3.0 Security Architecture Flashcards

1
Q

Q: What is a responsibility matrix in cloud computing?

A

It defines who is responsible for securing different components in a cloud environment (provider vs client).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are hybrid clouds?

A

A combination of private and public clouds used together by an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Infrastructure as Code (IaC)?

A

The practice of managing and provisioning computing infrastructure through machine-readable definition files rather than physical hardware configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is serverless computing?

A

Running applications without managing dedicated servers; the provider handles infrastructure management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a microservices architecture?

A

An architectural style where an application is developed as a collection of small services that communicate over APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does network segmentation improve security?

A

It limits lateral movement within a network by isolating traffic into different segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an air-gapped network?

A

A network that is physically isolated from external networks for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Software-defined Networking (SDN)?

A

A networking approach that uses software-based controllers to manage network traffic instead of relying on hardware devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are containers in computing?

A

Lightweight virtualized environments that share the host OS kernel but isolate applications and their dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is virtualization?

A

Running multiple virtual machines on a single physical server with each VM operating independently with its own OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are IoT devices often targeted by attackers?

A

They often lack robust security features such as strong passwords or encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Industrial Control Systems (ICS)?

A

Systems used in industrial settings like power plants or manufacturing facilities to control processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is high availability in IT systems?

A

Ensuring that systems remain operational with minimal downtime through redundancy and failover mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does logical segmentation differ from physical isolation?

A

Logical segmentation divides traffic through software configurations like VLANs, while physical isolation separates systems physically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is risk transference in IT architecture?

A

Shifting risk from one party to another, often seen when using third-party vendors or cloud services instead of managing everything in-house

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why might patch availability be a concern in embedded systems?

A

Embedded systems often have limited update mechanisms, making it difficult to apply patches quickly or at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does “compute” refer to in architecture considerations?

A

The processing power required by systems or applications within an architecture model

18
Q

What is meant by decentralized architecture?

A

A decentralized architecture distributes data processing across multiple locations or devices rather than relying on a single centralized system

19
Q

Why is scalability important in modern architectures?

A

Scalability allows systems to handle increased workloads without compromising performance and ensures that they can grow as demand increases

20
Q

What are some common challenges with hybrid cloud environments?

A

Hybrid clouds require consistent security policies across both private and public clouds and careful management of data transfer between them

21
Q

How does SDN improve flexibility in networking?

A

SDN allows centralized control over network traffic through software rather than relying on physical hardware configurations, enabling more dynamic management of resources

22
Q

What is the purpose of a DMZ in network architecture?

A

To isolate public-facing services from internal networks for added security

23
Q

What is an attack surface?

A

The total number of vulnerabilities or entry points an attacker can exploit

24
Q

Describe fail-open vs fail-close scenarios.

A

Fail-open allows access during failure; fail-close denies access during failure

25
Q

What is the role of an IPS?

A

To monitor and block suspicious activity in real-time.

26
Q

What does SD-WAN stand for?

A

Software-defined Wide Area Network.

27
Q

What does 802.1X provide?

A

Network access control through device authentication before granting access

28
Q

How does a WAF protect web applications?

A

By filtering HTTP requests to prevent attacks like SQL injection

29
Q

What is the difference between active and passive devices?

A

Active devices manage traffic; passive devices monitor without affecting it

30
Q

What does TLS stand for?

A

Transport Layer Security

31
Q

What is SASE?

A

Secure Access Service Edge—a cloud-based framework combining networking and security functions.

32
Q

Why is reducing the attack surface important?

A

It minimizes potential vulnerabilities attackers can exploit.

33
Q

What type of firewall operates at both Layer 4 and Layer 7?

A

Next-generation firewalls (NGFW).

34
Q

What is a jump server used for?

A

To securely manage devices across different security zones.

35
Q

How does port security enhance network protection?

A

By restricting which devices can connect based on authentication protocols like 802.1X

36
Q

What is IPSec used for?

A

Securing IP communications through encryption and authentication.

37
Q

Name one benefit of using SD-WAN.

A

It improves performance while maintaining secure connections through encryption.

38
Q

How does a proxy server enhance privacy?

A

By intermediating requests between clients and servers, hiding client details from servers

39
Q

What is the main function of a load balancer?

A

To distribute network traffic across multiple servers ensuring availability

40
Q

Why might an organization choose fail-close over fail-open?

A

To prioritize security by blocking access during system failures

41
Q
A