Intro to Cyber
Networking
Random
Forensics
Malware
100

Name the three Cybersecurity Clubs on campus

What is Ethical Hacking, Cyber Defense, and Wicys?

100

Command to test if a machine is active on your network

What is ping?

100

The facility dog at ERAU

Who is Higbee (Shameless plug @handsome_huggable_higbee)

100

True or False: Digital forensics and data recovery refer to the same activities 

What is false?

100

A piece of software that is intended to perform unwanted
activities on a machine

What is malware?

200

Confidentiality, Integrity, Availability

What is the CIA triad?

200

Application that allows you to capture network traffic in real time

What is Wireshark?

200

A password that is limited to only numbers

What is a PIN? (Personal Identification Number)

200

Encryption technique that shifts each letter of a message by a fixed number of positions down the alphabet

What is a Caesar Cipher?

200

A covert cyber attack where the threat actor gains unauthorized access to a computer network and remains undetected for an extended period of time

What is APT (Advanced Persistent Threat)?

300

The number two in binary

What is 0011?

300

A cyberattack in which the attacker intercepts and alters data as it is transmitted between two parties

What is Man in the Middle Attack?

300

What error accounts/(causes) for the majority of data breaches?

What is human error?

300

Police in the U.S. must use procedures that adhere to which amendment?

What is the fourth amendment?

300

an environment should always be used when performing dynamic analysis to
prevent the malware from spreading to undesired locations

What is a sandbox?

400

A security professional who uses their skills to find weaknesses in systems to protect them from digital threats.

What is a White Hat Hacker?

400

The default port for HTTP

What is Port 80?

400

A type of identity-based data whose examples include fingerprints, DNA, and handwritten text?

What is Biometric data?

400

Technique that recover lost data from broken hard drives, crashed servers, and other compromised devices 

What is Data Recovery?

400

What is the function call in assembly code when there's a conditional jump if something is not equal to zero?

What is jnz?
500

Application-Presentation-Session-Transport-Network-Data Link-Physical

What is the OSI Model?

500

The loopback IP address

What is 127.0.0.1?

500

Dr. Sampigethaya's first name

Who is Radhakrishna?

500

A common software reverse engineering tool created by the NSA

What is Ghidra?

500

a small amount of data storage available to the CPU, whose contents can be accessed more quickly than storage available elsewhere

What is a register?