Architecture & Design Flashcards

1
Q

Penalty Types

A

Criminal
Civil
Administrative
Private Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sources of Industry Standards

A

Vendors
Government Agencies
Independent/Consulting Agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Defense in Depth

A

Multiple layers of overlapping security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Control Types by Method

A

Technical
Administrative
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of Technical Controls

A

DLP Systems
NIDS/NIPS
Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of Administrative Controls

A

Background Investigations
NDAs
Security Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of Physical Controls

A
Fences/Cages
Locks
Smart Cards
Man Traps
Video Surveillance
Bollards
Lighting
Signs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vendor Diversity Issues

A

Lack of Innovation

Technical Inefficiencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Training and Awareness Methods

A
Classroom
Orientation
Online
Vendor
Surveys
Reminders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Classification Factors

A

Sensitivity

Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Military Classification System

A

Top Secret
Secret
Confidential
Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business Classification

A

Highly Sensitive
Sensitive
Internal
Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compliance Obligations

A

Laws
Regulations
Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password Factors

A
Complexity
Length
History
Minimum age
Expiration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Tailgating/Piggybacking

A

Unauthorized access to a facility by following another credentialed user when they enter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Zones

A
Intranet
Internet
DMZ
Extranets
Honeynets
Ad Hoc
MANET
WIFI Direct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Intranet

A

Companies internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Internet

A

Public external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define DMZ

A

Demilitarized Zone, typically an organizations public facing assets separated from internal assets for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Extranets

A

Shared networks between separate organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define Honeynets

A

Decoy networks for gaining threat intelligence on attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define Ad Hoc Networks

A

Temporary networks for specific usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Private IP Address Ranges

A
  1. 0.0.1-10.255.255.255
  2. 16.0.1-172.31.255.255
  3. 168.0.1-192.168.255.255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define Static NAT

A

Translate private to public IP addresses (or visa versa) on a one-to-one basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define Dynamic NAT

A

Translate private to public IP addresses (or visa versa) over multiple public and/or private addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define PAT

A

Port Address Translation, allows systems to share a public IP address over ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Convert 192.168.1.0/24 to Subnet Mask Notation

A

IP Address 192.168.1.0

Subnet Mask 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define SDN

A

Software Defined Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SDN Layers

A

Application Layer
Control Layer
Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Database Encryption Types at Rest

A

HSM
TPM
SED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

UEFI Features

A

Secure Boot
Remote Attestation
Hardware Root of Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Software Deployment Environments

A

Developer
Test
Staging
Production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Embedded Systems Benefits

A

Cost
Size
Manageability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ICS Types

A

SCADA
DCS
PLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define SCADA

A

Supervisory Control and Data Acquisition; remote monitoring, telemetry, and report back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define DCS

A

Distributed Control Systems; process control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define PLC

A

Programmable Logic Controller; specialized input/output for human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define IoT

A

Internet of Things; smart tech for general consumer goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

IoT Protection Methods

A
Firmware Updates
Security Wrappers
Segmentation
Air Gap
Application Firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Define Air Gap

A

Networks with no external network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Development Methodologies

A

Waterfall
Spiral
Agile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Explain the Waterfall Model

A

Rigid step based process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Explain the Spiral Model

A

Phased approach; Determine requirements, risks, begin, develop and test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Explain the Agile Model

A

Flexible approach for external input integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Software Capitalization Maturity Model

A
Initial
Repeatable
Defined
Managed
Optimizing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

IDEAL Model

A
Initializing
Diagnosing
Establishing
Action
Learning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Purpose of Code Repositories

A
Store code
Coordination
Version Control
Code Reuse
Avoid Dead Code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Code Signing Process

A

Obtain Digital Certificate
Assign key to code
OS verifies hash of code with CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Software Testing Types

A

Stress test
UAT
Regression Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Define Software Stress Testing

A

Testing using automated scripts for multiple and/or simultaneous input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Define UAT

A

User Acceptance Testing, also referred to as “Beta testing”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Define Regression Testing

A

Correctional bug fixes

Checking for accidental changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Fagen Inspection Steps

A
Planning
Overview
Preparation
Meeting
Rework
Follow Up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Define Static Software Testing

A

Examine code for common errors without executing script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Define Dynamic Software Testing

A

Execute code with provided inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Define Fuzzing

A

Expose security problems by providing invalid, unexpected, or random data inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Fuzzing Input Methods

A

Developer supplied
Script Generation
Mutation testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Code Execution Types

A

Interpreted

Compiled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Define Interpreted Code

A

Code executed as written

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Define Compiled Code

A

Code compiled into an executable file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Types of Hypervisors

A

Type 1; “Bare Metal”

