Architecture and Design 2 Flashcards
1
Q
- Departmental isolation uses a _______, whereas a computer isolation uses _________.
A
- VLAN, airgaps
2
Q
- A ______ is a boundary layer between the LAN and the ______. The website situated there is called an ___________ and is normally accessed using a username and a password.
A
- DMZ, WAN, extranet
3
Q
- System _________ is where a virtual machine is running out of resources.
A
- Sprawl
4
Q
- The best way to prevent a SQL injection attack is by using _________ ____________. Another method is to use _______ validation.
A
- Store procedures, input
5
Q
- A _____ is used is to hide the internal network, whereas _____ is multiple internal connections to one external connection.
A
- NAT, PAT
6
Q
- _______ code is source code that is never used by the application.
A
- Dead
7
Q
- A network intrusion detection system relies on __________ and _____________ to sense changes to the local network.
A
- Sensors, collectors
8
Q
- An _______________ switch can be used to connect multiple switches together and prevents looping.
A
- Aggregation
9
Q
- The cloud model ___________ as a Service is where you lease a bespoke application that cannot be _____________ and is normally accessed via a web browser.
A
- Software, modified
10
Q
- VM _________ is where an attacker gains access to a virtual machine and then attacks the host.
A
- Escape
11
Q
- If a company has the account lockout set to a maximum of three attempts, an attacker can log in twice to all of the computer systems without being detected. However, if the company installs a _______ system that uses a _____________ engine, once the third attempt is made, the attacker is locked out.
A
- SIEM, correlation
12
Q
- A company uses a lease line to connect two sites, London and Paris. Due to budget constraints, they are going to replace the lease line with a _____-__-_____ VPN using ________ __ mode.
A
- Site-to-site, always on
13
Q
- When a SIEM system produces a ________ positive, it could be that the wrong _______ filter is being used.
A
- False, input
14
Q
- _____________ _______ is where companies in the same industry share the cost of creating and hosting a cloud-based application.
A
- Community cloud
15
Q
- Group policy enforces policies for on-premise computers and ________ ________ _____________ __________ enforces policies for cloud-based computers.
A
- Cloud access security broker
16
Q
- A waterworks and an oil __________ and both examples of _________ networks.
A
- Refinery, SCADA
17
Q
- ___ ________ is where an unmanaged virtual machine has been placed on a virtual network. The administrator doesn’t know about it, so it will not be patched and end up as a vulnerability on the network.
A
- VM sprawl
18
Q
- _________________ can be used to mask data or code, whereas ________________ is used to embed data inside other data.
A
- Obfuscation, steganography
19
Q
- ____________ __________ is the cloud model that has more control, whereas _________________ as a Service is the cloud service that has most control as you have to install, ___________, and patch the operating system.
A
- Private cloud, infrastructure, configure
20
Q
- A company is building a new data center in Galway and is using ___________ to control access to the data center and using a ______ system to help provide availability of the computer systems and prevent them from _____________ and crashing.
A
- Mantraps, HVAC, overheating