Men in Black but cyber wise
Linux the youtuber that got hacked?
how many phishes are in the world?
Why isn't my internet working?
Wild, wild west
100

This principle ensures that only authorized individuals can access sensitive information.

What is Confidentiality?

100

This open-source operating system, developed as a Unix-like system, is widely used in servers, desktops, and embedded systems.

What is Linux?

100

Cybercriminals gather information from these sources to personalize phishing emails and make them more convincing.

What are social media and professional networking sites?

100

The Term Wi-Fi stands for ____.

What is Wireless Fidelity?

100

What does this line of code print out? 

x = 0 

for i in range(10):    

        x += 1 

print(x)

What is 10?

200

The acronym CIA  Triad stands for ____ , ____ , ____. 

What is Confidentiality, Integrity, and Availability. 

200

What is a command line for you to switch directories?

What is CD?

200

An employee receives a text message claiming to be from their bank, stating that there has been suspicious activity on their account and providing a link to resolve the issue. What type of phishing attack is this?

What is smishing?

200

A firewall is a security device that monitors and controls ____ traffic.

What is network?

200

This person was the first person that started writing algorithms in 1851

Who is Ada Lovelace?

300

In a hypothetical scenario, a company's website experiences a surge in traffic due to a viral marketing campaign, causing the website to slow down significantly. Despite this, the website remains accessible to users, albeit with some delays. Which aspect of the CIA Triad is most relevant in this scenario?

What is "availability"?

300

This field of study enables you to retrieve data from a Linux system hard drive after it has been deleted?

What is data forensics?

300

What is a common way to identify a phishing email?

What is the email asks for personal information

300

What is the name of the cyberattack where lots of computers are hijacked to make multiple fake requests to a company's webserver in order to crash the server?

What is DDoS attack?

300

Something you should look for when on an online check out page

What is “https”/a lock screen

400

Data tampering and unauthorized alterations compromise this principle of the CIA Triad.

What is Integrity?

400

This command-line utility, used for searching and manipulating text within files or streams, is a powerful tool for Linux users and administrators.

What is Grep?

400

Small, unknown retailers are generally most trustworthy to purchase items from over the net. True or false

 What is False?

400

If you cannot connect to the browser, but your network is functional, what is likely experiencing an issue at the moment? 

What is DNS?

400

_____ uses this three-way handshake process to establish a connection between a client and server before data transmission can occur. 

What is TCP?

500

You log in to your online grade portal and realize that in addition to your grades, you can see grades for everyone in your class.

What is confidentiality?

500

In linux, there is a command line called su and sudo what's the difference?

"sudo" allows users to execute commands with the privileges of another user, usually the root user, after providing their own password. "su" allows users to switch to another user account, including the root user, after providing the target user's password.

500

An employee receives an email from what appears to be their bank, claiming that their account has been compromised and urging them to click on a link to verify their account details. The email contains the bank's logo and uses urgent language to prompt immediate action. What type of phishing attack is this?

What is Spear phishing?

500

What layer of the OSI model is Wi-Fi?

What is Layer 1?

500

What are the names in everyone in the room? (Cannot get 1 wrong unless it's Michael's then it is fine)

Who are Jonathan,Michael,Gregory, Elvis, Howard,Pranava, Dylan, Parker, Ethan, Tessa, Jasper, Kyvan?