Architecture and Design Flashcards

1
Q

Which of the following allows the deployment of a publicly accessible web server without compromising the security of the private network?

Intranet

DMZ

Extranet

A

DMZ

A DMZ provides a network segment where publicly accessible servers can be deployed without compromising the security of the private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organization has a high-speed fiber Internet connection that it uses for most of its daily operations, as well as its offsite backup operations. This represents what security problem?

Single point of failure

Redundant connections

Backup generator

A

Single point of failure

Having only a single high-speed fiber Internet connection represents the security problem of a single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security template can be used to perform all but which of the following tasks?

Capture the security configuration of a master system

Apply security settings to a target system

Return a target system to its precompromised state

A

Return a target system to its precompromised state

A security template alone cannot return a system to its precompromised state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technique or method can be employed by hackers and researchers to discover unknown flaws or errors in software?

Dictionary attacks

Fuzzing

War dialing

A

Fuzzing

Fuzzing is a software-testing technique that generates input for targeted programs. The goal of fuzzing is to discover input sets that cause errors, failures, and crashes, or to discover other unknown defects in the targeted program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a security risk of an embedded system that is not commonly found in a standard PC?

Power loss

Access to the Internet

Control of a mechanism in the physical world

A

Control of a mechanism in the physical world

Because an embedded system is in control of a mechanism in the physical world, a security breach could cause harm to people and property. This typically is not true of a standard PC. Power loss, Internet access, and software flaws are security risks of both embedded systems and standard PCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To ensure that whole-drive encryption provides the best security possible, which of the following should not be performed?

Screen lock the system overnight.

Require a boot password to unlock the drive.

Lock the system in a safe when it is not in use.

A

Screen lock the system overnight.

An attack can steal the encryption key from memory, so systems with whole drive encryption that are only screen-locked are vulnerable. Requiring a boot password, locking the system, and powering down ensure the protection of whole drive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In order to avoid creating a monolithic security structure, organizations should adopt a wide range of security mechanisms. This concept is known as _______.

Defense in depth

Control diversity

Intranet buffering

A

Control diversity

Control diversity is essential in order to avoid a monolithic security structure. Do not depend on a single form or type of security; instead, integrate a variety of security mechanisms into the layers of defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When offering a resource to public users, what means of deployment provides the most protection for a private network?

Wireless

Honeynet

DMZ

A

DMZ

A demilitarized zone (DMZ) is a special-purpose subnet. A DMZ is an area of a network that is designed specifically for public users to access. If the DMZ (as a whole or as individual systems within the DMZ) is compromised, the private LAN isn’t necessarily affected or compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you are implementing a security monitoring system, what element is deployed in order to detect and record activities and events?

Correlation engine

Tap

Sensor

A

Sensor

A sensor is a hardware or software tool used to monitor an activity or event in order to record information or at least take notice of an occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When an enterprise is using numerous guest OSs to operate their primary business operations, what tool or technique can be used to enable communications between guest OSs hosted on different server hardware but keep those communications distinct from standard subnet communications?

VPN

SDN

EMP

A

SDN

Software-defined networking (SDN) is a unique approach to network operation, design, and management. A virtualized network or network virtualization is the combination of hardware and software networking components into a single integrated entity. SDN offers a new network design that is directly programmable from a central location, is flexible, is vendor neutral, and is open standards–based. Another way of thinking about SDN is that it is effectively network virtualization. It allows data transmission paths, communication decision trees, and flow control to be virtualized in the SDN control layer rather than being handled on the hardware on a per-device basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of OS is designed for public end-user access and is locked down so that only preauthorized software products and functions are enabled?

Kiosk

Appliance

Mobile

A

Kiosk

A kiosk OS is either a stand-alone OS or a variation of an NOS. A kiosk OS is designed for end-user use and access. The end user might be an employee of an organization or might be anyone from the general public. A kiosk OS is locked down so that only preauthorized software products and functions are enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When you need to test new software whose origin and supply chain are unknown or untrusted, what tool can you use to minimize the risk to your network or workstation?

