B.3.2 Security+ SY0-601 Domain 2: Architecture and Design Flashcards
189 questions (plus some of my own)
Which Microsoft tool can be used to review a system’s security configuration against recommended settings?
Microsoft Security Compliance Toolkit
Which of the following describes a configuration baseline?
A list of common security settings that a group or all devices share
What should you consider security baselines?
Dynamic
You would like to get a feel for the amount of bandwidth you are using in your network. What is the first thing you should do?
Establish a baseline
Which of the following is a technology that tries to detect and stop sensitive data breaches, or data leakage incidents, in an organization?
Data loss prevention
DLP can be implemented as a software or hardware solution that analyzes traffic in an attempt to detect sensitive data that is being transmitted in violation of an organization’s security policies.
Which of the following DLP implementations analyzes traffic for data containing such things as financial documents, social security numbers, or key words used in proprietary intellectual property?
Network DLP
What does DLP mean?
Data Loss Prevention
Travis is sending a highly confidential email to Craig that contains sensitive data. Which of the following should Travis implement to ensure that only Craig is able to read the email?
Encryption
Which form of cryptography is best suited for bulk encryption because it is so fast?
Symmetric key cryptography
Which of the following security solutions would prevent a user from reading a file that she did not create?
Encrypted File System (EFS)
What is an EFS?
A Windows file encryption option that encrypts individual files so that only the user who created the file can open it
You’ve used BitLocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TPM chip, so you’ve used an external USB flash drive to store the BitLocker startup key.
You use EFS to encrypt the C:\Secrets folder and its contents.
Which of the following is true in this scenario? (Select two.)
If the C:\Secrets\confidential.docx file is copied to an external USB flash drive, the file will be saved in an unencrypted state.
By default, only the user who encrypted the C:\Secrets\confidential.docx file will be able to open it.
Which of the following database encryption methods encrypts the entire database and all backups?
Transparent Data Encryption (TDE)
Which of the following cloud storage access services acts as a gatekeeper, extending an organization’s security policies into the cloud storage infrastructure?
A cloud-access security broker
What is the on-premises, cloud-based software tool that sits between an organization and a cloud service provider called?
Cloud-access security broker
Which of the following can provide the most specific protection and monitoring capabilities?
Cloud-access security broker
You are purchasing a hard disk from an online retailer over the internet. What does your browser use to ensure that others cannot see your credit card number on the internet?
Secure Sockets Layer (SSL)
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
Transport Layer Security (TLS)
SSL
Which of the following protocols can TLS use for key exchange? (Select two.)
Diffie-Hellman
Rivest-Shamir-Adleman (RSA)
Which protocol does HTTPS use to offer greater security in web transactions?
SSL
SSL (Secure Sockets Layer) operates at which layer of the OSI model?
Session
When using SSL authentication, what does the client verify first when checking a server’s identity?
The current date and time must fall within the server’s certificate-validity period
You want to allow traveling users to connect to your private network through the internet. Users connect from various locations, including airports, hotels, and public access points like coffee shops and libraries. As such, you won’t be able to configure the firewalls that might be controlling access to the internet in these locations.
Which of the following protocols would MOST likely be allowed through the widest number of firewalls?
SSL
Which method can you use to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence?
Hashing
You have been asked to deploy a network solution that includes an alternate location where operational recovery is provided within minutes of a disaster. Which of the following strategies would you choose?
Hot site
Which of the following is a recovery site that may have electricity connected, but there are no servers installed and no high-speed data lines present?
Cold site
Daily backups are completed at the ABD company location, and only a weekly backup is maintained at another network location. Which of the following disaster recovery strategies is ABD using?
Warm site
If your mission-critical services have a maximum tolerable downtime (MTD) or a recovery-time objective (RTO) of 36 hours, what is the optimum form of recovery site?
Warm site
A honeypot is used for which purpose?
To delay intruders in order to gather auditing data
Which of the following BEST describes a honeyfile?
A single file setup to entice and trap attackers
You want to create a collection of computers on your network that appear to have valuable data but actually store fake data that could entice a potential intruder. Once the intruder connects, you want to be able to observe and gather information about the attacker’s methods.
Which feature should you implement?
Honeynet
Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model?
PaaS delivers everything a developer needs to build an application on the cloud infrastructure
Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?
SaaS
You are the security administrator for your organization. You have implemented a cloud service to provide features such as authentication, anti-malware, intrusion detection, and penetration testing.
Which cloud service have you most likely implemented?
SECaaS
A group of small local businesses have joined together to share access to a cloud-based payment system.
Which type of cloud is MOST likely being implemented?
Community
What does Public Cloud do?
Provides cloud services to just about anyone
What does the Private Cloud do?
Provides cloud services to a single organization
What does the Community Cloud do?
Allows cloud services to be shared by several organizations
What does the Hybrid Cloud do?
Integrates one cloud service with other cloud services
The IT manager has tasked you with installing new physical machines. These computer systems are barebone systems that simply establish a remote connection to the data center to run the user’s virtualized desktop.
Which type of deployment model is being used?
Thin client
Which of the following is an advantage of software-defined networking (SDN)?
More granular control
Which of the following BEST describes the Application SDN layer?
Communicates with the Control layer through the northbound interface
Which SDN layer would a load balancer that stops and starts VMs as resource use increases reside on?
Application
Software defined networking (SDN) uses a controller to manage devices. The controller is able to inventory hardware components on the network, gather network statistics, make routing decisions based on gathered data, and facilitate communication between devices from different vendors. It can also be used to make widespread configuration changes on just one device.
Which of the following best describes an SDN controller?
The SDN controller is software
From which layer does the Application layer receive its requests?
Control Layer
Which layer is also known as the Infrastructure layer?
Physical Layer
What layer communicated with the Control layer through the northbound interface?
Application Layer
What layer provides the Physical layer with configuration and instructions?
Control Layer
What type of southbound APIs do individual networking devices use on this layer to communicate with the control plane?
Physical Layer
Which of the following does the Application layer use to communicate with the Control layer?
Northbound APIs
Which of the following BEST describes the Physical SDN layer?
Also known as the Infrastructure layer
Network engineers have the option of using software to configure and control the network rather than relying on individual static configuration files that are located on each network device.
Which of the following is a relatively new technology that allows network and security professionals to use software to manage, control, and make changes to a network?
Software-defined networking (SDN)
Which APIs do individual networking devices use to communicate with the control plane from the Physical layer?
Southbound
Which of the following is a disadvantage of software defined networking (SDN)?
SDN standards are still being developed
What is the system that connects application repositories, systems, and IT environments in a way that allows access and exchange of data over a network by multiple devices and locations called?
Integration
Which of the following are disadvantages of server virtualization?
A compromised host system might affect multiple servers
Which of the following are advantages of virtualization? (Select two.)
Centralized administration
Easy migration of systems to different hardware
Which of the following devices is computer software, firmware, or hardware that creates and runs virtual machines?
Hypervisor
What is the limit of virtual machines that can be connected to a virtual network?
Unlimited
Which of the following is an exploit in which malware allows the virtual OS to interact directly with the hypervisor?
Escape
What is an Escape?
It is an exploit in which malware allows the operating system within a virtual machine to break out and interact directly with the hypervisor.
You have a development machine that contains sensitive information relative to your business. You are concerned that spyware and malware might be installed while users browse websites, which could compromise your system or pose a confidentiality risk.
Which of the following actions would BEST protect your system?
Run the browser within a virtual environment
Which of the following is an advantage of a virtual browser?
Protects the host operating system from malicious downloads
Which of the following devices facilitates communication between different virtual machines by checking data packets before moving them to a destination?
Virtual switch
Which type of hypervisor runs as an application on the host machine?
Type 2
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating systems’ versions and editions.
Currently, all of your virtual machines used for testing are connected to the production network through the hypervisor’s network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code.
To prevent issues, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other.
What should you do? (Select two. Both responses are part of the complete solution.)
Create a new virtual switch configured for host-only (internal) networking
Connect the virtual network interfaces in the virtual machines to the virtual switch
Which of the following is a network virtualization solution provided by Microsoft?
Hyper-V
Which of the following virtual devices provides packet filtering and monitoring?
VFA
Which of the following statements about virtual networks is true? (Select two.)
Multiple virtual networks can be associated with a single physical network adapter
A virtual network is dependent on the configuration and physical hardware of the host operating system
Which application development model approaches software development as a continuous, changing process with never-ending versions, bug fixes, and enhancements?
Agile
Which of the following is the first step in the Waterfall application development model?
Requirements
Which of the following is considered a drawback of the Waterfall application development life cycle?
Requirements are determined at the beginning and are carried through to the end product
Which of the following are the two main causes of software vulnerabilities? (Select two.)
Design flaws
Coding errors
You are performing a security test from the outside on a new application that has been deployed.
Which secure testing method are you MOST likely using?
Dynamic
What is a set of software development tools called that can be installed as one unit and provides code frameworks or code snippets to help development go faster?
Software Development Kit (SDK)
You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration.
Which advantages would there be to switching to Active Directory? (Select two.)
Centralized configuration control
Centralized authentication
What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information?
Active Directory
What is a “Logical organization of resources”?
Organizational unit (OU)
What is a “Collection of network resources”?
Domain
What is a “Collection of related domain trees”?
Forest
What is a “Network resource in the directory”?
Object
What is a “Group of related domains”?
Tree
What AD Domain is used to manage individual desktop workstation access?
CORPWS7
Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?
HMAC
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder.
Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do?
Have Marcus log off and log back in
Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
Access token
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Smart card
A smart card can be used to store all but which of the following items?
Biometric template original