Architecture and Design Flashcards

1
Q

The primary reason nicknames are not allowed in naming conventions?

A

Is because they do not properly identify the user and make the user’s actions more anonymous and less auditable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a honeynet?

A

It is a group of honeypots that mimic the functionality of a network. Once the honeynet has been penetrated by the attacker, administrators can observe the actions and gather information on the event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a honeypot?

A

It is a server that is intentionally left open or available, so that an attacker will be drawn to it versus a live network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a mantrap?

A

is a physical security control designed to control access to secure areas. Mantraps provide the capability to lock a single person in an area if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a cold site?

A

A cold site is an alternate location where a network can be rebuilt after a disaster has occurred. A cold site can take some time to implement, as systems and assets (including data) are not readily configured and available for full use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a warm site?

A

A warm site is a dormant alternate location, or a location that performs noncritical functions under normal conditions, but can be rapidly converted to a main operations site with minimal effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a hot site?

A

A hot site is a fully configured alternate network that can be quickly brought online after a disaster. With a hot site, systems and data are usually up-to-date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a standard naming convention?

A

A standard naming convention is a defined set of rules for choosing the character sequence to be used for identification in coding. A standard naming convention reduces the effort in code reviews and programming error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Code signing?

A

Code signing is a certificate-based digital signature to sign executables. It proves authentication and integrity but is not applicable to this situation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Hardware Security Module (HSM) ?

A

A Hardware Security Module (HSM) is a device used to generate, maintain and store cryptographic keys. It can be an external device and can easily be added to a system. The HSM will maintain the integrity of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a The Trusted Platform Module (TPM)?

A

is a hardware-based encryption solution that is embedded in the system and provides secure key storage for full disk encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a hardware root of trust?

A

Is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is “data at rest”?

A

Means that the data is in some sort of persistent storage media. Examples of data include financial information stored in databases, archived audiovisual media, system configuration data, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is “data in transit”?

A

Is when data is transmitted over a network. The data can be sent over the WAN to its final location through a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is “data in use” state?

A

It’s present in volatile memory, such as system RAM or CPU cache. Examples of types of data may be an open document in a word processing application or a database data that is currently being modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Tokenization?

A

is a database de-identification method where all or part of data in a field is substituted with a randomly generated token. The token is stored with the original value separate to the production database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does Data sovereignty describe?

A

Data sovereignty describes the sociopolitical outlook of a nation concerning computing technology and information.

Some nations may respect data privacy more or less than others. Care needs to be considered when storing such data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many characters are in md5 hash?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Software Defined Network (SDN)

A

It separates data and control planes in a network. It uses virtualization to route traffic to its intended destination, instead of using proprietary hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is edge computing?

A

It’s a distributed model that is accomplished at or near the source of the data where it is needed. These devices perform early processing of data to and from edge devices to enable prioritization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Fog computing?

A

Fog computing is the placement of a node or nodes for processing resources close to the physical location of Internet of things (IoT) sensors.

The fog node prioritizes traffic, analyzes and remediates conditions, and backhauls remaining data to the data center for storage and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Virtualization sprawl?

A

Virtualization sprawl is a phenomenon that occurs when the number of VM’s on a network reaches a point where the administrator can no longer manage them effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Type 1 hypervisor?

A

Type 1 hypervisors run directly on hardware system hardware. They do not require operating system involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does Platform as a Service (PaaS) provide?

A

Platform as a Service (PaaS) provides pre-configured environments for developing and managing environments. The service provides on-demand computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Elasticity?

A

Elasticity is the ability to resize an environment based on the load. Elasticity is a part of virtualization and can reduce costs. A user can increase or decrease resources as necessary. It is commonly used with cloud technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What do Integrity measurements do?

(network)

A

Integrity measurements are done to identify baseline deviations.

Automated tools continuously monitor the system for any baseline changes. If changes are found, Group Policy will force the system back to its original state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Continuous deployment?

A

Continuous deployment is the process of delivery of software to a production environment using automation, which reduces the software development lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Continuous delivery?

A

Continuous delivery is an agile software engineering approach that allows for the building, testing, and releasing of software with greater speed and frequency.

This provides the customer a continuous product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Continuous integration?

A

Continuous integration is the process of merging code changes into a central repository where the software is then built and tested on a continuous basis in development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is DevSecOps?

A

DevSecOps is an agile-like process that continually focuses on security. It also demands continuous interaction between stakeholders but keeps security as a focus throughout the development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Normalization in databases?

A

Normalization is used to optimize database performance by removing duplicates, use of primary keys, and related data contained in separate tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Server-Side Validation?