Type 2; OS

63
Q

Virtual Machine Security Concerns

A

VM Sprawl

VM Escape

64
Q

Cloud Computing Models

A

Private
Public
Hybrid

65
Q

Public Cloud Services

A

SaaS
IaaS
PaaS

66
Q

SaaS Vendor Responsibilities

A

Applications
OS
Hardware
Data Center

67
Q

PaaS Vendor Responsibilities

A

OS
Hardware
Data Center

68
Q

IaaS Vendor Responsibilities

A

Hardware

Data Center

69
Q

Cloud Security Concerns

A

Encryption

Access Controls

70
Q

Define CASB

A

Cloud Access Security Broker

71
Q

CASB Types

A

Network Based; intercept (Forward/Reverse Proxy)

API Based; monitor

72
Q

Define VDI

A

Virtual Desktop Infrastructure

73
Q

Facility Types

A
Data Centers
Server Rooms
Media Storage
Wiring Closets
Operation Centers
74
Q

Ideal Data Center Temperatures

A

64.4-86 F

75
Q

Ideal Data Center Dew Point

A

41.9-50.0 F (40-60% humidity)

76
Q

Explain the purpose of Hot and Cold Isles

A

Air flow:
Intake cold air to servers
Exhaust back end

77
Q

Fire Necessary Ingredients

A

Heat
Fuel
Oxygen

78
Q

Classes of Fire

A

A, B, C, D, K

79
Q

A Fuel Type

A

Combustibles

80
Q

B Fuel Type

A

Petroleum Based Products

81
Q

C Fuel Type

A

Electrical

82
Q

D Fuel Type

A

Metals

83
Q

K Fuel Type

A

Grease, cooking oils

84
Q

Installed Fire Fighting Equipment

A

Wet Pipe Systems
Dry Pipe Systems
Chemical Suppressants

85
Q

Define EMI

A

Electromagnet Interference

86
Q

EMI Eavesdropping Prevention

A

Faraday Cage
Protective Distribution Systems (PDS)
Ethernet port locking devices
Encryption (may bog down infrastructure)

87
Q

Security Control Types by Effect

A

Deterrent
Preventative
Detective
Corrective

88
Q

Mobile Device Tracking Protections

A

Encryption

Asset Tracking

89
Q

Cloud Elasticity Concerns

A

Confidentiality; sanitization of no longer used resources

90
Q

Define MANET

A

Mobile Ad Hoc Network

91
Q

Define API-based CASB

A

Application Programming Interface Cloud Access Security Broker;
out-of-band solution which improves network performance but reduces CASB response time

92
Q

Common Non-Regulatory RMFs

A
NIST
CIS Control
COBIT
FedRAMP
COPPA
93
Q

Common Regulatory RMFs

A
Basel III
PCI-DSS
HIPAA
FISMA
GLBA
94
Q

Define Basel III and Industry of Concern

A

International Financial Institutions

95
Q

Define PCI-DSS and Industry of Concern

A

Payment Card Industry Data Security Standard; Credit Cards

96
Q

Define HIPAA and Industry of Concern

A

Health Insurance Portability and Accountability Act; healthcare PHI

97
Q

Define FISMA and Industry of Concern

A

Federal Information Security Modernization Act; Government and Disaster Relief

98
Q

Define GLBA and Industry of Concern

A

Gramm-Leach-Bliley Act; United States Financial Institutions

99
Q

Define FedRAMP and Industry of Concern

A

Federal Risk and Authorization Management Program; Cloud services across executive departments and agencies

100
Q

Define COPPA and Industry of Concern

A

Children’s Online Privacy Protection Act; online privacy of children under 13 in the USA

101
Q

Define CIS Controls and Industry of Concern

A

Center for Internet Security Controls; IoT security

102
Q

Define NIST and Industry of Concern

A

National Institute of Standards and Technology; generic cyber security risk mitigation

103
Q

Define COBIT and Industry of Concern

A

Control Objectives for Information and Related Technologies; business process related to technology and quality control of information

104
Q

VM Escape Protection Methods

A

Regular Snapshots
Harden VM image (i.e. reduce attack surface)
Sandboxing

105
Q

Key Management Best Practices

A

Encryption and Decryption of data should be distributed
Use secure keys to encrypt data of any kind
Encrypted data using old keys should be kept as is
Use multiple encryption standards

106
Q

Steps to De-provisioning a Resource

A

Warning
Remove access/permissions
Backup
De-provision

107
Q

VM Sprawl Protection Methods

A

VM image library
VM life cycle management tools
Limit VM creation permissions

108
Q

Purpose of Automated Security Tools

A

Configuration validation using generated reports. Do not create, configure, or publish.

