This role works with System Engineers to derive through multiple tiers, the security functional requirements from the security architecture and the contractually mandated RMF and/or JSIG controls
What is System Security Engineer?
A ____ uses their skills ethically.
What is a White Hat Hacker?
Any unauthorized access to or theft of information from a Bluetooth connection.
What is Bluesnarfing?
Introduced in 2012 and publicly disclosed in 2014 this security bug was found in the OpenSSL cryptography library
What is Heartbleed?
She was an analyst of Charles Babbage's analytical engine and described as the "first computer programmer". She published the first algorithm in 1843.
Who is Ada Lovelace?
An experienced System Security Engineer responsible for architecting the overall security design of a system
What is a Cyber Architect?
Using another person's social security number is an example of?
What is Identity Theft?
Grandpa hid several plaintext documents within an image file. He then sent the image file to Gregory. What BEST describes the purpose of his actions?
What is Steganography?
Automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a program
What is fuzzing?
A 1940s Hollywood actress who co-invented a frequency-hopping method to control torpedoes remotely without risk of signal tracking or jamming (later became part of Bluetooth and Wi-Fi).
Who is Hedy Lamarr?
This role uses threat analysis to determine impact to system and system architectures. They also finalize the RMF or JSIG A&A package for submission to the Authorizing Official.
What is the Assessment and Authorization Specialist?
A hospital has servers containing fake patient information to trick hackers.
What is Honeypot?
Management has mandated the use of digital signatures by all personnel within your organization. What Use Case does this support?
What is non-repudiation?
The information system used or operated by an agency
What is national security system?
She created the first compiler for a programming language, has been wrongly credited for coining the term 'bug'.
Who is Grace Hopper?
This role is responsible for the testing and/or evaluation of the management, operational, and technical security controls in an information system
What is Security Testing Specialist and Vulnerability Analysis Specialist?
Jeff was able to enter a hospital by disguising himself up as a nurse without identification
What is Social Engineering?
The Springfield Nuclear Power Plant has created an online application teaching nuclear physics. Only students and teachers in the Springfield Elementary school can access this application via the cloud. What type of cloud service model is this?
What is Software As A Service (SaaS)?
The current culture shift in the software industry that aims to bake security into the rapid-release cycles of modern application development and deployment.
What is DevSecOps?
These are the brave women who in the 1940s helped crack German and Japanese codes to help win World War II.
Who are the Code girls?
Responsible for the investigation, study, and control of compromising emanations from telecommunications and automated information systems equipment
What is a Tempest Analyst?
Who uses their skills to harm or damage computer systems?
Who is a Black Hat Hacker?
You need to transmit PII via email and you want to maintain its confidentiality. The best method is what?
What is Encryption?
Uncovered in 2010, this is the malicious computer worm that targeted SCADA systems.
What is Stuxnet?
She is credited with writing the assembly language for the ARC2 computer.
Who is Kathleen Booth?
At a cyber crime scene, Gilbert is tasked with carefully handling evidence. He is a _____.
What is a Forensic Expert?
Self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.
What is a Worm?
Any malicious computer program which is used to hack into a computer by misleading users of its true intent.
What is a Trojan?
A Client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application.
What is XSS or Cross Site Scripting?
She programmed the IBM 7030 ‘Stretch’ computer that delivered refined calculations for a geodetic Earth model, which eventually became known as GPS.
Who is Glady's West?
Jenny works at a hospital to keep sensitive information safe. She is a _____.
What is a Security Engineer?
A WAP placed within a network by someone with some type of attack in mind.
What is a Rogue Access Point?
Your organization is implementing an SDN. Management wants to use an access control model that controls access based on attributes. What is the the BEST solution?
What is Attribute Based Access Control (ABAC)?
A string of code embedded into an application or script that will execute in response to an event.
What is a Logic Bomb?
She was the Director of the Software Engineering Division of the MIT Instrumentation Laboratory, which designed the onboard flight software that made Neil Armstrong and Buzz Aldrin’s Apollo mission possible.
Who was Margaret Hamilton?
____________________is responsible for making sure that policies are being followed by educating everyone on their role within the organization.
What is a Security Officer?
A type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
What is a rootkit?
A code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution
What is SQLi or SQL Injection?
A form of malware that essentially holds a computer system captive.
What is ransomware?
The "mother of the internet". She created the algorithm behind the Spanning Tree Protocol (STP) in which was part of the internet's underlying foundation.
Who was Margaret Hamilton?
_____ simulate cyber attacks on test code to test security.
What is a Source Code Auditor?
A trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys.
What is Brute Force?
A network includes a ticket-granting ticket server used for authentication. Which authentication service does this network use?
What is Kerberos?
The practice of looking for a wireless network to exploit, more common in cars.
What is War Driving?
Before computers existed as we know them, data was processed by women, often black women. But they were much more than mere calculators. Their achievements were integral to NASA’s success.
Who were the "Human Computers"?
Joe must install physical protections of video surveillance and alarm systems for a company. He is a _____.
What is a Security Consultant?
A form of Two cryptographic attack exploits, two different messages or files produce the same hashing digest, then a collision has occurred.
What is Birthday attack?
An attacker gathers personal information about the target individual, who is a CEO.
What is Whaling?
A type of security threat exists when this user account is used to perform administrative functions.
What is Privilege escalation?
She is the first American female Doctorate of Computer Science (1968), and a winner of the Turing prize in 2009.
Who is Barbara Liskov?