Components
Security Basics
Threats and Attacks
Physical Security
Policies and Legal Frameworks
100

What is the "highway" of the computer

Motherboard

100

What does COMPUSEC stand for, and what does it protect?

Computer Security, which protects information system resources and information?

100

What is the term for software that hides itself and gives an attacker privileged access to a system?

What is a Rootkit?

100

What engineering principle separates unencrypted and encrypted copper signals?

What is Red/Black Separation?

100

What does FOIA stand for, and what does it allow the public to do?

What is the Freedom of Information Act, which allows the public to request records from federal agencies?

200

What major component of the computer is 'non-volatile'

ROM

200

What are the three pillars of the CIA triad?

What are Confidentiality, Integrity, and Availability?

200

What type of malware changes its code each time it runs to avoid detection?

What is Polymorphic Malware?

200

Which countermeasure uses metal conduits and alarmed carriers?

What is a Hardened Distribution System (HDS)?

200

What type of information must remain unclassified but still requires protection and access controls?

What is Controlled Unclassified Information (CUI)?

300

What is needed for hardware components to communicate with the CPU?

Drivers

300

What concept ensures that someone cannot deny having sent a message?

What is Nonrepudiation?

300

What is the process of changing entries in a database to commit fraud or sabotage?

What is Data Diddling?

300

What does TEMPEST stand for?

What is Transient Electromagnetic Pulse Emanation Surveillance Technology?

300

Under FOIA, what are the three main exemption areas that protect sensitive information?

What are Personal Privacy, National Security, and Law Enforcement?

400

What component is responsible for maintaining and storing BIOS settings

Complimentary Metal-Oxide Semiconductor

400

What concept ensures that if one drive fails, others can restore the missing data?

Redundant Array of Independent Disks

400

What type of malware hides in the first sector of a drive and executes during system startup?

What is Boot-Sector Malware?

400

What kind of signal carries encrypted (ciphertext) information?

What is a Black Signal?

400

Which security discipline protects classified or CUI information released to contractors?

What is Industrial Security?

500

What is the Trusted Platform Module?

A physical chip on the MOBO that stores cryptographic keys and verifies system integrity

500

This security concept ensures that a system continues operating correctly even when components fail, typically achieved through methods like redundancy, clustering, or load balancing.

What is Fault Tolerance?

500

What does STRIDE stand for in threat modeling?

What is Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege?

500

What type of security discipline determines who is eligible to access classified info?

What is Personnel Security?

500

Which security discipline determines if someone is eligible to access classified information?

What is Personnel Security?

M
e
n
u