DHS Security Quiz Tournament

Event FAQ


  • There are qualifying rounds and a final round. The top two teams of each qualifying round competes in the final round.
  • All questions have short answers
  • Quiz Moderator asks 10-12 questions at each round
  • Every team tries to answer the questions simultaneously
  • For each question, teams have 30 seconds to write down their answer on a sheet of paper
  • After 30 seconds, teams show their answers to the Quiz Moderator
  • Teams earn 1 point for each of their correct answer
  • At the end of each round, teams are ranked according to their points
  • The NYU Polytechnic School of Engineering reserves the right to adapt these rules as needed prior to the contest

Sample Questions



Hardware There was a vulnerability where a Firewire device, when plugged in, can overwrite anywhere in memory. What hardware protocol caused this? DMA or Direct Memory Access
Digital Forensics What is the hiding of a secret message within an ordinary message and the extraction of it at its destination called? Steganography
History, Personality & Literature What was the name of the 1983 movie where Mathew Broderick played a young hacker who gained access to a government nuclear war simulator? Wargames
System/Network Admin In Microsoft Internet Explorer, which file stores information about a user’s browsing history such as URLs? the index.dat file
Cryptography In practical cryptography, what is the name of the functions that are embodied in a physical structure, that is easy to evaluate but hard to characterize. PUF or Physical Unclonable Function