Hardware security module

UEFI

Sandboxing

A

Sandboxing

Sandboxing is a means of quarantine or isolation. It’s implemented to restrict new or otherwise suspicious software from being able to cause harm to production systems. It can be used against applications or entire OSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the concept of a computer implemented as part of a larger system that is typically designed around a limited set of specific functions (such as management, monitoring, and control) in relation to the larger product of which it’s a component?

Application appliance

SoC

Embedded system

A

Embedded system

An embedded system is a computer implemented as part of a larger system. The embedded system is typically designed around a limited set of specific functions in relation to the larger product of which it’s a component. It may consist of the same components found in a typical computer system, or it may be a microcontroller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an industrial control system (ICS) that provides computer management and control over industrial processes and machines?

SCADA

HSM

OCSP

A

SCADA

Supervisory control and data acquisition (SCADA) is a type of industrial control system (ICS). An ICS is a form of computer management device that controls industrial processes and machines. SCADA is used across many industries, including manufacturing, fabrication, electricity generation and distribution, water distribution, sewage processing, and oil refining. A SCADA system can operate as a stand-alone device, be networked together with other SCADA systems, or be networked with traditional IT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which SDLC model is based around adaptive development where focusing on a working product and fulfilling customer needs is prioritized over rigid adherence to a process, use of specific tools, and detailed documentation?

Waterfall

Agile

Spiral

A

Agile

Agile is based around adaptive development, where focusing on a working product and fulfilling customer needs is prioritized over rigid adherence to a process, use of specific tools, and detailed documentation. Agile focuses on an adaptive approach to development, supports early delivery, and provides continuous improvement, along with flexible and prompt response to changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When an organization wishes to automate many elements and functions of IT management, such as development, operations, security, and quality assurance, they are likely to be implementing which of the following?

SCADA

UTM

DevOps

A

DevOps

DevOps, or development and operations, is a new IT movement where many elements and functions of IT management are being integrated into a single automated solution. DevOps typically consists of IT development, operations, security, and quality assurance

17
Q

What is not a cloud security benefit or protection?

CASB

SECaaS

VM sprawl

A

VM sprawl

VM sprawl occurs when an organization deploys numerous virtual machines without an overarching IT management or security plan in place. Although VMs are easy to create and clone, they have the same licensing and security management requirements as a metal installed OS. Uncontrolled VM creation can quickly lead to a situation where manual oversight is unable to keep up with system demand

18
Q

What form of cloud service provides the customer with the ability to run their own custom code but does not require that they manage the execution environment or operating system?

SaaS

PaaS

IaaS

A

PaaS

Platform as a service (PaaS) is the concept of providing a computing platform and software solution stack to a virtual or cloud-based service. Essentially, it involves paying for a service that provides all the aspects of a platform (that is, OS and complete solution package). A PaaS solution grants the customer the ability to run custom code of their choosing without needing to manage the environment

19
Q

What recovery mechanism is used to return a system back to a previously operating condition when a new software install corrupts the operating system?

Revert to known state

Roll back to known configuration

Live boot media

A

Revert to known state

Revert to known state is a type of backup or recovery process. Many databases support a known state reversion in order to return to a state of data before edits or changes were implemented. Some systems will automatically create a copy of a known state in order to provide a rollback option, whereas others may require a manual creation of the rollback point

20
Q

What type of security mechanism can be used to prevent a vehicle from damaging a facility?

Fencing

Lighting

Bollard

A

Bollard

Barricades, in addition to fencing (discussed earlier), are used to control both foot traffic and vehicles. K-rails (often seen during road construction), large planters, zigzag queues, bollards, and tire shredders are all examples of barricades. When used properly, they can control crowds and prevent vehicles from being used to cause damage to your building