Architecture and Design 2 Flashcards

1
Q
  1. Departmental isolation uses a _______, whereas a computer isolation uses _________.
A
  1. VLAN, airgaps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A ______ is a boundary layer between the LAN and the ______. The website situated there is called an ___________ and is normally accessed using a username and a password.
A
  1. DMZ, WAN, extranet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. System _________ is where a virtual machine is running out of resources.
A
  1. Sprawl
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. The best way to prevent a SQL injection attack is by using _________ ____________. Another method is to use _______ validation.
A
  1. Store procedures, input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A _____ is used is to hide the internal network, whereas _____ is multiple internal connections to one external connection.
A
  1. NAT, PAT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. _______ code is source code that is never used by the application.
A
  1. Dead
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A network intrusion detection system relies on __________ and _____________ to sense changes to the local network.
A
  1. Sensors, collectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. An _______________ switch can be used to connect multiple switches together and prevents looping.
A
  1. Aggregation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. The cloud model ___________ as a Service is where you lease a bespoke application that cannot be _____________ and is normally accessed via a web browser.
A
  1. Software, modified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. VM _________ is where an attacker gains access to a virtual machine and then attacks the host.
A
  1. Escape
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. If a company has the account lockout set to a maximum of three attempts, an attacker can log in twice to all of the computer systems without being detected. However, if the company installs a _______ system that uses a _____________ engine, once the third attempt is made, the attacker is locked out.
A
  1. SIEM, correlation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A company uses a lease line to connect two sites, London and Paris. Due to budget constraints, they are going to replace the lease line with a _____-__-_____ VPN using ________ __ mode.
A
  1. Site-to-site, always on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. When a SIEM system produces a ________ positive, it could be that the wrong _______ filter is being used.
A
  1. False, input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. _____________ _______ is where companies in the same industry share the cost of creating and hosting a cloud-based application.
A
  1. Community cloud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Group policy enforces policies for on-premise computers and ________ ________ _____________ __________ enforces policies for cloud-based computers.
A
  1. Cloud access security broker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A waterworks and an oil __________ and both examples of _________ networks.
A
  1. Refinery, SCADA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. ___ ________ is where an unmanaged virtual machine has been placed on a virtual network. The administrator doesn’t know about it, so it will not be patched and end up as a vulnerability on the network.
A
  1. VM sprawl
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. _________________ can be used to mask data or code, whereas ________________ is used to embed data inside other data.
A
  1. Obfuscation, steganography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. ____________ __________ is the cloud model that has more control, whereas _________________ as a Service is the cloud service that has most control as you have to install, ___________, and patch the operating system.
A
  1. Private cloud, infrastructure, configure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. A company is building a new data center in Galway and is using ___________ to control access to the data center and using a ______ system to help provide availability of the computer systems and prevent them from _____________ and crashing.
A
  1. Mantraps, HVAC, overheating
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. A company has moved the desktops in the customer services departments so that people walking past the outside windows cannot ___________ surf and has installed ________ ________ as an additional precaution.
A
  1. Shoulder, screen filters
22
Q
  1. __________ is the process of testing a new application with production _______. This can be carried out by using _____________ to isolate them from the corporate network.
A
  1. Staging, data, sandboxing
23
Q
  1. Using a master __________ to roll out desktop computers ensures that they have a consistent security __________.
A
  1. Image, baseline
24
Q
  1. Different occupations can be regulated by __________ ____________ frameworks. An example of this would be PCI DSS for __________ ______ handling.
A
  1. Industry frameworks, credit card
25
Q
  1. A high volume of web traffic can be controlled by using a ______ ___________, whereas a high volume of DDoS traffic can be controlled by using a ______ ___________ or a stateful ___________.
A
  1. Load balancer, DDoS mitigator, firewall
26
Q
  1. A ________ box penetration tester can use a technique called __________ to carry out dynamic analysis of the ________ of a newly created application so that any _______________ can be addressed.
