701 - Chapter 5 Flashcards

1
Q

What is the software that creates runs and manages VMs?

A

Hyper visor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The physical system hosting the VM is called what? The operating systems running on the on the above system are called what

A

Host…Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the term for the ability to resize the computing capacity of the VM?

A

Cloud scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What refers to the ability to dynamically change resources assigned to the VM based on the load?

A

Cloud elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a computer with enough resources to boot and connect to a server to run specific applications or desktops called?

A

Thin client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What hosts a users desktop operating system on a server?

A

Virtual desktop infrastructure, VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a type of virtualization that run services or applications within isolated containers or application cells?

A

Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an advantage of containerization and a disadvantage?

A

It uses fear resources and can be more efficient, but the container must use the same operating system as the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an attack that allows an attacker to access the host system from within a virtual guest system? And what is the best way to prevent against it?

A

VM escape…keeping the system up to date with patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is when an organization has many VMs that aren’t appropriately managed?

A

VM sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What refers to the potential for data or resources to remain on a shared infrastructure even after they are no longer needed, making them potentially accessible to other users?

A

Resource reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are four common categories of endpoint security software?

A

Antivirus software, end point detection and response EDR, extended detection and response XDR, host intrusion prevention systems HIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the practice of making an operating system or application more secure from its default installation? It helps eliminate vulnerabilities from default configurations misconfiguration, and weak configurations.

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These practices help organizations deploy systems with secure configurations and enforce requirements that those secure configurations remain in place?

A

Configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three steps to using a baseline?

A

Establish an initial baseline configuration, deploy the baseline, maintain the baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One of the most common methods of deploying systems is with images starting with what?

A

A Master image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are two important benefits of imaging?

A

Secure starting point and reduced cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the procedures that ensure operating systems, applications and firmware or up-to-date with current patches? And what does this do?

A

Patch management procedures… it protects systems against known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What defines the process and accounting structure for handling modification and upgrades? and what is the goal?

A

Change management… To reduce risks related to unintended outages and provide documentation for all changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a list of applications authorized to run on a system?

A

An application allow list sometimes called a white list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is a list of applications that the system will block from installing and executing?

A

Application block list or blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which is more restrictive a whitelist or a blacklist?

A

A white list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What protects all of the contents of a desk using encryption called? This may be done with specialized software or be done using specialized hardware known as what?

A

Full disk encryption, FDE… self encrypting drives SED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is it called when the operating system goes through enough of the boot process to verify the integrity of the operating system and boot loading systems? And what does it do if it identifies an issue?

A

A measured boot… the system will halt the process and not come up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the hardware chip on a computers motherboard that stores cryptographic keys used for full disk encryption?

A

A trusted platform module TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the name of the processes that TPM supports for secure boot? And how does it work?

A

Boot attestation… The TPM will capture signatures of key files used to boot the computer and stores a report of the signature securely within the TPM. when the system boots, the secure boot process will compare the files against what is stored in the TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the name of the boot attestation process that occurs but not on the local system called?

A

Remote attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The TPM has what burned into it? What is it called? And what does this key provide?

A

A unique encryption key… the endorsement key… It provides hardware root of trust otherwise known as a known secure starting point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In addition to encryption, secure boot and remote attestation, what other services does TPM provide

A

It can generate store and protect other keys used for encrypting and decrypting discs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a removable or external device that can generate, store and manage keys used in asymmetric encryption? And how do these differ from a TPM?

A

A hardware security module HSM.. one of the main differences is that the HSM is a removable or an external device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a common platform and usage for an HSM?

A

A high performance server will use HSM to store and protect keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the name of the card that includes an HSM?

A

A microSD HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the process of retiring and cleaning of hardware via established procedures, and guidelines called?

A

Decommissioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the unauthorized transfer of data outside an organization called? And what do organizations do to block and prevent this loss of data?

A

DATA X filtration… Data loss prevention, DLP techniques and technologies…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what are some examples of DLP techniques?

A

Blocking the use of USB flash drives, controlling the use of removable media, and examining outgoing data transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

In addition to #DATA, what else can DLP Systems scan? Can DLP scan encrypted data.

A

Emails, FTP and HTTP traffic… no, but they can be configured to look out for outgoing encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the two primary methods of protecting the confidentiality of data? What is used to encrypt individual fields within a database called?

A

Encryption and strong access control… database column encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the two options for database encryption?

A

Full database encryption and column or row encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What refers to data that is currently being processed or access by system or application?

A

DATA in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a type of security technology that provides a secure and isolated area within a system or application for processing sensitive data called?

A

Secure enclave, also known as trusted execution environment TEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the three main cloud delivery models?

