NETWORK
DATA
CELL
SIGNATURE
SECURITY
100

What does OSI stand for?

Open Systems Interconnection

100

What information on a digital image can be used against you?

Meta/ExifData
100

Where does a cell phone get cell coverage from?

Cell Phone Provider

100
What is an electronic signature?

signal broadcasting from a device

100

What is more secure HTTP or HTTPS?

HTTPS


200

What does VPN stand for?

Virtual Private Network

200

What are considerations when choosing a VPN?

Is it allowed in an area, does the VPN audit, is it from a 3rd party.

200

What does IMEI stand for?

International Mobile Equipment Identity

200
What is wireshark?
Web-based application for packet sniffing
200

What are the three areas of the CIA Triad?

Confidentiality, Integrity, Availability

300

What are the 7 layers of the OSI model?

Physical, Data, Network, Transport, Session, Presentation, Application

300

What information does your phone share?

Location, Connections, Apps, "User Dependent"

300
What does IMSI stand for?

International Mobile Subscriber Identity

300

What is Steganography?

Hiding information within an image

300

What layers of the OSI do general users only see and interact with?

Physical (Layer 1)

400
What does TCP stand for?

Transport Control Protocol

400

What is a supply chain attack?

A supply chain attack is a type of cyberattack that targets trusted third-party vendors to infiltrate an organization's systems, often by injecting malicious code into software or compromising hardware components.

400

How does the cell phone provider guarantee service to their customers?

Having more cell towers=more cell coverage.

400

What does OSINT stand for?

Open-Source Intelligence 

400

Name a vulnerability and how it can be leveraged against you on the physical layer of the OSI model. 

Secure Boot being disabled, bypassing security of booting from a separate OS.

500

What is the difference between TCP an UDP connections?

TCP is a connection-oriented protocol, UDP is connectionless protocol

500

What is the best tool for data protection?

The end user

500

What is the name of the timing control on cell phone towers that updates your location?

T3212 timer controls

500

How does social media affect someone's identity?

Digital Persona (Pattern of Life)

500

What is a virtual machine?

Software based OS not from the physical computer