A
  1. White, fuzzing, code, vulnerabilities
27
Q
  1. PowerShell is an example of infrastructure as _______ where automation is paramount.
A
  1. Code
28
Q
  1. To protect data at rest on a laptop, full disk encryption can be used. However, this will require a _____ chip to be built into the laptop’s motherboard.
A
  1. TPM
29
Q
  1. The IT director is writing a new policy for the use of a new system and the technical lead is designing technical controls for this system. What they are both participating in is called _________ __________.
A
  1. Control diversity
30
Q
  1. ____________ ___________ is derived from legislation and ensures compliance.
A
  1. Regulatory framework
31
Q
  1. Using a mobile phone to provide internet access to a laptop is called ____________.
A
  1. Tethering
32
Q
  1. The cybersecurity incident response team has launched a new ____________ so that they can discover the new web-based attack methods being used.
A
  1. Honeypot
33
Q
  1. A __________ __ _______ model is where the security team uses multiple layers of protection so that if one layer fails, the _______ layer should prevent the attack.
A
  1. Defence in depth, next
34
Q
  1. In a BYOD environment, inserting an SD card to keep business data separate from your personal data is an example of ___________ _____________, also known as _________________.
A
  1. Storage segmentation, containerization
35
Q
  1. ____-_____________ configuration can be used to roll back to a previous state, should any unforeseen problems occur. In a virtual environment, a __________ can be used.
A
  1. Non-persistent, snapshot
36
Q
  1. PGP uses a _____ __ _________, FDE uses a _________ _____ __ ________, and two separate ______ use a bridge of trust model, commonly known as a _______ _________.
A
  1. Web of trust, hardware root of trust, CAs, trust model
37
Q
  1. A company has leased a SaaS application for its sales team, but they have complained about the interface and want customization to be carried out. The IT director has informed the sales team that these proposed changes _________ be made.
A
  1. Cannot
38
Q
  1. RAID 5 uses ________ parity and can lose ______ disk, whereas RAID 6 uses _________ parity and can afford to lose ______ disks. RAID __ is more resilient.
A
  1. Single, one, double, two, 6
39
Q
  1. To secure a mobile phone, you should use ________ passwords, ________ ______, and full disk _____________.
A
  1. Strong, screen locks, encryption
40
Q
  1. Vendor-specific _________ are rolled out with each piece of equipment to show you how they should be set up.
A
  1. Guides
41
Q
  1. If a company wishes to move its bespoke applications to the cloud but still maintain them, it will adopt the cloud model ___________ as a Service.
A
  1. Platform
42
Q
  1. A refrigerator is an example of an _____ device, whereas a life support system is an example of ______.
A
  1. IoT, SoC
43
Q
  1. ____________ is a development life cycle model that requires the whole stage to complete before we move on to the next stage. ________ can start multiple stages at one time and its aim is customer satisfaction. It is similar to scrum.
A
  1. Waterfall, agile
44
Q
  1. The ______ ______ protocol is used for voice traffic over IP networks and the secure version is called _______.
A
  1. Real time, SRTP
45
Q
  1. ___________ as a Service can provide identity management using _______ tokens.
A
  1. Security, SAML
46
Q
  1. Should a SIEM system find a false __________ on a known ____________ operating system, it may be using ________ input filters.
A
  1. Positive, hardened, wrong
47
Q
  1. Kerberos authentication and SIEM systems are both reliant on ______
    _______________.
A
  1. Time synchronization
48
Q
  1. To mitigate attacks on household IoT devices, ensure that the default _____________ ____ ___________ are changed ________________ and that they cannot ___________ access the internet.
A
  1. Username and passwords, immediately, directly
49
Q
  1. A cybersecurity response team can capture all of the traffic going to one port on a switch using a ______ _________ or _____.
A
  1. Port mirror, tap
50
Q
  1. Containers are __________ virtual machines, whereas containerization is __________ _______________ on a mobile device.
A
  1. Isolated, storage segmentation