A

Software as a service, platform as a service, infrastructure as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which cloud delivery model includes any software or application provided to us users over a network such as the Internet?

A

Software as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which cloud delivery model provides customers with a pre-configured computing platform they can use as needed? And what is another name for this?

A

Platform as a service… a managed hardware solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are some of the features that platform as a service provides?

A

Installed operating system, a core software package for web servers, antivirus software and spam protection

45
Q

What is the cloud delivery model that allows an organization to outsource its equipment requirements, including the hardware and all support operations? What is another name for this?

A

Infrastructure as a service… a self managed platform

46
Q

What are the four cloud deployment models?

A

Public cloud, private cloud, community cloud, hybrid cloud

47
Q

Which of the cloud models make services available to any customer who wishes to use them?

A

Public cloud

48
Q

Which of the cloud models are available for only one organization?

A

Private cloud

49
Q

Which of the cloud models allows, two or more organizations with shared concerns to share the cloud?

A

Community cloud

50
Q

And what cloud model is a combination of two or more different cloud deployment models?

A

Hybrid cloud

51
Q

What cloud system combines the resources from two or more cloud service providers? What is it an advantage and what is a disadvantage of these?

A

Multi cloud system… an advantage is that it increases resiliency and redundancy…. He disadvantage is that it adds cost and increases the risk of mistakes.

52
Q

What is a software component that gives developers access to features or data within another application service or operating system called?

A

An application programming interface API

53
Q

True or false APIs are susceptible to attacks?

A

True

54
Q

What are three things that developers need to address in order to ensure that their API is not vulnerable to common exploits?

A

Authentication, authorization, transport level security

55
Q

What are code modules designed to do one thing very well? They are typically small code modules that receive values, process them, and respond with an output.

A

Micro services

56
Q

What is a difference between an API and a microservice?

A

An API is generally tied to a specific business whereas a micros service is not

57
Q

What is a third-party vendor that provides security services for smaller companies called?

A

A managed security service provider MSSP

58
Q

What is a vendor that provides any IT services needed by an organization called

A

A managed service provider MSP

59
Q

What is the entity that offers one or more cloud services via one or more cloud deployment models called?

A

A cloud service provider, CSP

60
Q

In a cloud environment, what is the software called that is added to an operating system to extend its basic capabilities called?

A

Middleware

61
Q

Within the cloud models, from least responsible to most responsible for customers, what are they?

A

Software as a service platform as a service, infrastructure as a service

62
Q

What are the six cloud security issues that an organization needs to consider when picking a CSP?

A

Availability, resilience, cost, responsiveness, scalability, segmentation

63
Q

Which of the cloud security issues indicates a system or service remaining operational with almost 0 downtime? And how is it typically achieved?

A

Availability… By using multiple load balancing notes

64
Q

Which of the cloud security issues refers to the ability of a system to maintain its functionality, even when faced with adverse conditions or unexpected events? And how is this achieved?

A

Resilience… By implementing redundancy and fail over mechanisms

65
Q

Which of the cloud security issues refers to the speed with which a cloud service can respond to request and perform tasks? And how is this typically achieved?

A

Responsiveness… By using cashing, load balancing and other techniques

66
Q

Which of the cloud security issues refers to the ability of a cloud service to handle increased amounts of data, traffic, and other user requests without degradation and performance, and how is this achieved?

A

Scale ability… It is achieved through the use of elastic computing resources and auto scaling mechanisms that can dynamically all allocate resources

67
Q

Which of the cloud security issues refers to the isolating of sensitive data and applications from other parts of the cloud network?

A

Segmentation

68
Q

In this type of cloud solution, the organization retains complete control over all the cloud-based resources, including any data stored?

A

On premises

69
Q

With this cloud security control,
This is a software solution or service deployed between an organizations network and the cloud provider, it provides security by monitoring traffic and enforcing security policies?

A

Cloud access security broker CASB

70
Q

With this cloud security control,
What can enforce security policies for data stored in the cloud such as ensuring that PII data is encrypted?

A

Cloud based DLP

71
Q

With this cloud security control, this is a combination of a proxy server and a stateless firewall and it filters traffic to prevent threats from infiltrating the network? what are some of the services provided by it?

A

Next generation secure web Gateway… URL filtering, packet filtering, malware, detection, DLP, sandboxing

72
Q

What offers you the ability to write cloud firewall rules that affect only your resources?

A

Security groups

73
Q

This refers to managing and provisioning data centers with code to define VM’s and virtual networks. It reduces complexity of creating virtual objects by allowing administrators to run a script to create them, which are also reusable?

