Architecture and Design (4) Flashcards
Vincent works for a company that manufactures portable medical devices, such as insulin pumps. He is concerned about ensuring these devices are secure. Which of the following is the most important step for him to take?
Ensure all communications with the device are encrypted.
Ensure the devices have FDE.
Ensure the devices have individual antimalware.
Ensure all communications with the device are encrypted.
Such systems need to have all communications encrypted. As of the current date, breaches of portable network devices have all involved unencrypted communications
mile is concerned about securing the computer systems in vehicles. Which of the following vehicle types has significant cybersecurity vulnerabilities?
UAV
Automobiles
Airplanes
All of the above
All of the above
The more vehicles utilize computers and have network communication capabilities, the more they will be vulnerable to cyberattacks
Ariel is responsible for software development in her company. She is concerned that the software development team integrate well with the network system. She wants to ensure that software development processes are aligned with the security needs of the entire network. Which of the following would be most important for her to implement?
Integration testing
Secure DevOps
Clear policies
Secure DevOps
DevOps is a compound term: software DEVelopment and information technology OPerationS. The term refers to collaboration between software developers and IT professionals to align software development with infrastructure issues
Greg is a programmer with a small company. He is responsible for the web application. He has become aware that one of the modules his web application uses may have a security flaw allowing an attacker to circumvent authentication. There is an update available for this module that fixes the flaw. What is the best approach for him to take to mitigate this threat?
Submit an RFC.
Immediately apply the update.
Document the issue.
Submit an RFC.
All software changes must go through proper change management. That includes a request for changes (RFC) that will be evaluated
You are using a sophisticated system that models various attacks on your networks. You intend for this system to help your team realize weak areas and improve response to incidents. What is the most important step to take before relying on data from this system?
Get approval from a CAB.
Thoroughly review the systems documentation.
Verify the models being used.
Verify the models being used.
Model verification must be completed before you can rely on the models used. It is important to verify that all aspects of a simulation model are accurate. If the model has any inaccurate data or settings, then the results will not be accurate
Your company has an accounting application that was developed in-house. It has been in place for 36 months, and functioning very well, with very few issues. You have just made a minor change to the tax calculation based on a change in tax law. What should be your next step?
Deploy the change.
Perform stress testing.
Perform regression testing.
Perform regression testing.
Any change to a system requires regression testing. Regression testing ensures that the change made does not cause any new issues
Tom works as a software development manager for a large company. He is trying to explain to management the difference between compiled code and runtime code. What is the biggest advantage of compiled code?
Better performance
Platform independence
More secure
Better performance
Compiled code runs faster. This is because runtime code, such as Java, is compiled at runtime (thus the name) and thus performance is slower
Your company is interested in keeping data in the cloud. Management feels that public clouds are not secure but is concerned about the cost of a private cloud. What is the solution you would recommend?
Tell them there are no risks with public clouds.
Suggest that they consider a community cloud.
Recommend against a cloud solution at this time.
Suggest that they consider a community cloud.
A community cloud presents a compromise solution. Community clouds are semiprivate. They are not accessible to the general public but only to a small community of specific entities
Your development team primarily uses Windows, but they need to develop a specific solution that will run on Linux. What is the best solution to getting your programmers access to Linux systems for development and testing?
Set their machines to dual-boot Windows and Linux.
PaaS
IaaS
PaaS
Platform as a Service is a good solution to this problem. The programmer can access a virtualized Linux machine with PaaS
Daniel works for a mid-sized financial institution. The company has recently moved some of its data to a cloud solution. Daniel is concerned that the cloud provider may not support the same security policies as the company’s internal network. What is the best way to mitigate this concern?
Implement a cloud access security broker.
Perform integration testing.
Establish cloud security policies.
Implement a cloud access security broker.
A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises network and a cloud provider’s infrastructure. A CASB acts as a gatekeeper, allowing the organization to extend the reach of their security policies into the cloud
Hanz is responsible for the e-commerce servers at his company. He is concerned about how they will respond to a DoS attack. Which software testing methodology would be most helpful in determining this?
Regression testing
Stress testing
Integration testing
Stress testing
Stress testing is designed to test an application under workloads that are larger than normal. Although this may not be adequate to test for DoS response, it is the most relevant software test
You are the CIO for a small company. The company wants to use cloud storage for some of its data, but cost is a major concern. Which of the following cloud deployment models would be best?
Community cloud
Private cloud
Public cloud
Public cloud
The correct answer is a public cloud. Public clouds are usually less expensive. The cloud provider has a number of customers and costs are dispersed. Even individuals can afford to use cloud storage with services like iCloud and Amazon Cloud
Alisha is monitoring security for a mid-sized financial institution. Under her predecessor there were multiple high-profile breaches. Management is very concerned about detecting any security issues or breach of policy as soon as possible. Which of the following would be the best solution for this?
Monthly audits
NIDS
Continuous monitoring
Continuous monitoring
The correct answer is continuous monitoring. There are technologies that perform continuous monitoring of a network. These systems can identify any issue as it is occurring, or very soon thereafter
Helga works for a bank and is responsible for secure communications with the online banking application. The application uses TLS to secure all customer communications. She has noticed that since migrating to larger encryption keys, the server’s performance has declined. What would be the best way to address this issue?
Implement a VPN concentrator.
Implement an SSL accelerator.
Return to smaller encryption keys.
Implement an SSL accelerator.
The correct answer is to use an SSL accelerator. SSL accelerators are a method of offloading processor-intensive public-key encryption for Transport Layer Security (TLS) and Secure Sockets Layer (SSL) to a hardware accelerator
What is the primary advantage of allowing only signed code to be installed on computers?
It guarantees that malware will not be installed.
It improves patch management.
It verifies who created the software.
It verifies who created the software.
Only using code that is digitally signed verifies the creator of the software. For example, if a printer/MFD driver is digitally signed, this gives you confidence that it really is a printer driver from the vendor it purports to be from, and not malware masquerading as a printer driver