Cybersecurity
Networking Concepts
OS
Web
Security Protocols
100

What does VPN stand for?

Virtual Private Network

100

What does "IP" in "IP Address" stand for?

Internet Protocol

100

This temporary storage computer component has seen a recent surge in pricing because of its use in AI. What is it?

RAM

100

What does HTML stand for?

HyperText Markup Language

100

What does HTTPS stand for?

HyperText Transfer Protocol Secure

200

What are the three hats of hackers?

Black, Gray, White

200

What does DHCP stand for?

Dynamic Host Configuration Protocol

200

Linus Torvalds developed this Operating System

Linux

200

This acronym provides styling information to HTML websites. What is the full name of this technology?

Cascading Style Sheets

200

What are the two types of encryption algorithms?

Symmetric and Asymmetric

300

Although having nothing to do with cats, what kind of hacker exclusively runs premade programs to attack?

Script Kiddie

300

What does DNS stand for and what is its function?

Domain Name System; it translates domain names to IP addresses

300

What is the equivalent of the root user in Windows operating systems?

Administrator

300

Often called "reverse APIs", these commonly created integrations allow service providers to notify customers when events happen in their system.

Webhooks

300

What is the dynamic successor protocol to POP3?

IMAP

400

Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking what sweet-sounding decoy computer system that's purposely made to attract attackers to gain insight into how to decrease cybersecurity threats?

Honeypot

400

What is a subnet mask used for?

To divide an IP network into smaller, manageable sub networks.

400

What is the name of the first computer developed by Apple in the early 80s, named after Steve Job's daughter?

Lisa

400

What programming language, commonly used to build enterprise web servers, is named after an Indonesian coffee?

Java

400

End to End encryption can be broken down into two subfields:

1. Encryption at _____

2. Encryption in _____

What are they?

1. Rest

2. Transit

500

What are the three factors of authentication?

Something you know, something you have, something you are.

500

What are levels 3 and 4 of the OSI model?

Network and transport layers

500

What does sudo stand for, as in "> sudo echo $whoami"

Superuser do

500

As of 2019, this web company held the record for the largest known data-breach. What is it?

Yahoo

500

What is PGP and what does it stand for?

Pretty Good Privacy, it is an encryption program.