Architecture and Design Flashcards
You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?
Create an additional copy of the backups in an off-site datacenter
Attempt to restore to a test server from one of the backup files to verify them
Set up scripts to automatically reattempt any failed backup jobs
Frequently restore the server from backup files to test them
Attempt to restore to a test server from one of the backup files to verify them
When conducting forensic analysis of a hard drive, what tool would BEST prevent changing the hard drive contents during your analysis?
Forensic drive duplicator
Software write blocker
Degausser
Hardware write blocker
Hardware write blocker
Taylor needs to sanitize hard drives from some leased workstations before returning them to a supplier at the end of the lease period. The workstations’ hard drives contained sensitive corporate data. Which is the most appropriate choice to ensure that data exposure doesn’t occur during this process?
Clear, validate, and document the sanitization of the drives
Purge, validate, and document the sanitization of the drives
Clear the drives
The drives must be destroyed to ensure no data loss
Purge, validate, and document the sanitization of the drives
You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first?
Require all employees to wear security badges when entering the building
Install a mantrap at the entrance
Install a RFID badge reader at the entrance
Install CCTV to monitor the entrance
Install a mantrap at the entrance
During a security audit, you discovered that customer service employees have been sending unencrypted confidential information to their personal email accounts via email. What technology could you employ to detect these occurrences in the future and send an automated alert to the security team?
UTM
SSL
MDM
DLP
DLP
Which of the following hashing algorithms results in a 160-bit fixed output?
NTLM
SHA-2
RIPEMD
MD-5
RIPEMD
RIPEMD creates a 160-bit fixed output. SHA-2 creates a 256-bit fixed output. NTLM creates a 128-bit fixed output. MD-5 creates a 128-bit fixed output.
A financial services company wants to donate some old hard drives from their servers to a local charity. The hard drives used in the servers are self-encrypting drives. Still, they are concerned about the possibility of residual data being left on the drives. Which of the following secure disposal methods would you recommend the company use?
Overwrite
Zero-fill
Secure erase
Cryptographic erase
Cryptographic erase
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company’s owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donate them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
Shredding
Degaussing
Wiping
Destroying
Wiping
Which of the following vulnerabilities involves leveraging access from a single virtual machine to other machines on a hypervisor?
VM migration
VM data remnant
VM sprawl
VM escape
VM escape
Select four security features that you should use with a workstation or laptop within your organization?
Network Sniffer
Cellular Data
MDM
Location Tracking
Cable Lock
Host Based Firewall
CAT 5e STP
Remote Wipe
Host based firewall, network sniffer, cable lock, CAT5e STP
What is the lowest layer (bottom layer) of a bare-metal virtualization environment?
Host operating system
Physical hardware
Guest operating system
Hypervisor
Physical hardware
Which of the following describes the overall accuracy of a biometric authentication system?
Crossover error rate
False positive rate
False rejection rate
False acceptance rate
Crossover error rate
Which cloud computing concept is BEST described as focusing on replacing the hardware and software required when creating and testing new applications and programs from a customer’s environment with cloud-based resources?
IaaS
PaaS
SECaaS
SaaS
PaaS
Platform as a Service (PaaS) provides the end-user with a development environment without all the hassle of configuring and installing it themselves
Which of the following is the most important feature to consider when designing a system on a chip?
Ability to interface with industrial control systems
Type of real-time operating system in use
Space and power savings
Ability to be reconfigured after manufacture
Space and power savings
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the owner of the company if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donate them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
Purging
Degaussing
Wiping
Shredding
Wiping
Sarah is working at a startup that is focused on making secure banking apps for smartphones. Her company needs to select an asymmetric encryption algorithm to encrypt the data being used by the app. Due to the need for high security of the banking data, the company needs to ensure that whatever encryption they use is considered strong, but also need to minimize the processing power required since it will be running on a mobile device with lower computing power. Which algorithm should Sarah choose in order to provide the same level of high encryption strength with a lower overall key length?
Diffie-Hellman
ECC
RSA
Twofish
ECC
Which of the following vulnerabilities involves leveraging access from a single virtual machine to other machines on a hypervisor?
VM sprawl
VM data remnant
VM migration
VM escape
VM escape
Which of the following hashing algorithms results in a 160-bit fixed output?
NTLM
SHA-2
SHA-1
MD-5
SHA-1
SHA-1 creates a 160-bit fixed output. SHA-2 creates a 256-bit fixed output. NTLM creates a 128-bit fixed output. MD-5 creates a 128-bit fixed output.
Which of the following cryptographic algorithms is classified as stream cipher?
AES
DES
RC4
Blowfish
RC4
Frank and John have started a secret club together. They want to ensure that when they send messages to each other, they are truly unbreakable. What encryption key would provide the STRONGEST and MOST secure encryption?
ECC with a 256-bit key
DES with a 56-bit key
AES with a 256-bit key
Randomized one-time use pad
Randomized one-time use pad
Which of the following authentication mechanisms involves receiving a one-time use shared secret password, usually through a token-based key fob or smartphone app, that does not expire?
EAP
HOTP
Smart card
TOTP
HOTP (HMAC-based One-time Password Algorithm)
Which of the following would a virtual private cloud infrastructure be classified as?
Infrastructure as a Service
Function as a Service
Software as a Service
Platform as a Service
Infrastructure as a Service
Which of the following is NOT considered part of the Internet of Things?
