701 - Section 3 Flashcards

1
Q

What document is used by cloud providers that defines the different responsibilities for all of the cloud offerings between the provider and the customer?

A

Responsibility matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is it called when you have more than one public and or private cloud?

A

Hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some security issues with a hybrid cloud?

A

Authentication across the different platforms, firewall configurations, server settings, diverse security monitoring, data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is it called when the servers network and application are all defined in configuration?

A

Infrastructure as code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the advantages with infrastructure as code?

A

The description can be used to build other application instances, and you can create multiple versions similar to application code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is it called when apps are separated into individual autonomous functions that removes the operating system from the equation?

A

Function as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A developer will create these FaaS as server-side logic and they are executed in what?

A

A stateless container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an API?

A

Application programming interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the glue for micros services which enable them to work together as an application?

A

APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are three advantages to micro services?

A

They are scalable, resilient, and offer security and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three advantages to micro services?

A

They are scalable, resilient, and offer security and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does VLAN stand for?

A

Virtual local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does VLAN stand for?

A

Virtual local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a VLAN do?

A

It separates networks logically instead of physically meaning communication cannot happen between the VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SDN stand for?

A

Software defined networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three layers of SDN?

A

Infrastructure/data plane, control layer/control plane, application layer/management plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In SDN, which layer processes, the network frames and packets does forwarding trunking encrypting and NAT?

A

Infrastructure layer/data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In SDN, which layer manages the actions of the data plan contains routing tables session, tables, and NAT tables?

A

Control layer/control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In SDN, which layer configures and manages the device?

A

Application layer/management plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An application container contains what?

A

Everything you need to run an application, including code and other dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does IOT stand for?

A

Internet of things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is another name for large scale multi industrial control systems?

A

SCADA, supervisory control and data acquisition system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some examples where SCADA is used?

A

Power generation, refining, manufacturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are some of the attributes for SCADA?

A

They are distributed, contain real time information, no external access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What type of operating system has a deterministic processing schedule?

A

RTOS, real time operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What kind of system has the hardware and software design for a specific function, that is built with only one task in mind? Give two examples

A

Embedded system, traffic, light controllers, medical imaging systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does high availability mean? And what does it take to achieve higher her availability?

A

Always on, always available… higher costs as you add different components to meet contingencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of application infrastructure uses a hypervisor and also has an operating system for each instance?

A

Virtualized applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What type of application infrastructure uses a docker?

A

Containerized applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is MTTR?

A

Mean time to repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are five infastructure considerations?

A

Availability, resilience, cost, responsiveness, scalability, ease of deployment, risk transference, ease of recovery, update schedule, power, processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which infrastructure consideration has the important metric of system up time?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which infrastructure consideration is commonly referenced as MTTR?

A

Resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which hardware consideration is defined by how much is required for initial installation, ongoing maintenance, replacement or repair cost, tax implications?

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which infrastructure consideration uses system speed as an important metric?

A

Responsiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which infrastructure consideration is defined by how quickly and easily we can increase or decrease capacity?

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which infrastructure consideration is defined by how easily updates are applied?

A

Ease of deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which infrastructure consideration uses cyber security insurance, recovery from internal losses, protection against legal issues from customers?

A

Risk transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which infrastructure consideration is defined by how easily the system will be made while after an issue?

A

Ease of recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which infrastructure consideration is defined by how frequent the system is maintained?

A

Patch availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which infrastructure consideration is defined by backup services such as UPS and generators?

A

Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which infrastructure consideration is defined by the applications ability to do heavy processing?

A

Computing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What simplifies security policy and is defined by the physical location or functional area of the network?

A

Security zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are three securities zones?

A

Internet, screened, inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the two failure modes for an IPS and what do they mean?

A

Fail open, which means when a system fails, the data continues to flow… fail closed, which means when a system fails, the data does not flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the difference between an IPS and an IDS?

A

Both watch network traffic, and IP stops an attack before it gets into the network while and IDS sends an alarm or an alert when an attack is detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

what is the difference between active monitoring and passive monitoring?

A

With active monitoring, the device will deny passage of the traffic when it detects an attack… with passive monitoring, the device will allow data to pass through it and it will send a copy of the traffic to the IDS or IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What network appliance provides access to a protected network? And what is the security concern with it?

