in this fashion.

What is On-Demand

500

Someone posing as an IT tech request information about your computer configuration.

What is Social Engineering. A phishing attach with human interaction

500

The two different types of network layer firewalls are this

What are stateful and stateless

500

Key Loggers are a types of this, beware 007!

What is Spyware

500

Daily Double!

Logging PowersShell execution and scripts is fundamental to Windows system administration and security. This is because.

What is; PowerShell, is most frequently used as a tool by attackers for gaining information and access to Windows enterprise environments

600

In this type of cloud, compute resources are a reserve for a single company or business. Here, the infrastructure is hosted and maintained on a company’s data center. The organization has total control over the hardware and services it provides. 

Daily Double

What is Private Cloud

600

Aside from "host" it is the other type of intrusion prevention system

What is Network

600

It's the password hashing algorithm 

What is MD4

600

Sections 66f of this Act, deals with Cyber terrorism

What is the IT Act

600

It is the difference between these two commands

cd .\home\SamCook

cd /home/SamCook

What is the top one is changing directories in a Windows environment while the later is changing directories in a Linux / Unix environment