Architecture and Design Flashcards

1
Q

What type of cloud storage is involved when you purchase said storage from a commercial service provider?

A

Public

Explanation - This is because the service is from a third-party service provider over the public internet. This makes them available to everyone who wants to purchase and use their service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What security method involves entering your username and password ONLY once and gain access to multiple applications?

A

SSO (I.e., Single Sign-On)

Explanation - This form of authentication allows a user to access multiple applications with one set of login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are considered symmetric algorithms?

A

AES
RC4
Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is considered an asymmetric algorithm?

A

Diffie-Hellman (DH)

Explanation - This is a method of securely exchanging cryptographic keys over a public channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of threat relies on the crossing of an airgap between a business and an industrial control system network?

A

Directory Traversal

Explanation - The only way to cross an airgap is to have a physical device between these systems, such as using a removable media device to transfer files between them. A directory traversal is an HTTP attack that allows attackers to access restricted directories and execute commands outside of the web server’s root directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What terminology best describes the overall accuracy of a biometric system?

A

Crossover Error Rate (CER)

Explanation - “CER” also known as the Equal Error Rate, is the point where the False Reject Rate (FRR) and False Accept Rate (FAR) are equal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of environment would you use if you wanted to ensure that any vendor patches are tested prior to deploying them into the production environment?

A

The “Staging” Environment

Explanation - Deploying changes in a staging or “sandbox”” environment provides the organization with a safe, isolated place for testing changes without interfering with production systems.

Note: This environment can mimic the actual production environment, leading to a realistic test environment that minimizes the risk of failure during a push to the production environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an efficient method to use to sanitize an affected hard drive that uses self-encryption as part of its default configuration?

A

By performing a Crytographic Erase (CE) on the storage devices.

Explanation - Sanitizing a hard drive can be done using cryptographic erase (CE), secure erase (SE), zero-fill, or physical destruction. This is done by erasing the media encryption key and reimaging the drive.

Note: This is MOST effective when a hard drive already uses data at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What technology should a digital forensic investigator use after creating a disk image to verify the data integrity of a disk copy matches that of the original web server’s hard disk?

A

SHA-256

Explanation - The SHA-256 is the Secure Hash Algorithm with a 256-bit length output and is used to ensure the data integrity of a file has not been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly