Network Security
Phishing
Malware 101
Classified IS Roles & Responsibilities
General Knowledge
100

This protocol secures web traffic by encrypting data between client and server.

What is HTTPS?

100

A phishing variant that pretends to come from a trusted colleague to request money or data.

What is spear‑phishing?

100

It’s the “pay‑to‑play” model where attackers encrypt a victim’s files and demand a ransom.

What is ransomware?

100

Required to maintain access to a classified information system

NTK, Clearance, training (live and Atlas), and briefings

100

Tools, frameworks, techniques, and practices implemented to ensure the security of computing, information, and other systems and their users

Cybersecurity

200

A network device that monitors and filters inbound/outbound traffic based on a set of security rules.

What is a firewall?

200

a type of phishing where they use Ai generated voices to steal information 

Vishing 

200

This type of malicious software replicates itself to spread to other computers without needing to attach to a host program.

What is a worm?

200

The only individuals authorized to transfer data to and from a classified system or removable media

Data Transfer Agents

200

Kind of devices prohibited from entering restricted access/ closed areas

Bluetooth, Wi-Fi, RFID, audio & visual recording devices, flash drives, USB, thumb drives

300

This type of attack involves overwhelming a target with traffic, causing denial of service.

What is a DDoS attack?

300

a type of phishing where they target the "big fish" (CEO)

Whaling 

300

This “trojan” pretends to be legitimate software but actually installs a backdoor.

What is a Trojan horse?

300

The individual who Maintains inventory/stock of all media stored within the Restricted Access Area or Closed-Area (i.e., approved safe) throughout its lifecycle (creation to destruction)

Media Custodian

300

Form needed to be able to move classified hardware

Hardware move form

400

The practice of breaking a security system into components to analyze it is known as this. 

What is penetration testing?

400

a type of phishing where they use texting 

sms phishing 

400

The term for software that is installed without the user’s knowledge and then silently gathers data, often used for espionage.

What is spyware?

400

The individual who continuously monitors activities on the systems and networks to detect unauthorized actions in violation of signed user agreements

Information System Security Officer (ISSO)

400

Needed for a high to low data transfer

Two-Person Integrity, AFT

500

An authentication method that uses something you have, something you know, and something you are.

What is multi‑factor authentication (MFA)?

500

phishing through fake wifi 

Evil twin 

500

This zero‑day malware family targeted millions of routers in 2022, exploiting a hard‑coded admin password.

What is the “Mirai” botnet?

500

The specific individual (by name) responsible for supervising and directing security measures necessary for implementing applicable NISPOM and related requirements for classified information

Jeff Vaccariello

500

Act of reproducing, extracting, summarizing, incorporating, paraphrasing, restating, or generating, in a new form, information already classified and marking the newly developed material consistent with the classification and markings applied to the source information

Derivative Classification

M
e
n
u