First Concerts
Cyber Sip & Solve
Hacker's Hangover
Brewed Bugs
Pixars Pixelated Puzzlers
200

This persons first concert was T-Pain in 2022

Who is Comfort

200

This type of malware encrypts files on a victim's computer, demanding payment to restore access.

What is Ransomware?

200

This notorious hacker group was known for its cyberattacks on Sony Pictures Entertainment in 2014.

Who are the Guardians of Peace?

200

This type of software testing involves intentionally crashing or breaking software to find bugs, often likened to the chaotic process of brewing a strong ale.

What is Fuzz Testing?

200

 In which Pixar movie does the first dialogue between characters not occur until 22 minutes into the film?

What is "WALL-E"?

600

This persons first concert was "The Outfield" in 1990

Who is Dan

600

 In cybersecurity, what term describes the practice of hiding data within another medium, like an image or audio file?

What is Steganography?

600

Known as "The Dark Overlord," this group gained infamy for hacking and leaking sensitive data, often demanding ransom.

Who are The Dark Overlord? - Don't blame me. Grok did it

600

 A software development approach where new features are added to existing code, potentially introducing bugs, much like adding hops to a beer recipe.

What is Feature Creep?

600

What is the name of the main villain in "The Incredibles" who goes by the alias Syndrome?

Who is Buddy Pine?

900

This persons first concert was Dave Matthews Band in 2000

Who is James

900

This cybersecurity principle suggests that you should never trust data from an untrusted source without validating it.

What is Input Validation?

900

This type of hacking involves exploiting vulnerabilities in a system to gain unauthorized access, often for financial gain or espionage.

What is Black Hat Hacking?

900

This term describes a situation where a system or software fails to handle unexpected inputs, much like a bad batch of brew.

What is a Buffer Overflow?

900

Which Pixar film was the first to be produced entirely under Disney's supervision after the acquisition of Pixar?

What is "Cars 2"?

1200

This persons first concert was Hinder in 2007

Who is Andrew

1200

A common exploit in web applications where an attacker injects malicious scripts into web pages viewed by other users, often via comment fields.

What is Cross-Site Scripting (XSS)?

1200

This hacker, known as "The Mentor," wrote the "Hacker Manifesto" in 1986, which became a foundational text for the hacker community.

Who is Loyd Blankenship?

1200

 In software development, what term describes a piece of code that's no longer used but remains in the system, like an old brewing recipe?

What is Dead Code?

1200

In "Finding Nemo," where is the dentist's office where Nemo is kept?

What is P. Sherman 42 Wallaby Way, Sydney?

1500

This person has never been to a concert willingly or for music they enjoy, but has gone to some

Who is Luke

1500

This type of attack, often seen in coffee shops, involves setting up a rogue Wi-Fi network to intercept data from unsuspecting users.

 What is an Evil Twin Attack?

1500

 This term refers to a type of cyberattack where attackers attempt to disrupt the normal traffic of a targeted server by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

What is a DDoS (Distributed Denial of Service) attack?

1500

This methodology in software testing involves testing the software in an environment that mimics real-world conditions, akin to tasting a beer in its intended setting.

What is User Acceptance Testing (UAT)?

1500

What is the name of the main character in "Up"?

Who is Carl Fredricksen?