CSTM/CSTL Physical Access & Security

Please click on the following tabs to reveal the knowledge depth required for a successful pass of the CSTM or CSTL exam.

You will be given a random selection of questions. Please note exam content is subject to change due to circumstances beyond our control – use this as a guide and email us if you have any queries.

    • Understands how locks can be used to restrict access to computer hardware.

  • Understands how tamper seals can be used to deter access to computer hardware.

  • Understands platform integrity technologies, e.g. TPM.
  • Understands the boot sequence and security issues around the boot sequence.

  • Understands the security implications of unencrypted storage devices, such as hard disks.
  • Can demonstrate how data can be recovered from unencrypted storage devices, and how such data can be manipulated to introduce vulnerabiliites into an operating system.


  • Understands the security attributes of operating systemrecovery functionality, e.g. Windows Recovery Console and Safe Mode.
  • Understands multi-factor authentication systems, such as tokens and SMS.
  • Understands types of biometrics and how they can be applied.
  • Understands the concept of one-time pads.
  • Understands the use of digital certificates as an authentication mechanism.
  • Understands the concept of contactless RFID smart cards.