A

Jump server, if it is compromised, it can lead to a significant breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is used to connect to the jump server?

A

SSH, a tunnel, a VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What network appliance sits between the users and the external network, it receives user requests and sends their request on their behalf,

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are some of the uses of a proxy server?

A

Cashing, access control, URL filtering, content scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What type of proxy server is used to protect and control user access to the Internet?

A

A forward proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What type of proxy server is used to protect and control user access to the Internet?

A

A forward proxy

54
Q

What type of proxy server sits between an internal server and the Internet?

A

A reverse proxy

55
Q

What type of proxy is not controlled and is operated by a third-party and is often used to circumvent existing security controls?

A

An open proxy

56
Q

What type of proxy is very commonly used and understands the way an application works?

A

An application proxy

57
Q

What is used to distribute requests across multiple servers, is used in large scale implementation like Web server farms and is fault tolerant?

A

Load balancers

58
Q

What type of load balancing offers TCP offload, SSL offload, cashing, prioritization, and content switching?

A

Active/active load balancing

59
Q

What is used to collect and aggregate information from network devices?

A

Collectors and sensors

60
Q

What does EAP stand for and what is it?

A

Extensible authentication protocol and it is an authentication framework

61
Q

What standard does EAP integrate with?

A

802.1X

62
Q

What is the principle for EAP 802.1x?

A

No access to the network until authentication succeeds

63
Q

What are the three principles of 802.1X and EAP?

A

Supplicant or the client, the authenticator, which is the device that provides access and the authentication server which validates the client credentials

64
Q

What are the two ways that a firewall can filter traffic? And what OSI layers are they?

A

By port number layer 4 or by application layer 7

65
Q

Most firewalls can also perform this function…

A

Router

66
Q

What is NAT?

A

Network address translation

67
Q

What is a another name for a firewall that also serves as an all-in-one security appliance?

A

UTM, unified threat management

68
Q

What does NGFW mean?

A

Next generation firewall

69
Q

What does an NGFW do with network traffic?

A

It inspects every packet and categorizes them before a security decision is determined

70
Q

What does an NGFW control traffic based on?

A

Applications

71
Q

What other function does NNGFW perform? And how does it do that?

A

Intrusion prevention, by applying application specific vulnerability signatures to the traffic

72
Q

What is a WAF? And how does it work?

A

Web application firewall… it allows or denies traffic based on an expected input. Unexpected input is a common method of exploiting an application.

73
Q

What function does a VPN perform? And what is another name for that VPN channel?

A

It encrypts data traversing a public network… a tunnel

74
Q

What protocol does a SSL/TLSVPN use

A

SSL/TLS

75
Q

What are three advantages to an SSL/TLS VPN?

A

No big VPN clients, no requirement for digital certificates or shared passwords for authentication, can run from a browser or other light VPN client across many operating systems

76
Q

What software configuration does a site to site IPsec VPN use?

A

VPN concentrators on both sides, usually firewalls serve this purpose

77
Q

What does a VPN concentrator do? And what is it often integrated with?

A

It will encrypt outgoing traffic and decrypt incoming traffic as it has it passes through…the firewall

78
Q

What does a VPN concentrator do? And what is it often integrated with?

A

It will encrypt outgoing traffic and decrypt incoming traffic as it has it passes through…the firewall

79
Q

What is an SD-WAN? And what infrastructure is it built for?

A

Software defined networking in a wide area network it is built for the cloud

80
Q

What does SASE stand for?

A

Secure access service edge… it is a complete network and security solution that provides secure, and efficient access to applications and data, regardless of their location

81
Q

What are three components of SASE?

A

Network as a service, security as a service, SASE client on all devices

82
Q

What is the data type that is managed by a third-party and governed by laws and statues?

A

Regulated

83
Q

What is the data type that is often unique to an organization and includes an organizations secret formulas?

A

Trade secret

84
Q

What is the data type that includes copyright and trademark restrictions?

A

Intellectual property

85
Q

What is the data type that includes court records and documents, PII and other sensitive details?

A

Legal information

86
Q

What is the data type that contains internal company details, customer, sensitive data, payment records?

A

Financial information

87
Q

What is the data type that is not easily understood by humans and includes barcode and images?

A

Non-human readable

88
Q

What are three data classifications?

A

Organization proprietary, PII, PHI

89
Q

Why are different levels of security classifications applied to data?