A

Server-side validations occur on the web server or back-end and take more time to complete. Validation on the server side is more secure than client-side validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does Version Control do?

A

Version control tracks the versions of software in real-time. It will record who has accessed the code, and what was changed. Version Control also allows for rollback if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Change management?

A

Change management is a process that follows a change to a system from identification to implementation. It is used for controlled identification and implementation of required changes within a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Provisioning?

A

Provisioning is the process of procuring, configuring and making available, an application or system on certain services. Provisioning an application allows it to run on its intended platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Security Automation?

A

As new code is introduced to an application, security testing is important to check for bugs and vulnerabilities. Automating security testing ensures defects are not introduced in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the ateps Software Development Life Cycle (SDLC) of a project?

A

The software development lifecycle (SDLC) of a project consists of the following attributes: defining requirements, design, implementation, verification, and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is Model verification?

A

Model verification is testing to ensure the software meets the customers functional and physical requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are Stored Procedures?

A

A stored procedure is a set of Structured Query Language (SQL) statements stored in a database as a group, so it can be reused and shared by multiple programs.

Stored procedures can validate input.

40
Q

What is a State Table?

A

A state table contains information about sessions between network hosts. This type of data is gathered by a stateful firewall.

41
Q

What is Scalability?

A

Scalability is the capacity to increase the workload on current resources.

42
Q

What can we say about Iris scanning?

A

Iris scanning can be implemented in higher-traffic areas, where throughput is a concern. At the same time, accuracy is high, while ease of spoofing is fairly low. The enrollment process for employees is less intrusive than retinal scans.

43
Q

What can we say about Retinal scanners?

A

Retinal scanners are intrusive, complex and expensive. They are not the best option for high-traffic areas, such as airports.

44
Q

Name a situation in which Voice recognition would have a disadvantage?

A

Voice recognition would be too difficult to implement in a situation with high levels of ambient noise in a busy place like an airport.

45
Q

What can we say about Fingerprint scanners?

A

Fingerprint scanners offer ease of enrollment, but in this high traffic area, it would be difficult to ensure the scanner remains clean and dry for hundreds of employees.

relatively easy to forge and has stigma to criminal activity.

46
Q

Time synchronization do for One time Passwords?

A

Time synchronization adds an additional layer of safety, with time-based one-time password algorithm (TOTP). Devices must be synchronized to the server so the timestamp is accurate and timing algorithm on the OTP is activated at the appropriate time, when the OTP is issued.

47
Q

How do Signature recognition technologies match how the user applies their signature?

A

Signature recognition technologies match how the user applies their signature, analyzing aspects such as stroke, speed, and pressure, making it more difficult to spoof than a simple forgery.

48
Q

What can we say about Point-by-point signature matching?

A

Point-by-point signature matching only measures how consistent a signature is with a template signature, and as a result, could be easily forged.

49
Q

What is Pattern matching technology?

A

Pattern matching technology is associated with typing as a behavioral technology, matching the speed and pattern of user input.

50
Q

What is crossover error rate?

What is it important for?

A

The crossover error rate is where false rejection rate and false acceptance rate meet.

This figure is important for optimizing and fine-tuning the biometric system.

51
Q

What is Throughput in biometrics?

A

Throughput is an important consideration in the location a biometric scanner is installed, as chokepoints could become an issue in areas of high traffic, causing other security issues.

52
Q

What is False acceptance rate?

A

False acceptance rate is the rate at which a system lets unauthorized users in, which constitutes a security breach.

53
Q

What is a type II error or false positive? what is it measured by?

A

A type II error is also known as a false positive, measured by the False Acceptance Rate (FAR). This is the rate at which unauthorized personnel gain access to the secure facility. This number must be minimized.

54
Q

What is Revocability in Biometrics?

A

Revocability is an issue with all biometric factors, but because fingerprint scanning technology is cheaper in comparison to other technologies, accessing and revoking certificates is also easier to do.

55
Q

What is a Distinguished Name (DN)

A

Directory Services provide privilege management and authorization to a network by storing user information such as groups, roles, and services allowed into a Distinguished Name (DN). Directory services are used to structure user management and implement access security

56
Q

What is Rule-based access control (RBAC)?

A

Rule-based access control (RBAC) is an access control model that is based upon a predefined set of rules and instructions, such as Access Control Lists (ACL) to grant access to a system.

57
Q

What is Credential management?

A

Credential management is the use of a collection of user information that provides the identity of a user combined with a password.

58
Q

What is rate of return (RoR)

A

is considered the net gain or loss of an investment over a specified period of time and generally expressed as a percentage of the initial cost.

