A set of steps that defines how a task is performed
What is an algorithm?
Name of New Mexico town which was the setting for 2024 Best Picture of the Year?
What is Los Alamos, NM?
Name of tool to analyze network packet traffic
Name of our event/exercise this week
What is TracerFire(11)?
The decimal value of 2 represented in binary
What is 10?
A representation of an algorithm
What is a program?
The first digit of a DISCOVER credit card
What is 6?
Type of attack described yesterday when a disk is encrypted and "held hostage"
What is "ransomware"?
Name the type of event we are doing this week
What is CTF (or Capture the Flag)?
Name of notation used to represent binary bit combinations in a compressed/condensed format
Common name for malicious code
Name of the famous mathematical sequence that starts off as 1, 1, 2, 3, 5, 8
What is the Fibonacci sequence?
Two tool names presented as helping with disk forensics
Name of the attacked organization in this week's exercise
What is Orcko Water Authority?
The answer to: "1 xor 0"
What is 1?
Name of an operating system often used by cybersecurity folks and is available as open source
What is Linux (or *NIX)?
Name a phase of software development OTHER than "code"
What is "design" "requirements" "maintenance" or "test"?
The color of "hat" that a "good/ethical" hacker "wears"
What is white?
Name of Matthew's team at Sandia
What is Honey Badger?
Minimum required number of bits to represent decimal (base 10) value of 32
What is 6?
The three areas to which cybersecurity folks abbreviate as CIA
What are Confidentiality, Integrity, and Availability?
Starting index in the C programming language
What is 0?
The name of the famous hacking/cybersecurity conference traditionally held in Las Vegas, Nevada in August
What is DEFCON?
What is "swift seizer"?
The max decimal value that can be represented with 6 binary bits
What is 63?