|
What is that server using?
|
Recon |
15 |
|
|
Don't Cry!
|
Cyber Attack |
5 |
|
|
Don't Pay the Ransom
|
General |
5 |
|
|
When was this taken?
|
Cryptography |
20 |
|
|
Contacting CERT Kiribati
|
Boot Camp |
10 |
|
|
Code Red Alert!
|
Cyber Attack |
10 |
|
|
Don't Steal My Credentials!
|
Cyber Attack |
5 |
|
|
Python Released
|
Programming |
10 |
|
|
Password is not Enough!
|
General |
10 |
|
|
A better password
|
General |
10 |
|
|
What Product is Vulnerable?
|
General |
10 |
|
|
Office Name
|
General |
10 |
|
|
What Year was it?
|
Cryptography |
10 |
|
|
Cybercrime Act
|
Boot Camp |
10 |
|
|
The 1998 Worm
|
General |
5 |
|
|
Public or Private?
|
Cryptography |
10 |
|
|
IP
|
General |
10 |
|
|
Too many passwords!
|
General |
10 |
|
|
The Boss Just Emailed!
|
Cyber Attack |
10 |
|
|
What is the Protocol
|
General |
10 |
|
|
Stop Evil and Malicious Codes
|
General |
10 |
|
|
What attack is this (2) ?
|
Cyber Attack |
10 |
|
|
What attack is this?
|
Cyber Attack |
10 |
|
|
While Loop
|
Programming |
10 |
|
|
Block That Traffic
|
General |
10 |
|
|
System Software
|
Programming |
10 |
|
|
What control should I use?
|
General |
10 |
|
|
How many bits (2)?
|
General |
10 |
|
|
How many bits?
|
General |
10 |
|
|
Python Developer
|
Programming |
10 |
|
|
While Loop
|
Programming |
10 |
|
|
If/Else
|
Programming |
10 |
|
|
Database
|
Programming |
10 |
|
|
What Operating System is on that Server?
|
Recon |
15 |
|
|
While Loop
|
Programming |
5 |
|
|
Industrial Control System Under Attack
|
General |
10 |
|
|
APNIC
|
General |
10 |
|
|
Tracking Vulnerabilities
|
General |
5 |
|
|
Cybercrime Act
|
General |
5 |
|
|
Cybersecurity
|
General |
5 |
|
|
Where is the IP located?
|
Recon |
10 |
|
|
MICT Website
|
Boot Camp |
5 |
|
|
What is the "S" for?
|
General |
5 |
|