List the 7 components of a client.
Motherboard, CPU, GSU, PSU, RAM, ROM, Storage
Unintentional Emanations
TEMPEST
What is the equation for the Risk Assessment Score?
Probability x Impact
What does the CIA Triad stand for?
Confidentiality, Integrity, Availability.
What are the two types of hypervisors?
Hosted and Bare-Metal
Reduce mission vulnerabilities by ensuring adversaries do not collect information that could jeopardize it.
OPSEC
What is the STIG publication used for?
Standardizing security protocols.
List two types of servers and what they are used for.
Web - Hosts Websites
Email - Provides Email Services
DHCP - Assigns IP Addresses
DNS - Translates domain names to IP Addresses
Proxy - Used to hide IP Addresses
Application - Hosts Apps
Maintaining the CIA triad
COMPUSEC
What are the three cloud computing services?
Infrastructure as a Service, Platform as a Service, Software as a Service.
Protecting data in use
List the 5 parts of the Active Directory Logical Structure Partition. Which part contains every component?
Forest, Tree, Domain, Organizational Unit, Objects
Forest contains everything.
Security of Classified and CUI
INFOSEC