109
Q

Purpose of RAID

A

Improve performance

Data redundancy

110
Q

Run Time Code Benefits

A

Flexible OS support

Flexible web browsers support

111
Q

Compiled Code Benefits

A

Faster performance

More secure

112
Q

Vehicle Vulnerabilities

A

Bluetooth

Firmware

113
Q

Security Tasks which can be Automated

A

Monitor network for breaches
Take immediate action to overcome breaches
Update security policies on multiple servers

114
Q

Network Cabling Types

A

UTP (Shortest lengths and least resistant to EMI, $)
STP
Coaxial
Fiber Optic (Longest lengths and most resistant to EMI, $$$)

115
Q

Virtual Machine Network Modes

A
NAT
NAT Network
Bridged Adapter
Internal Network
Host-Only Network
116
Q

Explain VM NAT Mode

A

VM can communicate to the internet via the host

Each guest has it’s own separate network

117
Q

Explain VM NAT Network Mode

A

VM can communicate to the internet and other VMs on host network

118
Q

Explain VM Bridged Adapter Mode

A

VM share host’s network adapter and participate directly with host’s network. DHCP is controlled by host’s network.

119
Q

Explain VM Internal Network Mode

A

VMs can only communicate with each other

120
Q

Explain VM Host-only Network Mode

A

VMs can only communicate with host and each other

121
Q

Define Shadow IT

A

IT Projects managed outside of or without the knowledge of the IT department

122
Q

Explain purpose of Secure Boot

A

Protect system and data from unauthorized access

123
Q

Define a Supply Chain Assessment

A

Assess vendors hardware and software supply chain for availability and risks

124
Q

Define Scaling Out

A

Purchasing more machines to distribute the load

125
Q

Purpose of User Security Training

A

Awareness

Management support

126
Q

Perimeter Security Controls

A
Fence
Cage
Firewall
Border Router
IDS
IPS
127
Q

Securing a Public Kiosk Methods

A

Antivirus
Cable lock
System hardening

128
Q

Define Structured Programming

A

Provide optimal control over coherence, security, accuracy, and comprehensibility during SDLC

129
Q

NoSQL Database Security Concerns

A

No Default authentication
No Default Access Controls
Most do not use encryption at rest or in transit
*Less susceptible to SQL injection

130
Q

HIDS/HIPS Dependencies

A

Host system auditing capabilities

131
Q

Security Devices which Perform Stateful Inspections

A

IPS, IDS

132
Q

Define a Padded Cell

A

Transfers an attacker into simulated, safe environment where no critical data is stored

133
Q

Hotfix Patching Procedure

A

Apply and test in lab environment
Deploy to a set of systems (i.e. a department)
Deploy system-wide

134
Q

Patch Management Tools

A

WSUS

Group Policy

135
Q

Define DriveLock

A

Encrypts entire hard drive

136
Q

Bitlocker Encryption Components

A

C:\ volume
Master boot record
*External media will remain unencrypted (i.e. thumb drives)

137
Q

Define Van Eck Phreaking

A

Collection of electronic emissions for eavesdropping

138
Q

Types of Firewalls

A

Stateless packet filtering
Stateful Circuit-level (layer 5)
Application Level (level 7)

139
Q

Firewall Filter Dependencies

A

IP address

Port number

140
Q

Application Level Gateway Features

A

OSI Layer 7
Stops and inspects each packet
Inspects encrypted packets
Examines entire content
Interface with other application layer protocol
Can filter based on user, group, and data
Slowest form of firewall

141
Q

VPN Protocols

A

L2TP (employs IPsec)
PPP (uses PAP)
PPTP (uses CHAP)
L2F

142
Q

Purpose of Parabolic, High Gain Antennae

A

Connect networks between buildings wirelessly

143
Q

Define 802.16

A

WiMAX implementation of IEEE committee for metropolitan WAN

144
Q

Define RAS

A

Remote Access Service; enables users to remotely dial in to a server

145
Q

Virtualization Benefits

A

Server consolidation
Migrate systems between hardware
Increase utilization of hardware resources
Isolation of systems and applications

146
Q

Disadvantages of Virtualization

A

Compromise of host system or hardware failure could effect multiple guest systems

147
Q

VLAN Switch Benefits

A
Logical grouping of LANs,
Simplify device moves,
Control broadcast traffic and create collision domains based on logic,
Control security,
Load balance network traffic
148
Q

VLAN Connection Methods

A

Routers

Layer 3 Switches

149
Q

SDN Control Layer Function

A

Removes individual control planes on networking devices and replaces with a single control plane

150
Q

Purpose of a Virtual Switch

A

Facilitates communication between virtual machines by checking data packets before moving them to destination

151
Q

Virtual Network Key Facts

A

VM support unlimited number of VLAN,
Multiple VLAN can be associated with a single network adapter,
VLAN is dependent on host configuration, OS, and hardware,
Network access depends on OS as a part of the network

152
Q

Cloud Storage Features

A

Distributed resources acting as one federated cooperative storage,
High fault tolerance through redundancy and distribution of data,
Highly durable through creation of versioned copies

153
Q

Define a Reciprocal Agreement

A

Contract between two organizations to share resources in the event of a disaster