701 - Chapter 5 Flashcards
What is the software that creates runs and manages VMs?
Hyper visor
The physical system hosting the VM is called what? The operating systems running on the on the above system are called what
Host…Guest
What is the term for the ability to resize the computing capacity of the VM?
Cloud scalability
What refers to the ability to dynamically change resources assigned to the VM based on the load?
Cloud elasticity
What is a computer with enough resources to boot and connect to a server to run specific applications or desktops called?
Thin client
What hosts a users desktop operating system on a server?
Virtual desktop infrastructure, VDI
What is a type of virtualization that run services or applications within isolated containers or application cells?
Containerization
What is an advantage of containerization and a disadvantage?
It uses fear resources and can be more efficient, but the container must use the same operating system as the host
What is an attack that allows an attacker to access the host system from within a virtual guest system? And what is the best way to prevent against it?
VM escape…keeping the system up to date with patches
What is when an organization has many VMs that aren’t appropriately managed?
VM sprawl
What refers to the potential for data or resources to remain on a shared infrastructure even after they are no longer needed, making them potentially accessible to other users?
Resource reuse
What are four common categories of endpoint security software?
Antivirus software, end point detection and response EDR, extended detection and response XDR, host intrusion prevention systems HIPS
What is the practice of making an operating system or application more secure from its default installation? It helps eliminate vulnerabilities from default configurations misconfiguration, and weak configurations.
Hardening
These practices help organizations deploy systems with secure configurations and enforce requirements that those secure configurations remain in place?
Configuration management
What are the three steps to using a baseline?
Establish an initial baseline configuration, deploy the baseline, maintain the baseline
One of the most common methods of deploying systems is with images starting with what?
A Master image
What are two important benefits of imaging?
Secure starting point and reduced cost
What are the procedures that ensure operating systems, applications and firmware or up-to-date with current patches? And what does this do?
Patch management procedures… it protects systems against known vulnerabilities
What defines the process and accounting structure for handling modification and upgrades? and what is the goal?
Change management… To reduce risks related to unintended outages and provide documentation for all changes
What is a list of applications authorized to run on a system?
An application allow list sometimes called a white list
This is a list of applications that the system will block from installing and executing?
Application block list or blacklist
Which is more restrictive a whitelist or a blacklist?
A white list
What protects all of the contents of a desk using encryption called? This may be done with specialized software or be done using specialized hardware known as what?
Full disk encryption, FDE… self encrypting drives SED
What is it called when the operating system goes through enough of the boot process to verify the integrity of the operating system and boot loading systems? And what does it do if it identifies an issue?
A measured boot… the system will halt the process and not come up
What is the hardware chip on a computers motherboard that stores cryptographic keys used for full disk encryption?
A trusted platform module TPM
What is the name of the processes that TPM supports for secure boot? And how does it work?
Boot attestation… The TPM will capture signatures of key files used to boot the computer and stores a report of the signature securely within the TPM. when the system boots, the secure boot process will compare the files against what is stored in the TPM
What is the name of the boot attestation process that occurs but not on the local system called?
Remote attestation
The TPM has what burned into it? What is it called? And what does this key provide?
A unique encryption key… the endorsement key… It provides hardware root of trust otherwise known as a known secure starting point
In addition to encryption, secure boot and remote attestation, what other services does TPM provide
It can generate store and protect other keys used for encrypting and decrypting discs
What is a removable or external device that can generate, store and manage keys used in asymmetric encryption? And how do these differ from a TPM?
A hardware security module HSM.. one of the main differences is that the HSM is a removable or an external device
What is a common platform and usage for an HSM?
A high performance server will use HSM to store and protect keys
What is the name of the card that includes an HSM?
A microSD HSM
What is the process of retiring and cleaning of hardware via established procedures, and guidelines called?
Decommissioning
What is the unauthorized transfer of data outside an organization called? And what do organizations do to block and prevent this loss of data?
DATA X filtration… Data loss prevention, DLP techniques and technologies…
what are some examples of DLP techniques?
Blocking the use of USB flash drives, controlling the use of removable media, and examining outgoing data transfers
In addition to #DATA, what else can DLP Systems scan? Can DLP scan encrypted data.
Emails, FTP and HTTP traffic… no, but they can be configured to look out for outgoing encrypted data
What are the two primary methods of protecting the confidentiality of data? What is used to encrypt individual fields within a database called?
Encryption and strong access control… database column encryption
What are the two options for database encryption?
Full database encryption and column or row encryption
What refers to data that is currently being processed or access by system or application?
DATA in use
What is a type of security technology that provides a secure and isolated area within a system or application for processing sensitive data called?
Secure enclave, also known as trusted execution environment TEE
What are the three main cloud delivery models?
Software as a service, platform as a service, infrastructure as a service
Which cloud delivery model includes any software or application provided to us users over a network such as the Internet?
Software as a service
Which cloud delivery model provides customers with a pre-configured computing platform they can use as needed? And what is another name for this?
Platform as a service… a managed hardware solution