Know Your Role
Teminology
Security Exam Questions
Potpourri
Women In Cyber History
100

This role works with System Engineers to derive through multiple tiers, the security functional requirements from the security architecture and the contractually mandated RMF and/or JSIG controls

What is System Security Engineer?

100

A ____ uses their skills ethically.

What is a White Hat Hacker?

100

Any unauthorized access to or theft of information from a Bluetooth connection.

What is Bluesnarfing?

100

Introduced in 2012 and publicly disclosed in 2014 this security bug was found in the OpenSSL cryptography library

What is Heartbleed?

100

She was an analyst of Charles Babbage's analytical engine and described as the "first computer programmer".  She published the first algorithm in 1843.

Who is Ada Lovelace?

200

An experienced System Security Engineer responsible for architecting the overall security design of a system

What is a Cyber Architect?

200

Using another person's social security number is an example of?

What is Identity Theft?

200

Grandpa hid several plaintext documents within an image file. He then sent the image file to Gregory. What BEST describes the purpose of his actions?

What is Steganography?

200

Automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a program

What is fuzzing?

200

A 1940s Hollywood actress who co-invented a frequency-hopping method to control torpedoes remotely without risk of signal tracking or jamming (later became part of Bluetooth and Wi-Fi).

Who is Hedy Lamarr?

300

This role uses threat analysis to determine impact to system and system architectures. They also finalize the RMF or JSIG A&A package for submission to the Authorizing Official.

What is the Assessment and Authorization Specialist?

300

A hospital has servers containing fake patient information to trick hackers.

What is Honeypot?

300

Management has mandated the use of digital signatures by all personnel within your organization. What Use Case does this support?

What is non-repudiation?

300

The information system used or operated by an agency

What is national security system?

300

She created the first compiler for a programming language, has been wrongly credited for coining the term 'bug'.

Who is Grace Hopper?

400

This role is responsible for the testing and/or evaluation of the management, operational, and technical security controls in an information system

What is Security Testing Specialist and Vulnerability Analysis Specialist?

400

Jeff was able to enter a hospital by disguising himself up as a nurse without identification

What is Social Engineering?

400

The Springfield Nuclear Power Plant has created an online application teaching nuclear physics. Only students and teachers in the Springfield Elementary school can access this application via the cloud. What type of cloud service model is this?

What is Software As A Service (SaaS)?

400

The current culture shift in the software industry that aims to bake security into the rapid-release cycles of modern application development and deployment.

What is DevSecOps?

400

These are the brave women who in the 1940s helped crack German and Japanese codes to help win World War II.

Who are the Code girls?

500

Responsible for the investigation, study, and control of compromising emanations from telecommunications and automated information systems equipment

What is a Tempest Analyst?

500

Who uses their skills to harm or damage computer systems?

Who is a Black Hat Hacker?

500

You need to transmit PII via email and you want to maintain its confidentiality. The best method is what?

What is Encryption?

500

Uncovered in 2010, this is the malicious computer worm that targeted SCADA systems.

What is Stuxnet?

500

She is credited with writing the assembly language for the ARC2 computer.

Who is Kathleen Booth?

600

At a cyber crime scene, Gilbert is tasked with carefully handling evidence. He is a _____.

What is a Forensic Expert?

600

Self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.

What is a Worm?

600

Any malicious computer program which is used to hack into a computer by misleading users of its true intent.

What is a Trojan?

600

A Client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application.

What is XSS or Cross Site Scripting?

600

She programmed the IBM 7030 ‘Stretch’ computer that delivered refined calculations for a geodetic Earth model, which eventually became known as GPS.

Who is Glady's West?


700

Jenny works at a hospital to keep sensitive information safe. She is a _____.

What is a Security Engineer?

700

A WAP placed within a network by someone with some type of attack in mind.

What is a Rogue Access Point?

700

Your organization is implementing an SDN. Management wants to use an access control model that controls access based on attributes. What is the the BEST solution?

What is Attribute Based Access Control (ABAC)?

700

A string of code embedded into an application or script that will execute in response to an event.

What is a Logic Bomb?

700

She was the Director of the Software Engineering Division of the MIT Instrumentation Laboratory, which designed the onboard flight software that made Neil Armstrong and Buzz Aldrin’s Apollo mission possible.

Who was Margaret Hamilton?

800

____________________is responsible for making sure that policies are being followed by educating everyone on their role within the organization.

What is a Security Officer?

800

A type of malicious software designed to remotely access or control a computer without being detected by users or security programs.

What is a rootkit?

800

A code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution

What is SQLi or SQL Injection?

800

A form of malware that essentially holds a computer system captive.

What is ransomware?

800

The "mother of the internet". She created the algorithm behind the Spanning Tree Protocol (STP) in which was part of the internet's underlying foundation.

Who was Margaret Hamilton?

900

_____ simulate cyber attacks on test code to test security.

What is a Source Code Auditor?

900

A trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys.

What is Brute Force?

900

A network includes a ticket-granting ticket server used for authentication. Which authentication service does this network use?

What is Kerberos?

900

The practice of looking for a wireless network to exploit, more common in cars.

What is War Driving?

900

Before computers existed as we know them, data was processed by women, often black women. But they were much more than mere calculators. Their achievements were integral to NASA’s success.

Who were the "Human Computers"?

1000

Joe must install physical protections of video surveillance and alarm systems for a company. He is a _____.

What is a Security Consultant?

1000

A form of Two cryptographic attack exploits, two different messages or files produce the same hashing digest, then a collision has occurred.

What is Birthday attack?

1000

An attacker gathers personal information about the target individual, who is a CEO.

What is Whaling?

1000

A type of security threat exists when this user account is used to perform administrative functions.

What is Privilege escalation?

1000

She is the first American female Doctorate of Computer Science (1968), and a winner of the Turing prize in 2009.

Who is Barbara Liskov?

M
e
n
u