A

Infrastructure as code IAC

74
Q

This is a cloud solution that uses virtualization technologies to route traffic instead of using hardware, routers and switches?

A

Software defined networking

75
Q

What is an SDN on a wide area network to connect different sites together called?

A

Software defined wide area network SD-WAN

76
Q

What is the practice of storing and processing data on a single node or device that is close to the device that generate and uses the data? And what is using a network close to that device that may have multiple node sensing and processing data within this network called

A

Edge computing…fog computing

77
Q

What is a knot for profit member-based organization that promotes best practices related to the cloud?

A

The cloud security alliance CSA

78
Q

What is it called when a corporation purchases and issues devices to employees but allows them to be used for personal activities. In addition to work?

A

Corporate owned personally enabled COPE

79
Q

What are the two own your own device policies that organizations use for employees connecting wireless devices to their network ? Which one is a bit more safer for the organization?

A

Bring your own device BYOD and choose your own device CYOD… CYOD

80
Q

What are the three methods that mobile devices used to connect to networks and other devices?

A

Cellular, Wi-Fi, Bluetooth

81
Q

What tool helps enforce security policies on mobile devices?

A

Mobile device management MD M

82
Q

What are four hardening techniques for mobile devices?

A

Storage segmentation, containerization, full device encryption, using strong encryption

83
Q

This MDM solution can restrict what applications can run on mobile devices?

A

Application management

84
Q

This MDM solution protects the device against loss of confidentiality?

A

Full device encryption

85
Q

This MDM solution Isolates data stored on the device?

A

Storage segmentation

86
Q

This MDM solution ensures that only appropriate stuff is stored In a segmented storage space?

A

Content management

87
Q

This MDM solution isolates and protects the application, including any of its data?

A

Containerization

88
Q

This MDM solution employees a something you know by the user?

A

Passwords and PINs

89
Q

This MDM solution send a signal to a lost or stolen device to race all of its data?

A

Remote wipe

90
Q

This MDM solution can help locate a lost or stolen device?

A

Geolocation

91
Q

This MDM solution create a virtual fence or geographic boundary and can be used to detect when a device is within an organizations property?

A

Geo fencing

92
Q

This MDM solution add geographical data to file such as pictures?

A

GPS tagging

93
Q

This MDM solution uses multiple elements to authenticate a user and a mobile device?

A

Context aware authentication

94
Q

What refers to removing all software restrictions from an iPhone device? And what is the process of modifying an android device to give the user root level access to the device?

A

Jailbreaking and rooting

95
Q

What is the firmware on a mobile device? and how is the firmware updated?

A

The onboard memory which stores the operating system, known as flash memory it retains data without power… it uses over the air update techniques OTA

96
Q

What is another way to overwrite a mobile devices firmware?

A

With custom firmware

97
Q

Another way to install application on android devices by copying an application package in the application packet kit format, and activating it?

A

Side loading

98
Q

A mobile device manager can limit these two pieces of hardware on a mobile device to eliminate the risk of spying via the device?

A

Disabling the camera and microphone

99
Q

What to methods allow devices to access the Internet and bypass network controls?

A

Tethering and mobile hotspots

100
Q

What is a standard that allows devices to connect without a wireless access point or wireless router?

A

Wi-Fi direct

101
Q

True or false MDM tools can block access to devices using tethering mobile hotspots or Wi-Fi direct to access the Internet

A

True

102
Q

What is any device that has a dedicated function and uses a computer system to perform that function? What are some examples of embedded systems?

A

An embedded system… medical devices, automobiles, aircraft, and unmanned aerial vehicles

103
Q

What is the wide assortment of technologies that interact with the physical world that commonly have embedded systems and typically connect to a central device or app and communicate via the Internet?

A

Internet of things IoT

104
Q

What refers to systems within large facilities such as power plants or water treatment facilities?

A

An industrial control system I see S

105
Q

What type of system has embedded systems that control an ICS?

A

A supervisory control and data acquisition system SCADA

106
Q

This key component of embedded systems integrates many components of a computer system onto a single chip, including the processor, memory input output, interfaces, and other components?

A

System on a chip SOC

107
Q

This key component of embedded systems is a specialized operating system design for embedded systems that requires precise timing, real time scheduling, and deterministic behavior?

A

Real time operating system RTOS

108
Q

What hardening technique is effective for embedded systems, Internet of thing devices and ICS/SCADA systems?

A

Placing them on a segmented network where they are tightly locked down and protected from external attack

109
Q

What are some of the constraints that limits the use of embedded systems?

A

Limited computing ability, cryptographic limitations, power, limitations, ease of deployment, cost, and ability to patch/patch availability