What does VPN stand for?
Virtual Private Network
What does "IP" in "IP Address" stand for?
Internet Protocol
This temporary storage computer component has seen a recent surge in pricing because of its use in AI. What is it?
RAM
What does HTML stand for?
HyperText Markup Language
What does HTTPS stand for?
HyperText Transfer Protocol Secure
What are the three hats of hackers?
Black, Gray, White
What does DHCP stand for?
Dynamic Host Configuration Protocol
Linus Torvalds developed this Operating System
Linux
This acronym provides styling information to HTML websites. What is the full name of this technology?
Cascading Style Sheets
What are the two types of encryption algorithms?
Symmetric and Asymmetric
Although having nothing to do with cats, what kind of hacker exclusively runs premade programs to attack?
Script Kiddie
What does DNS stand for and what is its function?
Domain Name System; it translates domain names to IP addresses
What is the equivalent of the root user in Windows operating systems?
Administrator
Often called "reverse APIs", these commonly created integrations allow service providers to notify customers when events happen in their system.
Webhooks
What is the dynamic successor protocol to POP3?
IMAP
Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking what sweet-sounding decoy computer system that's purposely made to attract attackers to gain insight into how to decrease cybersecurity threats?
Honeypot
What is a subnet mask used for?
To divide an IP network into smaller, manageable sub networks.
What is the name of the first computer developed by Apple in the early 80s, named after Steve Job's daughter?
Lisa
What programming language, commonly used to build enterprise web servers, is named after an Indonesian coffee?
Java
End to End encryption can be broken down into two subfields:
1. Encryption at _____
2. Encryption in _____
What are they?
1. Rest
2. Transit
What are the three factors of authentication?
Something you know, something you have, something you are.
What are levels 3 and 4 of the OSI model?
Network and transport layers
What does sudo stand for, as in "> sudo echo $whoami"
Superuser do
As of 2019, this web company held the record for the largest known data-breach. What is it?
Yahoo
What is PGP and what does it stand for?
Pretty Good Privacy, it is an encryption program.