Architecture and Design Flashcards

1
Q

Staging/Sandboxing

A

Staging environments can mimic the actual production environment, leading to realistic test environment that minimizes the risk of failure during a push to the production environment

good for testing and patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tokenization

A

An example of deidentification control; all or part of the data in a field is replaced with a randomly generated token

ex. protecting PHI data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of cloud would you use if you want to purchase cloud storage resources that will be dedicated soley for your organizations use?

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA-1 creates what fixed output? (bit)

A

160-bit fixed output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SHA-2 creates what fixed output? (bit)

A

256-bit fixed output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MD-5 creates what fixed output? (bit)

A

128-bit fixed output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RIPEMD creates what fixed output? (bit)

A

160-bit fixed output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defense in depth

A

the concept of layering various network appliances and configurations to create a more secure and defensible architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data in transit

(or data in motion)

A

occurs when data is transmited over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data at rest

A

data is in persistent storage media using whole disk encryption, database encryption, and file- or folder-level encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data in use

A

when data is present in volatile memory, such as system RAM or CPU registers and cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a reverse proxy commonly used for?

A

Directing traffic to internal services if the contents of the traffic comply with the policy

Positioned at the cloud network edge and directs traffic to cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric or Asymmetric?

Blowfish

A

Symmetric-key block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric or Asymmetric?

ECC

A

Asymmetric

allow the use of shorter key for the same strength that an RSA key would require, reducing the computation overhead required to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric or Asymmetric?

PGP

A

Aymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric or Asymmetric?

RSA

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data soverignty

A

refers to a jurisdiction preventing or restricting processing and storage from taking place on systems that do not physically reside within that jurisdiction

(like France or the European Union)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Symmetric or Asymmetric?

Diffie-Hellman

A

Asymmetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Symmetric or Asymmetric?

AES

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Symmetric or Asymmetric?

RC4

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two types of containment?

regarding attacks

A

Segmentation and Isolation

22
Q

Hypervisor

(virutal machine monitor)

A

a process that creates and runs virtual machines (VMs)

allows one host computer to support multiple guest VMs by sharing its resources, like memory and processing

23
Q

Stream cipher vs. Block cipher

A

A block cihper is used to encrypt multiple bits at a time before moving to the next set of data

A stream cipher encrypt a single bit (or byte) at a time during their encryption process

24
Q

Which is faster?

Asymmetric vs. Symmetric

A

Symmetric encryption is faster than asymmetric encryption

25
Q

Non-repudiation

A

when a sender cannot claim they didn’t send an email when they did

26
Q

Which protocol is paired with OAuth2 to provide authentication of users in a federated identity management solution?

A

OpenID Connect

OAuth2 is explicitly designed to authorize claims and not to authenticate users.

OpenID Connect is an authentication protocol that can be implemented as special types of OAuth flows with precisely defined token fields

27
Q

Rapid Elasticity

A

used to describe scalable provisioning or the capability to provide scalable cloud computing services

rapid elasticity is very critical to meet the fluctuating demands of cloud users

28
Q

Data Wiping

A

occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media

may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure

29
Q

Degaussing

A

involves demagnetizing a hard drive to erase its stored ddata

you CANNOT reuse a hard drive once it has been degaussed

classified as a form of PURGING

30
Q

Purging

A

removing sensitive data from a hard drive using the device’s interal electronics or an outside source sush as a degausser, or by using a cryptographic erase function if the drive supports one

31
Q

Shredding

A

involves the physical destruction of the hard drive

32
Q

CER

Crossover Error Rate

A

describes the point where the False Reject Rate (FRR) and False Accept Rate (FAR) are equal

describes the overall accuracy of a biometric system

33
Q

UPS

Uninterruptible Power Supply

A

making certain that power isn’t disupted during an outage and can be maintained for a short time until alternate power like a generator can come online is critical

34
Q

Faraday Cage

A

invloves placing wire mesh around an area or device to block electromagnetic signals

35
Q

RAID 0

A

provides data striping across multiple disks (or only 2?) to increase performance

36
Q

RAID 1

A

provides redundancy by mirroring the data identically on two hard disks

37
Q

RAID 5

A

provides redundancy by striping data and parity data across the disk drives

requires minimum of 3 disk drives

38
Q

RAID 6

A

provides redundancy by striping and double parity data across the disk drives

requires at least 4 hard disks

39
Q

RAID 10

A

creates a striped RAID of two mirrored RAIDS (combines RAID 1 & RAID 0)

requires at least 4 hard disks

40
Q

IaaS, SaaS, IPSECaaS, Paas, FaaS

A
41
Q

CSR

Certificate Signing Request

A

CSR is what is submitted to the CA to request a digital certificate

42
Q

OCSP

A

a status of certificates that provide validity such as good, revoked or unknown

43
Q

Fuzzing

A

an automated software testing technique that invovles providing invalid, unexpected, or random data as inputs to a computer program

the program is monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks

44
Q

Attestation

A

prove the hardware is really yours, a system you can trust

easy when it’s just your computer, more difficult when there are 1,00

remote attestation

45
Q

Federation

A

allows members of one organization to authenticate using the credentials of another organization

46
Q

RP

Relying parties

A

provide services to members of a federation

47
Q

VM escape

A

leveraging access from a single virtual machine to other machines on a hypervisor

48
Q

VM sprawl

A

when the number of virtual machines on a network reaches a point where the administrator can no longer manage them effectively

49
Q

Hardware write blocker

A

primary purpose is to intercept and prevent (or ‘block’) any modifying command operation from every reaching the storage device

hardware and software write blockers are designed to ensure that forensic software and tool scannot change a drive inadvertently by accessing it

50
Q

Hardware write blocker

A

primary purpose is to intercept and prevent (or ‘block’) any modifying command operation from every reaching the storage device

hardware and software write blockers are designed to ensure that forensic software and tool scannot change a drive inadvertently by accessing it