👾💻⚠️
🌐
🔒🔑
🐟
❓❓❓
100

This type of malicious software requires user interaction—such as opening an infected file—to activate its code, attach itself to programs, and replicate across systems.

HINT: 🦠

What is a virus?

100

What is the most famous triad in cybersecurity (name the acronym and what it stands for).

HINT: Same name as a famous (evil???) organization.

What is CIA Triad (Confidently, integrity, and Availability)?

100

In 2024, cybersecurity experts noted that many users opted for simple, predictable passwords. Can you name one of the most commonly used passwords from that year?

  1. 123456 – Used by 3,018,050 users.
  2. 123456789 – Used by 1,625,135 users.
  3. 12345678 – Used by 884,740 users.
  4. password – Used by 692,151 users.
  5. qwerty123 – Used by 642,638 users.
  6. qwerty1 – Used by 583,630 users.
  7. 111111 – Used by 459,730 users.
  8. 12345 – Used by 395,573 users.
  9. secret – Used by 363,491 users.
  10. 123123 – Used by 351,576 users.
100

This common type of attack involves sending fraudulent message that appear to be from reputable sources, attempting to trick recipients into interacting or providing sensitive information.

HINT: 🎣

What is phishing?

100

This type of wireless network, commonly used in homes and offices, operates on the 2.4 GHz and 5 GHz frequency bands, providing internet connectivity.

HINT: 🛜

What is Wi-Fi?

200

This type of malware disguises itself as legitimate software, but once installed, it secretly tracks a user's actions and gathers sensitive data, often for malicious purposes.


What is spyware?

200

Displayed as a padlock icon in your browser’s address bar, this security protocol encrypts web traffic to ensure that data remains confidential and unaltered as it travels between your device and a website. 

What is HTTPS?

200

This type of attack uses precomputed hash values for commonly used passwords to quickly crack password hashes without having to guess every possible combination.

HINT:🌈

What is a rainbow table attack?

200

This technique relies on psychological manipulation rather than technical exploits to deceive individuals into divulging confidential information, clicking malicious links, or granting unauthorized access.

What is social engineering?

200

After a controversial comedy mocking its leadership hit theaters, this nation was blamed for a 2014 cyberattack on Sony by exposing confidential data and unreleased films

 

Who is North Korea?

300

A form of attack in which cybercriminals flood a network with traffic, overwhelming it and causing legitimate requests to be dropped, is known as this.

What is a DDoS (Distributed Denial of Service) attack?

300

This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules, often placed at the edge of a network.

What is a firewall?

300

Much like the everyday spice found on every kitchen counter, this technique is mixed into passwords to make them much tougher to crack.

What is salt or pepper hashing?

300

This type of phishing attack specifically targets high-profile individuals like executives or government officials, often using personalized and sophisticated tactics.

HINT: 🐋

What is whaling?

300

Famous for their Guy Fawkes masks and digital protests, this hacktivist collective has challenged governments and corporations alike


Who is Anonymous?

400

This sophisticated malware disguises itself as benign code, infiltrating networks through phishing and other deceptive means. It often remains dormant for extended periods, allowing attackers to stealthily exfiltrate sensitive data.



What is a Trojan Horse?

400

A type of attack where an attacker intercepts and potentially alters the communication between two parties, often by impersonating one of them, is known as this.

What is a man-in-the-middle (MITM) or person-in-the-middle attack?

400

This measure quantifies the unpredictability or randomness of a password, determining its resistance to brute-force attacks. It increases with password length, complexity, and character variety.

What is entropy?

400

This type of phishing attack involves cybercriminals creating nearly identical copies of legitimate websites to steal login credentials from unsuspecting users.

Hint: 🏋️ or 🧑‍🌾🌾

typo squatting  / credential harvester?

400

Developed by the NSA and later leaked by the Shadow Brokers, this exploit fueled notorious ransomware outbreaks like WannaCry and NotPetya.

HINT: Sounds like a really nice cologne

What is EternalBlue?

500

Developed in a covert operation reportedly involving US and Israeli intelligence, this computer worm was the first known cyber weapon, engineered to infiltrate Iranian nuclear facilities and cause physical damage by sabotaging centrifuges.

 

What is Stuxnet?

500

Name all seven layers of the OSI model

7. Application

6. Presentation

5. Session

4. Transport

3. Network

2. Data Link

1. Physical

500

First team to decrypt this Caesar cipher gets the points!

Cipher text: KRPBZ FP YXZH!

Key: ->3

What is "NUSEC is back!?

500

DOUBLE JEPORDY: Every team will create their own phishing attack and send it to nusechusky@gmail.com. The team rated with the best phishing attack will win.

YESSIR!

500

This Wi-Fi 6 technology boosts wireless performance by splitting frequencies into independently modulated subcarriers. This technique allows data to be transmitted simultaneously to and from multiple devices.

600 if you get it on the first try.

What is OFDMA (Orthogonal Frequency Division Multiple Access)?