59
Q

What is Clustering?

A

Clustering provides for high availability for servers and can remove the single point of failure. Clustering is similar to load balancing but is more costly than RAID implementations.

60
Q

Define Redundant array of inexpensive disks (RAID)-10?

Minimum disks requirements?

A

Combines mirroring and striping in a single system. It delivers better write performance than any other RAID level providing data protection.

RAID 10 requires a minimum of four disks.

61
Q

Define RAID-6

A

RAID-6 requires four disks and can survive a failure on two.

62
Q

Define RAID-1

A

Provides data that is written to two disks simultaneously, providing redundancy in the event one disk fails.

63
Q

What is Control Diversity?

A

Control diversity includes the use of multiple control types such administrative, technical and physical.

This can include security guards (physical), IDS or Intrusion Detection System (technical), and penetration testing (administrative).

64
Q

What is Active-Passive?

A

is a failover solution and not a security control.

65
Q

What is Single-layer security?

A

Single-layer security is the use of a single control to protect assets. Using two separate vendors for the firewalls makes this scenario diverse.

66
Q

Installing and manage embedded systems and Internet of Things (IoT) come with a set of operational constraints. What are some of those constraints that would affect the security of those devices ?

A

Implied Trust, Crypto (Cryptographic identification) and Authentication ( or lack thereof)

67
Q

What is Zigbee?

What frequency does it use?

What kind of limitation doesn’t have?

A

Zigbee is a wireless communications protocol used primarily for home automation. Zigbee is an open source solution that uses 2.4 GHz frequency band. It has no communication hop limitation with multiple devices in a singular network

68
Q

What is Narrowband-IoT (NB-IoT) ?

A

Narrowband-IoT (NB-IoT) is a type of baseband radio that has limited data rates between 20 to 100 Kilobits per second (Kbps). This is more suitable for inaccessible locations that require signal penetrating power.

69
Q

What is LTE Machine Type Communication?

A

is a type of baseband radio that supports cellular network bandwidth of up to 1 Megabit per second (Mbps).

70
Q

What is Audrino and Raspberry Pi

A

They are examples of a SoC board that was initially devised as an educational tool. It is now widely used for industrial application and hacking.

71
Q

What is Real time operating system (RTOS)?

A

Real time operating system (RTOS) is a type of embedded system that operate devices that perform acutely time-sensitive tasks. These are not made for educational purposes.

72
Q

What is a Faraday Cage ?

A

A Faraday Cage is used to block electromagnetic, radio frequencies and electrostatic signals. The enclosure can keep signals out and block them from going into the secure area providing a physical security layer.

73
Q

What are “Hot and cold aisles”?

A

Hot and cold aisles are arranged with all the hardware expelling heat toward one aisle where the exhaust vents are placed. The other side of the aisle is designated for cool air. Avoiding the mixture of warm and cold air helps to improve the efficiency of the entire operation and reduce costs.

74
Q

What is Ad Hoc?

A

An Ad Hoc zone is created when two or more wireless devices connect to one another creating an on-demand network.

75
Q

What is Degaussing ?

A

Degaussing involves exposing magnetic media, such as hard disks or tapes, to a powerful electromagnet which disrupts the magnetic pattern that stores the data on the disk surface. This effectively “erases” the media.

76
Q

Provide Examples of Stegnography…

A

Embedding a watermark using the design and color of bank notes is an example of steganography. This method is employed by the Counterfeit Deterrence System (CDS) and can be used for anti-counterfeiting efforts.

Encoding messages within TCP packet data fields to create a covert message channel is an example of steganography.

Changing the least significant bit of pixels in an image file (the cover file) is another example. This can code a useful amount of information, without distorting the original image noticeably.

77
Q

How does cryptography assist having in resiliency? which mean compromise of one system doesn’t compromise the whole?

A

A system is resilient if it prevents a compromise of a small part of the system compromising the whole system.

Cryptography assists this goal by ensuring the authentication and integrity of messages delivered over the control system.

78
Q

What is the art obfuscasion?

A

The art of obfuscation is making messages difficult to understand. This can be implemented with computer code, however, sometimes even the computer may not be able to read it.

79
Q

Describe what Launching a side channel attack means?

A

Launching a side channel attack means monitoring things like timing, power consumption, and electromagnetic emanation. These have a physical relation.

80
Q

What is Operating system (OS) fingerprinting?

A

Operating system (OS) fingerprinting is a method used by Nmap to probe hosts for running OS type and version, and even application names and device type (e.g., laptop or virtual machine).

81
Q

What is Elliptic Curve Cryptography (ECC)?

