Computer&OS
Security Programs
Risk, Threats, and Vulnerabilities
Misc.
100

List the 7 components of a client.

Motherboard, CPU, GSU, PSU, RAM, ROM, Storage

100

Unintentional Emanations

TEMPEST

100

What is the equation for the Risk Assessment Score?

Probability x Impact

100

What does the CIA Triad stand for?

Confidentiality, Integrity, Availability. 

200

What are the two types of hypervisors?

Hosted and Bare-Metal 

200

Reduce mission vulnerabilities by ensuring adversaries do not collect information that could jeopardize it. 

OPSEC 

200

What is the STIG publication used for?

Standardizing security protocols. 

300

List two types of servers and what they are used for.

Web - Hosts Websites 

Email - Provides Email Services

DHCP - Assigns IP Addresses

DNS - Translates domain names to IP Addresses

Proxy - Used to hide IP Addresses

Application -  Hosts Apps


300

Maintaining the CIA triad

COMPUSEC

400

What are the three cloud computing services?

Infrastructure as a Service, Platform as a Service, Software as a Service. 

400

Protecting data in use

COMSEC
500

List the 5 parts of the Active Directory Logical Structure Partition. Which part contains every component?

Forest, Tree, Domain, Organizational Unit, Objects


Forest contains everything. 

500

Security of Classified and CUI

INFOSEC

M
e
n
u