Laptop
ICS
SCADA
Smart television
Laptop
You have just completed identifying, analyzing, and containing an incident. You have verified that the company uses older unencrypted SSDs as part of their default configuration and the manufacturer does not provide a SE utility for the devices. The storage devices contained top-secret data that would bankrupt the company if it fell into a competitor’s hands. After safely extracting the data from the device and saving it to a new self-encrypting drive, you have been asked to securely dispose of the SSDs. Which of the following methods should you use?
Use a secure erase (SE) utility on the storage devices
Physically destroy the storage devices
Conduct zero-fill on the storage devices
Perform a cryptographic erase (CE) on the storage devices
Physically destroy the storage devices
Which protocol is paired with OAuth2 to provide authentication of users in a federated identity management solution?
ADFS
SAML
OpenID Connect
Kerberos
OpenID Connect
OAuth 2 is explicitly designed to authorize claims and not to authenticate users. The implementation details for fields and attributes within tokens are not defined. Open ID Connect (OIDC) is an authentication protocol that can be implemented as special types of OAuth flows with precisely defined token fields.
Dion Training has set up a lab consisting of 12 laptops for students to use outside of normal classroom hours. The instructor is worried that a student may try to steal one of the laptops. Which of the following physical security measures should be used to ensure the laptop is not stolen or moved out of the lab environment?
Cable locks
Entry control roster
Biometric locks
USB locks
Cable locks
Dion Training has contracted a software development firm to create a bulk file upload utility for its website. During a requirements planning meeting, the developers asked what type of encryption is required for the project. After some discussion, Jason decides that the file upload tool should use a cipher that is capable of encrypting 8 bits of data at a time before transmitting the files from the web developer’s workstation to the webserver. What of the following should be selected to meet this security requirement?
Hashing algorithm
Stream cipher
CRC
Block cipher
Block cipher
A block cipher is used to encrypt multiple bits at a time prior to moving to the next set of data
You just received an email from Bob, your investment banker, stating that he completed the wire transfer of $10,000 to your bank account in Vietnam. The problem is, you do not have a bank account in Vietnam!, so you immediately call Bob to ask happened. Bob explains that he received an email from you requesting the transfer. You insist you never sent that email to Bob initiating this wire transfer. What aspect of PKI could be used to BEST ensure that a sender actually sent a particular email message and avoid this type of situation?
CRL
Trust models
Non-repudiation
Recovery agents
Trust models
Using the image provided, select four security features that you should use to best protect your servers in the data center. This can include physical, logical, or administrative protections.
Antivirus, Mantrap, Cable lock, GPS tracking
Strong passwords, Biometrics, Mantrap, Cable lock
GPS tracking, Biometrics, Proximity badges, Remote wipe
FM-200, Biometric locks, Mantrap, Antivirus
FM-200, Biometric locks, Mantrap, Antivirus
What type of scan will measure the size or distance of a person’s external features with a digital video camera?
Signature kinetics scan
Facial recognition scan
Retinal scan
Iris scan
Facial recognition scan
A company has recently experienced a data breach and has lost nearly 1 GB of personally identifiable information about its customers. You have been assigned as part of the incident response team to identify how the data was leaked from the network. Your team has conducted an extensive investigation, and so far, the only evidence of a large amount of data leaving the network is from the email server. There is one user that has sent numerous large attachments out of the network to their personal email address. Upon closer inspection, those emails only contain pictures of that user’s recent trip to Australia. What is the most likely explanation for how the data left the network?
Steganography was used to hide the leaked data inside the user’s photos
The data was encrypted and emailed it to their spouse’s email account
The files were downloaded from home while connected to the corporate VPN
The data was hashed and then emailed to their personal email account
Steganography was used to hide the leaked data inside the user’s photos
Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded a copy of the corporate database to his work laptop. On his way home, he forgot the laptop in an Uber, and a few days later, the data was posted on the internet. Which of the following mitigations would have provided the greatest protection against this data breach?
Require data at rest encryption on all endpoints
Require all new employees to sign an NDA
Require data masking for any information stored in the database
Require a VPN to be utilized for all telework employees
Require data at rest encryption on all endpoints
What sanitization technique uses only logical techniques to remove data, such as overwriting a hard drive with a random series of ones and zeroes?
Degauss
Purge
Clear
Destroy
Clear
You are configuring a RAID drive for a Media Streaming Server. Your primary concern is speed of delivery of the data. This server has two hard disks installed. What type of RAID should you install, and what type of data will be stored on Disk 1 and Disk 2?
RAID 1 - Disk 1 (Mirror) and Disk 2 (Mirror)
RAID 0 - Disk 1 (Mirror) and Disk 2 (Mirror)
RAID 0 - Disk 1 (Stripe) and Disk 2 (Stripe)
RAID 1 - Disk 1 (Stripe) and Disk 2 (Stripe)
RAID 0 - Disk 1 (Stripe) and Disk 2 (Stripe)
Since this is a Media Streaming Server, you should implement a RAID 0 which provides disk stripping across both drives. This will increase the speed of the data delivery, but provides no redundancy.
Which of the following hashing algorithms results in a 160-bit fixed output?
SHA-2
NTLM
MD-5
RIPEMD
RIPEMD
RIPEMD creates a 160-bit fixed output. SHA-2 creates a 256-bit fixed output. NTLM creates a 128-bit fixed output. MD-5 creates a 128-bit fixed output.
What is the lowest layer (bottom layer) of a bare-metal virtualization environment?
Host operating system
Hypervisor
Physical hardware
Guest operating system
Physical hardware