3.0 Security Architecture Flashcards

1
Q

What is Serverless Architecture

A

Function as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: What is physical isolation in networking?

A

A: Using separate hardware to prevent attacker movement between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What is logical segmentation?

A

A: Using VLANs to segment networks on the same switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What is SDN (Software Defined Networking)?

A

A: Makes the physical network programmable via software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q: What are the three planes in SDN?

A

A: Data Plane (packet forwarding), Control Plane (routing), Management Plane (configuration).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q: What is virtualization?

A

A: Running multiple OSes on one hardware using hypervisors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q: What is containerization?

A

A: Isolated app environments using Docker; share host OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q: Difference between containers and VMs?

A

A: Containers share host OS; VMs use hypervisors and separate OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q: What is SCADA/ICS?

A

A: Supervisory control systems for industrial devices; not internet-exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q: What is RTOS?

A

A: A real-time OS that guarantees task execution within strict timing constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q: What is an embedded system?

A

A: A device with hardware and software built for a single purpose (e.g., smartwatches, traffic lights).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q: What does MTTR stand for?

A

A: Mean Time to Repair — how long it takes to fix a system after failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q: What is elasticity in cloud computing?

A

A: The ability to scale resources dynamically in response to workload demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q: What is risk transference?

A

A: Shifting risk to another party (e.g., using a cloud provider or insurance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q: Best practice if infected by malware?

A

A: Restore from clean backups or use pre-configured corporate images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q: Why are embedded systems hard to patch?

A

A: They may lack interfaces or vendor support, making patching difficult or impossible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Q: What is a security zone?

A

A: Logical or physical areas with different trust levels (e.g., DMZ, internal network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Q: What is the difference between fail-open and fail-closed?

A

Fail-open: Allows traffic during failure

Fail-closed: Blocks traffic for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Q: What is passive monitoring?

A

A: IDS-like system that observes and logs activity without interfering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q: What is a jump server?

A

A: A secure intermediary used to access internal servers via VPN, SSH, or RDP.

21
Q

Q: What is a forward proxy?

A

A: Intercepts outbound internet traffic from inside a network.

22
Q

Q: What is a reverse proxy?

A

A: Accepts incoming internet traffic and forwards it to internal servers.

23
Q

Q: What is a load balancer used for?

A

A: Distributes traffic across multiple servers for high availability and performance.

24
Q

Q: What is SSL offloading?

A

A: Delegates encryption/decryption to the load balancer to reduce server load.

25
Q

Q: What is EAP?

A

A: Extensible Authentication Protocol; a framework supporting many authentication methods.

26
Q

Q: What is IEEE 802.1X used for?

A

A: Port-based network access control requiring authentication before network access.

27
Q

Q: What is NAC?

A

A: Network Access Control; validates a device before granting network access.

28
Q

Q: What is the EAP authentication process?

A

A: Supplicant → Authenticator → Authentication Server (e.g., RADIUS, LDAP).

29
Q

Q: What is UTM?

A

A: Unified Threat Management — all-in-one device (firewall, AV, spam filter); legacy solution.

29
Q

Q: What does a traditional firewall filter on?

A

A: OSI Layer 4 (transport layer — ports and protocols).

30
Q

Q: What is an NGFW?

A

A: Next-Gen Firewall with Layer 7 inspection, app awareness, and intrusion prevention.

31
Q

Q: What does a VPN do?

A

A: Encrypts traffic between devices over untrusted networks.

31
Q

Q: What is a WAF?

A

A: Web Application Firewall; protects web apps by filtering HTTP/HTTPS traffic (detects SQLi, XSS).

32
Q

Q: What is IPsec tunnel mode?

A

A: Encrypts entire IP packet with a new outer header for secure transmission.

33
Q

Q: What is SSL/TLS VPN?

A

A: VPN using SSL/TLS protocols (e.g., HTTPS); often browser-based using port 443.

34
Q

Q: What is SD-WAN?

A

A: Software-defined WAN that dynamically manages connections across remote sites.

35
Q

Q: What is SASE?

A

A: Secure Access Service Edge — integrates SD-WAN and cloud-based security.

36
Q

Q: What is PII?

A

A: Personally Identifiable Information — can be used to identify an individual.

37
Q

Q: What is data sovereignty?

A

A: Legal requirement that data be stored/processed within specific countries.

38
Q

Q: What is failover?

A

A: Automatic switching to backup systems when primary fails.

39
Q

Q: What is a UPS?

A

A: Uninterruptible Power Supply — short-term backup power during outages.

40
Q

Q: What is the purpose of sensors and collectors in SIEM?

A

A: Sensors gather security data; collectors forward it to a SIEM for analysis and alerts.

41
Q

What is RADIUS?

A

(Remote Authentication Dial-In User Service)
Centralized authentication server, often used with EAP/802.1X.

42
Q

What is EAP?

A

A framework that supports various authentication methods (certs, passwords, smart cards).

Extensible Authentication Protocol

43
Q

What is LDAP?

A

(Lightweight Directory Access Protocol)
Used for directory services and authentication (e.g., Active Directory).

44
Q

What is 802.1X?

A

Standard for port-based network access control, enforces authentication.

45
Q

What is SSL/TLS ?

A

(Secure Sockets Layer / Transport Layer Security)

Encryption protocols for secure communication (e.g., HTTPS, SSL VPN).

46
Q

What is a WAF?

A

WAF (Web Application Firewall)

Filters HTTP/HTTPS traffic; protects web apps from injection attacks.