GOVERNOR’S HIGH SCHOOL CYBER CHALLENGE

Michigan Cyber Range

All Schools in Michigan Are Invited to Participate
Teams, each comprised of three high school students, are invited to participate in a round of challenges designed to test their knowledge of computer science and information technology.

The only requirement is an interest in cyber security and a familiarity with computers. This is a great cyber security learning opportunity for all high school students in Michigan.



KEY DATES
ROUND ZERO
Online
March-August
1st Day of Each Month


ROUND ONE
Online
October 2-5, 2017


ROUND TWO
On-site
ROUND ZERO
On the first day of the month, March through August, we will be releasing 10 questions. (See below.) Get together as a group or work individually to answer the questions. Check back next month to find out if you were right. No scores are tabulated, theses challenges are non-qualifying, just a great way to get students talking about cyber security and practicing for Round One.


ROUND ONE
The first round will be completely held online and will be scored by staff of the Michigan Cyber Range. The challenges will be released Mon.-Thurs. during October 2-5, 2017. Students have between 1:00pm-6:00pm ET each day to answer the 20 multiple choice questions. In the case of a tie, completion times will be considered.

The daily challenges will focus on networks, programming, operating systems and hacking. Round One is an open book style in which students are encouraged to scour the internet to solve the challenges. The top ten teams will be selected to advance to Round Two. Winning teams will be announced on October 6, 2017. Check back in the spring for Round One registration. Teams must be comprised of three students and one coach.


ROUND TWO
Efforts expended by the students in Round One will prepare the them for Round Two. The second round will take place at the North American International Cyber Summit (NAICS) at Cobo Center in Detroit, October 30, 2017. Travel and accommodation funds are available for teams traveling from outside the area.

During Round Two, teams will compete in a virtual Capture the Flag exercise designed to test their skills with an intensive, timed series of cybersecurity-focused challenges. Round 2 is an exercise in gamified learning. The focus will be hacking the virtual city of Alphaville. In this round, the students will be able to interact with each other and compare each others progress on a public scoreboard. In the event of a tie, the Michigan Cyber Range will measure team strategy to determine the winner.

The top three teams from Round Two will receive special awards from Governor Snyder, or his designee, during the NAICS.



ROUND ZERO CHALLENGES

DOWNLOAD PDF VERSION

1.) Software that allows the operating system to talk to the computer hardware is called a:
a.) IO file
b.) certificate
c.) interface
d.) driver
2.) In Windows, the operating system stores its files in a database known as what?
a.) Hive
b.) Oracle
c.) Registry
d.) Register
3.) At the command line, what is the command to list the contents of a directory in Windows?
a.) ls
b.) cd
c.) grep
d.) dir
4.) What operator do you use to redirect the output of a command to a file?
a.) >
b.) |
c.) &
d.) @
5.) What user account has the highest level of access in Linux?
a.) Admin
b.) System
c.) MCP
d.) root
6.) In Linux, which command line tool would you use to search through the contents of a file?
a.) cat
b.) grep
c.) ifconfig
d.) Regex
7.) What operator do you put after a command in Linux to have it run in the background?
a.) >
b.) |
c.) &
d.) @
8.) The program that makes up the core of an operating system is called the:
a.) root
b.) core
c.) CPU
d.) Kernel
9.) There is a four letter abbreviation (NTFS) for the type of file system used by Windows. What does the abbreviation stand for?
a.) New Technology File System
b.) Network Transfer File System
c.) Network Technology File System
d.) New Transfer File System

10.) What command would you use to give the file owner write permissions to a file named apache.log?
a.) chmod o-rx apache.log
b.) chmod o+w apache.log
c.) chmod u+w apache.log
d.) chmod u-rx apache.log

Check Back on April 1st for the Answers and 10 New Questions

Interested in Sponsoring the
Governor’s High School Cyber Challenge?
EVENT SPONSOR
|


COMMUNITY SUPPORTERS
|

Contact Merit with Your Questions About the High School Cyber Challenge