Cybersecurity trivia

Cybersecurity Mini Quiz

Test your knowledge with these top questions!

Question 1

Experts recommend using an authenticator app for 2FA instead of SMS codes, because texts can be vulnerable to which type of cyberattack?

SIM swapping allows attackers to hijack your phone number by convincing your mobile carrier to transfer it to a new SIM card, potentially giving them access to your SMS-based 2FA codes.

Question 2

Which encryption technique offers perfect secrecy when using a truly random key as long as the message, used only once?

The one-time pad, invented by Gilbert Vernam in 1917, achieves perfect secrecy because the truly random key masks the plaintext such that every possible message is equally likely given the ciphertext.

Question 3

Named after its creators Rivest, Shamir, and Adleman, which algorithm secures much of the internet through public-key encryption?

RSA, invented in 1977, secures internet communications by using a public key for encryption and a private key for decryption, relying on the difficulty of factoring large semiprime numbers.

Question 4

What is the main purpose of the electronic badges distributed at DEF CON?

DEF CON electronic badges often feature interactive elements, such as hidden games or cryptographic puzzles, encouraging attendees to collaborate and solve them during the conference.

Question 5

Which Nazi German cipher device, cracked by Allied codebreakers including Alan Turing, used rotating wheels to encrypt messages?

The Enigma machine featured three or four rotating rotors that altered the electrical path for each letter, producing over 150 million possible daily settings to challenge codebreakers.

Question 6

Ancient Spartans used which device, a baton around which a strip of parchment was wrapped, to encode secret messages?

The scytale was an ancient Spartan encryption tool where a message was written on a parchment strip wrapped around a baton; unwrapping it jumbled the text, decipherable only with a matching-diameter baton.

Question 7

VPNs use protocols like OpenVPN and WireGuard. What is the primary role of these protocols in a VPN connection?

OpenVPN and WireGuard use advanced cryptographic techniques to ensure that data transmitted over a VPN cannot be easily intercepted or read by unauthorized parties.

Question 8

Julius Caesar used which simple encryption method that shifts each letter in the alphabet by a set number of places?

The Caesar cipher, a substitution method, shifts each letter by a fixed number—typically three positions—so "A" becomes "D" and "Z" becomes "C".