Architecture and Design (3) Flashcards
You are responsible for database security at your company. You are concerned that programmers might pass badly written SQL commands to the database, or that an attacker might exploit badly written SQL in applications. What is the best way to mitigate this threat?
Programmer training
Agile programming
Stored procedures
Stored procedures
Stored procedures are the best way to have standardized SQL. Rather than programmers writing their own SQL commands, they simply call the stored procedures that the database administrator creates
Mary is concerned about application security for her company’s application development. Which of the following is the most important step for addressing application security?
Proper error handling
Regular data backups
Encrypted data transmission
Proper error handling
Proper error handling is the most fundamental item to address in application development. Robust and thorough error handling will mitigate many security risks
Farès is responsible for managing the many virtual machines on his company’s networks. Over the past two years, the company has increased the number of virtual machines significantly. Farès is no longer able to effectively manage the large number of machines. What is the term for this situation?
VM overload
VM sprawl
VM spread
VM sprawl
When virtualization reaches the point that IT can no longer effectively manage it, the condition is known as VM sprawl
Mary is responsible for virtualization management in her company. She is concerned about VM escape. Which of the following methods would be the most effective in mitigating this risk?
Only share resources between the VM and host if absolutely necessary.
Keep the VM patched.
Use a firewall on the VM.
Only share resources between the VM and host if absolutely necessary.
VM escape is a situation wherein an attacker is able to go through the VM to interact directly with the hypervisor, and potentially the host operating system. The best way to prevent this is to limit the ability of the host and the VM to share resources. If possible, they should not share any resources
You work at a large company. You are concerned about ensuring that all workstations have a common configuration, no rogue software is installed, and all patches are kept up to date. Which of the following would be the most effective for accomplishing this?
Use VDE.
Implement strong policies.
Use an image for all workstations.
Use VDE.
The correct answer is to implement a virtual desktop environment. If all the desktops are virtualized, then from a single central location you can manage patches, configuration, and software installation. This single implementation will solve all the issues mentioned in the question
Juan is responsible for the physical security of the company server room. He has been asked to recommend a type of fire suppression system for the server room. Which of the following would be the best choice?
Wet pipe
Deluge
Pre-action
Pre-action
Pre-action fire suppression is ideal for computers. The pipes have no water in them during normal operations. When the temperature rises to a certain level, water fills the pipes. Then if the temperature continues to rise, the fire suppression system activates. This provides time to stop the fire before the servers are soaked with water
You are responsible for server room security for your company. You are concerned about physical theft of the computers. Which of the following would be best able to detect theft or attempted theft?
Motion sensor–activated cameras
Smart card access to the server rooms
Strong deadbolt locks for the server rooms
Motion sensor–activated cameras
The correct answer is to have a motion-activated camera that records everyone who enters the server room
Teresa has deployed session tokens on her network. These would be most effective against which of the following attacks?
DDoS
Replay
SYN flood
Replay
Session tokens are used to authenticate sessions. These can be effective against replay attacks and session hijacking
Hector is using infrared cameras to verify that servers in his datacenter are being properly racked. Which of the following datacenter elements is he concerned about?
EMI blocking
Humidity control
Hot and cold aisles
Hot and cold aisles
Hot aisle/cold aisle is a layout design for server racks and other computing equipment in a data center. The goal of a hot aisle/cold aisle configuration is to conserve energy and lower cooling costs by managing airflow. An infrared camera will detect heat levels on the aisles
Gerald is concerned about unauthorized people entering the company’s building. Which of the following would be most effective in preventing this?
Alarm systems
Cameras
Security guards
Security guards
A security guard is the most effective way to prevent unauthorized access to a building
Which of the following is the most important benefit from implementing SDN?
It will stop malware.
It provides scalability.
It will detect intrusions.
It provides scalability.
Software-defined networking makes the network very scalable. It is relatively easy to add on new resources or remove unneeded resources
Mark is an administrator for a health care company. He has to support an older, legacy application. He is concerned that this legacy application might have vulnerabilities that would affect the rest of the network. What is the most efficient way to mitigate this?
Use an application container.
Implement SDN.
Run the application on a separate VLAN.
Use an application container.
The correct answer is to use an application container to isolate that application from the host operating system. Applications containers provide a virtualized environment in which to run an application
Lars is auditing the physical security of a company. The company uses chain-link fences on its perimeter. The fence is over pavement, not soft ground. How close to the ground should the bottom of the fence be?
Touching the ground
Within 4 inches
Within 2 inches
Within 2 inches
The fence should reach within 2 inches of hard surfaces like pavement or concrete. For soft dirt it should actually go into the ground
Mia has to deploy and support a legacy application. The configuration for this application and the OS it runs on are very specific and cannot be changed. What is the best approach for her to deploy this?
Use an immutable server.
Use a VM.
Set permissions on the application so it cannot be changed.
Use an immutable server.
An immutable server’s configuration cannot be changed
To mitigate the impact of a software vendor going out of business, a company that uses vendor software should require which one of the following?
A detailed credit investigation prior to acquisition
A third-party source-code escrow
Substantial penalties for breach of contract
A third-party source-code escrow
The correct answer is to have the source code for the application stored with a third-party source code escrow. Should the vendor go out of business, or otherwise be unable to continue to support the application, the source code escrow will supply you with the source code you can then maintain yourself (or hire a new company)