Computers & Pubs
Virtualization and Servers
Risk and Security
Incident Response
MISC
100

Name all the major components of a client.

Motherboard, CPU, PSU, GPU, RAM, ROM, Storage

100

What are 2 advantages of virtualization?


Cost reduction, minimizes downtime, productivity increase, flexible, and scalable

100

What is the use of coding systems to encrypt and decrypt information?

Cryptography 

100

What is the difference between Events and Incidents?

Events are observable occurrences. Incidents are  occurrences that could potentially jeopardize the CIA triad. 

100

Name one of the four computer ethics discussed in class.

Use Government Systems Responsibly, Protect Information, Respect Intellectual Property, be Professional Online

200

List at least three of the five parts of the physical structure of Active Directory.

Sites, Domain Controller, Global Catalog Server, Clients, and Servers

200

What are the two types of Hypervisors?

Bare Metal and Hosted

200

What are the two types of Network Access Control software? 

Agent-based and Agentless

200

Explain the difference between the Cyber Incident Report and the Network Intelligence Report.

The CIR is a detailed analysis of the affected system, probable attacker, attack vector, technical/operational impacts, etc. The NIR focuses on the potential foreign  threat to DoD Networks. 
200

Name 2 ways to be safe when using the supply chain to purchase resources. 

Check the Approved Product List, talk to resource advisor, BECO, contracting squadron, check 3rd part security policies. 

300

What is the difference between DODI and DODM?

DODI establishes policy, DODM implements policy.

300

Name all the Active Directory Logical structure and identify which one encompasses everything.

Forest***, Tree, Domain, Organizational Unit, Objects

300

Name 3 threats from the STRIDE framework. 

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege 

300

Name the 3 of the 4 members on the Computer Incident Response Team (CIRT). 

Team leader, Technical Specialist, Documentation Specialist, Legal Advisor

300

What do you place in the DMZ?

Any servers from the private that need to be reached by the public. 

400

What are the two types of CPU modes?

User and Kernel 

400

How does the DHCP server communicate to the client?

Discover, Offer, Request, Acknowledge

400

Name the three types of firewalls. Which one can read packet contents?

Packet filtering, Stateful, Application-Layer/Next Gen

Next Gen

400

List at least 3 of the 5 steps in the Incident Analysis step.

1. Gather Information

2. Validate The Incident

3. Determine The Operational Impact

4. Coordinate

5. Determine Reporting Requirements

400

Name all 5 of the authentication factors. Give me an example of 1. 

Something You Know, Something You Have, Something You Are, Somewhere You Are, Something You Do

500

List the order of the Boot Process. List the two steps that happen in any one of the steps. 

1. BIOS (Run post and look for bootable device) 2. Boot Loader (put instructions from MBR into CPU, load them into RAM) 3. Kernel (Load Registry and Drivers, control is handed over)

500

Pick a part the sections that create www.facebook.com/profile and label them. 

www - subdomain

facebook - domain name

.com - top-level domain

/profile - filepath 

500

What are the two types of Intrusion controls? Where can the be based?

IDS and IPS

Host-Based or Network-Based

500

List at least 4 of the 6 steps in the Incident Handling Process.

1. detection and Reporting 2. Preliminary Analysis and ID 3. Preliminary Response Actions 4. Incident Analysis 5. Response and Recovery 6. Post-Incident Analysis 

500

Name the 3 core disciplines of Information Protection.

Personnel Security, Industrial Security, Information Security