A

They are classified because of the sensitive nature of the data… The more sensitive the data is the higher the classification level and the controls placed on it

90
Q

What are the three states of data?

A

Data at rest, data in transit, data in use

91
Q

What are three methods to encrypt data at rest?

A

Whole disk, database file or folder level

92
Q

What protocols are used to encrypt data in transit?

A

TLS and IPsec

93
Q

What is data sovereignty?

A

Data that resides in a country is subject to the laws of that country

94
Q

What is GDPR?

A

General data protection regulation… It is a complex mesh of technology and legalities regarding data collected on EU citizens

95
Q

What is the name for attaching a location Details to data?

A

Geolocation

96
Q

What are the three types of UPS?

A

Off-line or standby, line interactive, online or double conversion

97
Q

This type of UPS is lower in cost and lower in backup time it can provide?

A

Offline or Standby

98
Q

This type of UPS is useful in areas that have brownouts?

A

Line interactive

99
Q

What can be used to provide long-term power back up?

A

A generator

100
Q

What are the three types of geographic restrictions for wireless
Communications?

A

By network location which is based on the IP subnet, Geo location, Geo fencing

101
Q

What are the three types of Geo location and what is their accuracy?

A

GPS very accurate, 802.11 wireless less accurate, by IP address not not very accurate

102
Q

What is it called when you are automatically allowed or restricted access when in a particular location?

A

Geo fencing

103
Q

With this type of data protection, everything is encoded into an unreasonable form and will need a key for it to be read?

A

Encryption

104
Q

In this form of data protection, the represented data is converted into a short string of text that is impossible to be reversed engineered?

A

Hashing

105
Q

In this form of data protection, we are converting normally readable text into something very difficult to understand?

A

Obfuscation

106
Q

In this form of data protection, some of the original data is hidden or masked?

A

Masking

107
Q

And this form of data protection, sensitive data is replaced with a nons sensitive placeholder, and this is commonly used with credit card processing?

A

Tokenization

108
Q

In this form of data protection, the data is separated and stored in different locations?

A

Segmentation

109
Q

In this form of data protection, access to an account is controlled?

A

Permission restrictions

110
Q

In this form of resiliency, two or more servers are combined and appear to operate as one?

A

Server clustering

111
Q

In this type of resiliency, traffic is distributed across multiple servers that also can be running different operating systems?

A

Load balancing

112
Q

With this type of resiliency, a recovery site is prepped, and #DATA is synchronized?

A

Site resiliency

113
Q

With this type of resiliency, an exact replica of software, data and hardware are maintained?

A

A hot site

114
Q

With this type of resiliency, only a physical site may be chosen, meaning no duplicate hardware software or data is maintained

A

A cold site

115
Q

With this type of resiliency, a physical site and the hardware needed to run the system is ready and waiting?

A

A warm site

116
Q

With this type of resiliency, different types of systems are used to run the same application as the risk is distributed across these different environments?

A

Platform diversity

117
Q

With this type of resiliency, more than one cloud system may be used to spread out the risk?

A

Multi cloud system

118
Q

What is the disaster planning called?

A

Continuity of operations planning, COOP

119
Q

What is it called when you are trying to identify the right balance of hardware software and people to build the best infrastructure?

A

Capacity planning

120
Q

What are the three considerations in capacity planning?

A

People, technology (pick one that will scale easily), infrastructure

121
Q

What is it called to test yourself before an actual event occurs?

A

Recovery testing

122
Q

Because a full scale disaster drill can be costly and time-consuming, companies will perform these with key team members and talk through a simulated disaster?

A

Table top exercise

123
Q

What is it called when a company will build redundant infrastructure that will be used when something negatively impacts the system?

A

Failover

124
Q

What is it called when you split a process through multiple/parallel CPUs?

A

Parallel processing

125
Q

What kind of back up is immediately available and generally less expensive?

A

On site

126
Q

What kind of back up transfers, data over an Internet or WAN Link?

A

Offsite back up

127
Q

What do organizations use to protect a back up from being easily readable?

A

Encryption

128
Q

This type of backup became popular with virtual machines and contains a copy of an entire system?

A

A snapshot

129
Q

What is the type of back up that is almost real time, ongoing, and keeps #DATA synchronized in multiple locations?

A

Replication

130
Q

What type of back up writes the data into a predefined location prior to writing that data to storage?

A

Journaling