What is it better than?

how does it’s key length affect it?

A

Elliptic Curve Cryptography (ECC) is a trapdoor function used to generate public/private key pairs.

Even at smaller key lengths, it is comparable to other asymmetric encryptions using larger key bits such as RSA using 2048-bit keys.

A large key size will work with elliptical curve, but it will become slower. In this case, the application worked faster due to the smaller key size that can be used.

82
Q

What is a A secure hash, for example, like Secure Hash Algorithm (SHA) used for?

A

A secure hash, for example, like Secure Hash Algorithm (SHA) are used to create a message digest. It is a one-way cipher. It is mostly used for integrity and passwords.

83
Q

What is A session key ?

A

A session key is a secret key that is either shared or known by some secure means that is used in Secure Sockets Layer/Transport Layer Security (SSL/TLS) with RSA.

84
Q

What is Ephemeral key?

How many keys per session?

A

Ephemeral key is the main component of ECDHE that gives it perfect forward secrecy.

There is a different secret key for each session during transport.

85
Q

What is ECDHE (ECC with D-H ephemeral mode)?

A

ECDHE (ECC with D-H ephemeral mode) uses ephemeral keys for each session which provide perfect forward secrecy. It is a step above security for regular ECC, and better than RSA’s algorithm.

86
Q

What can you say about Elliptic curve cryptography (ECC)? …

It’s better than which algorithm?

What’s a common problem with ECC?

A

Elliptic curve cryptography (ECC), although better than RSA’s algorithm, has the problem that a compromise of its encryption keys will affect all communications.

87
Q

What is Rivest, Shamir, Adleman (RSA) algorithm and what is it used for?

A

RSA is an asymmetric algorithm used to create digital signatures. It can be used to encrypt short messages.

Rivest, Shamir, Adleman (RSA) is widely deployed as a solution for creating digital signatures and key exchange. Client browsers support RSA.

88
Q

Under what conditions can ECDHE work?

Otherwhise what should be used instead?

A

ECDHE will only work if both client and server support the same PFS-compatible suite or ephemeral keys. Otherwise, Elliptic Curve Diffie-Hellman (ECDH) without Ephemeral should be used.

89
Q

What is Keystreching

What does adding salt do?

What algorithms does key stretching use?

A

Key stretching is creating a key using thousands of rounds of hashing. Adding a salt in the hashing process makes the hash or key much stronger. Uses Secure Hash Algorithm (SHA) its the second part of key stretching.

90
Q

What is Symmetric encryption?

A

Symmetric encryption is a two-way encryption algorithm in which encryption and decryption are both performed by a single secret key.

91
Q

What is RC4?

A

RC4 is a stream cipher meaning each byte or bit of data in the plaintext is encrypted one at a time.

is not block cypher.

92
Q

What is 3DES?

What is an attribute of 3DES?

A

3DES is a block cipher. n a block cipher, the plaintext is divided into equal-size blocks (usually 64- or 128-bit). Each block is then subjected to complex transposition and substitution operations, based on the value of the key used.

It uses 64-bit blocks and a 56-bit key, but the plaintext is encrypted three times using different subkeys.

93
Q

What is Advanced Encryption Standard (AES)?

Whats is it faster and more secure Than?
How about only more secure than?

What is it compatible with?

A

The Advanced Encryption Standard (AES) is a 128 bit symmetric block cipher and key sizes of 128, 192, or 256 bits.

It is faster and more secure than 3DES.It’s more secure than than RC4 and compatible with TLS

94
Q

What is Electronic Code Book (ECB)?

What does it do?

What is it faster than?

A

Electronic Code Book (ECB) is a mode operation that will process the encryption in blocks using the same key and . This is the simplest mod, and operates faster than CBC.

95
Q

What is Cipher Block Chaining (CBC)?

What happens to the output of the first ciphertext block?

What can you say about this process?

A

Cipher Block Chaining (CBC) is a mode of operation utilizing an Initialization Vector (IV). The output of the first ciphertext block is combined with the next plaintext block, and repeats. This is processing intensive and must run serially, hindering performance.

96
Q

What is Digital Signature Algorithm DSA?

Who is it used by?

What does it adopt

Where does it use keys from?

similar to what?

A

Digital Signature Algorithm (DSA) is an asymmetric algorithm used by NIST that adopts ElGamal’s algorithm. It uses the private and public keys from Diffie-Hellman in a similar way to RSA key pairs.

97
Q

What is Data Encryption Standard (DES)?

A

is a symmetric block cipher using 64-bit blocks and a 56-bit key. 3DES (Triple DES) is where the plaintext is encrypted three times using different subkeys.