3.0 Architectures and Designs Flashcards

1
Q

The use of multiple layers of security to protect resources. Controlled Diversity and Vendor Diversity are two methods organizations implement to provide this.

A

Defense-in-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The practice of implementing security controls from different vendors to increase security.

A

Vendor Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of different security control types such as technical controls, administrative controls, and physical controls.

A

Control Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security controls implemented via administrative or management methods.

A

Administrative Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security controls implemented through technology.

A

Technical Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network architecture that is situated between an untrusted network and a protected network and acts as a protective buffer zone between the two networks.

A

DMZ (Demilitarized Zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The part of an internal network shared with outside entities. They are often used to provide access to authorized business partners, customers, vendors, or others.

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An internal network. People use this to communicate and share content with each other.

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A service that translates public IP address to private IP address and vice versa.

A

NAT (Network Access Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A connection mode used by wireless devices without an access point. When wireless devices connect through an access point they are using infrastructure mode.

A

AD HOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method of segmenting traffic, it logically groups several different computers together without regard of their physical location.

A

VLAN (Virtual Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technology that allows you to host multiple virtual machines on a single physical system.

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A physical security control that provides physical isolation. Systems separated by this don’t typically have any physical connections to other systems.

A

Airgap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A dedicated device used for VPNs that includes all the services needs to create a VPN, including strong encryption and authentication techniques.

A

VPN Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Devices used to handle TLS traffic. Servers can offload TLS traffic to improve performance.

A

SSL Acelerator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware of software that balances the load between two or more servers.

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An attack on a system launched from multiple sources, intended to make a computers resources or services unavailable to users.

A

DDoS (Distributive Denial of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A method to encrypt an entire disc.

A

FDE (Full Disc Encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A drive that includes the hardware and software necessary to encrypt a hard drive.

A

SED (Self Encrypting Drive)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hardware chip on a motherboard included in many laptops and some mobile devices.

A

TPM (Trusted Platform Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A removable or external device that can generate, store, and manage RSA keys using asymmetric encryption.

A

HSM (Hardware Security Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A method used to boot some systems and intended to replace BIOS firmware.

A

UEFI/BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Interference caused by motors, power lines, and fluorescent lights.

A

EMI/EMP (Electromagnetic Interference/ Pulse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A freestanding device that operates in a largely self-contained manner.

A

Appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A core principle of secure system design. Systems should be deployed with only the services, application, and protocols needed to meet their purpose.

A

Least Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A list of applications that a system allows.

A

Application White Listing

27
Q

A list of applications that a system denies.

A

Application Black Listing

28
Q

The use of an isolated area on a system, typically for testing.

A

Sandboxing

29
Q

The state of a system when all required OS software and applications as well as configuration details have been configured exactly according to predetermined standard.

A

Baselining

30
Q

A system used to control an ICS such as a power plant or a water treatment facility.

A

SCADA (Supervisory Control and Data Acquisition)

31
Q

The network of physical devices connected to the Internet.

A

IoT (Internet of Things)

32
Q

Physical security control that increase availability by regulating air flow within data centers and server rooms.

A

HVAC

33
Q

An integrated circuit that includes a computing systems within the hardware. Many mobile devices include this.

A

SoC (System on a Chip)

34
Q

An operating system that reacts to input within a specific time.

A

RTOS (Real Time Operating System)

35
Q

Software development cycle using a top down approach. It uses multiple stage; with each stage starting after the previous stage is completed.

A

Waterfall Method

36
Q

The process of managing and provisioning computer datacenters through machine-readable definition files.

A

Infrastructure as Code

37
Q

The process of organizing data and columns in a database.

A

Normalization

38
Q

An attempt to make something unclear or difficult to understand.

A

Obfuscation

39
Q

A method of testing that intentionally enters invalid input to see if the application can handle it.

A

Fuzzing

40
Q

Subjecting a system to workloads that are extreme.

A

Stress Testing

41
Q

Virtualization method that is independent of the operating system and boots before the OS.

A

Type I Hypervisor

42
Q

Virtualization method that is dependent on the operating system.

A

Type II Hypervisor

43
Q

A model of cloud computing in which the consumer can use the provider’s applications, but they do not manage or control any of the underlying cloud infrastructure.

A

SaaS

44
Q

A cloud service model wherein the consumer can deploy but does not manage or control any of the underlying cloud infrastructure.

A

PaaS

45
Q

A model of cloud computing that utilizes virtualization; clients pay an outsourcer for the resources used.

A

IaaS

46
Q

A cloud delivery model owned and managed internally.

A

Private Cloud

47
Q

A cloud delivery model available to others.

A

Public Cloud

48
Q

Any cloud delivery model that combines two or more of the other delivery model types.

A

Hybrid Cloud

49
Q

Cloud delivery model in which the infrastructure is shared by organizations with something in common.

A

Community Cloud

50
Q

A subscription-based business model intended to be more cost effective than smaller individuals/corporations could ever achieve on their own.

A

Security as a Service

51
Q

Image of a virtual machine at a moment in time.

A

Snapshot

52
Q

A method to bring a system back quickly to its pre-attack state without needing a fixed set of hardware, OS, or configuration.

A

Non-persistence

53
Q

The capability to support future network growth beyond its current needs.

A

Scalability

54
Q

To have more than one of something, or some functioning feature of a system, or even another complete system.

A

Redundancy

55
Q

The capability of any system to continue functioning after some part of the system has failed. RAID is an example.

A

Fault Tolerance

56
Q

A configuration of multiple hard disks used to provide fault tolerance should a disk fail. Different levels of RAID exist.

A

RAID

57
Q

A device, such as a small room, that limits access to one or a few individuals. They typically use electronic locks and other methods to control access.

A

Mantrap

58
Q

An electrically conductive wire mesh or other conductor woven into a “cage” that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls.

A

Faraday Cage

59
Q

Human physical characteristics that can be measured and saved to be compared as authentication and granting the user access to a network or resource.

A

Biometrics

60
Q

An authentication device or file.

A

Token

61
Q

A physical security deterrent used to protect a computer.

A

Cable Lock

62
Q

The management of all aspects of cryptographic keys in a cryptosystem, including key generation, exchange, storage, use, destruction and replacement.

A

Key Management

63
Q

A method of software development meant to be rapid.

A

Agile Development