Insider Threat
CIA
Plan 2 Plan
Patch-22
Random
200

This term describes an insider who has been secretly recruited or coerced by a Foreign Intelligence Entity (FIE) to steal classified or sensitive national defense information.

What is a mole (or spy/espionage agent)?

200

This concept dictates that access to sensitive information is granted only if it is explicitly required for personnel to execute specific mission tasks.

What is "need-to-know"?

200

This document provides the structured scenario and discussion points for a simulated, non-technical walkthrough of an incident response plan.

What is a Tabletop Exercise (TTX) Plan?

200

This practice is critical because it mitigates vulnerabilities, effectively preventing exploitation by cyber attackers.  

What is patch management?  

200

An employee reports their system behaving strangely. How should cybersecurity professionals investigate?

Check system logs, scan for malware, analyze recent updates, and validate user activities. 

400

This term describes the severe threat scenario where two or more insiders secretly work together to bypass security mechanisms, such as the two-person rule.

What is collusion?

400

This one-way mathematical algorithm generates a fixed-size character string to verify that a file or message has not been altered.

What is a hash function (or hashing)?

400

This living document maintains a centralized, up-to-date inventory of all hardware, software, and firmware assets currently operating within the mission boundary.

What is a Baseline Configuration (or Asset Inventory)?

400

Name the difference between hotfixes, patches, and updates

Hotfix: urgent fix for a specific issue

Patch: fixes security vulnerabilities

Update: improves functionality and security

400

This AI-generated synthetic media replaces a person's likeness or voice in an existing image or video, often used for disinformation.

What is a Deepfake?

600

This formal acknowledgment, often displayed as a login banner, explicitly informs users that they have no reasonable expectation of privacy and their actions are subject to monitoring.

What is a User Agreement or Warning Banner

600

These cryptographic tools provide non-repudiation by proving both the identity of the sender and that the message content was not modified in transit.

What are digital signatures?

600

This structured plan dictates the specific phases—such as containment, eradication, and recovery—for handling a detected cyber attack.

What is an Incident Response Plan (IRP)?

600

A recent patch caused system instability. What should be done?

Roll back the patch and investigate compatibility issues before reapplying

600

In Windows, running this specific command-line utility displays all current TCP/IP network configuration values, including your IP address.

What is ipconfig?

800

This federal law protects employees who report internal waste, fraud, or abuse from retaliation, but it does not authorize the unauthorized disclosure of classified mission data.

What is the Whistleblower Protection Act?

800

This access control method requires a user to provide two or more different categories of credentials, such as a pin and a CAC.

What is Multi-Factor Authentication (MFA)?

800

This required tracking document outlines identified security weaknesses in a system, including the resources, milestones, and target dates for mitigating them.

What is a Plan of Action and Milestones (POA&M)?

800

A company delays patching critical systems due to operational concerns. What risk does this pose?

Increased likelihood of exploit due to known invulnerabilities.

800

Before discarding old hard drives or sensitive printed CUI, you should run them through this machine to prevent data recovery.

What is a Shredder (or Media Destroyer)?

1000

This specific group of personnel, which includes system and network administrators, poses the highest operational risk because they possess the technical capability to alter logs and bypass security controls.

What are Privileged Users?

1000

This hardware configuration uses multiple redundant disk drives to ensure that data remains accessible even if a single drive fails.

What is RAID (Redundant Array of Independent Disks)?

1000

This tactical document provides step-by-step technical instructions for restoring IT infrastructure, servers, and data after a catastrophic event.

What is a Disaster Recovery Plan (DRP)?

1000

This occurs when a security tool incorrectly flags legitimate, harmless activity as a potential threat.

What is a False Positive?

1000

Operating like the internet's phonebook, this service translates human-readable domain names (like www.army.mil) into numerical IP addresses.

What is DNS (Domain Name System)?

M
e
n
u