CH14 Automation Flashcards

1
Q

Which term is used in software development to refer to the method in which app and platform updates are committed to a production environment rapidly?

a. Continuous delivery
b. Continuous integration
c. Continuous deployment
d. Continuous monitoring

A

c. Continuous deployment

Continuous deployment is a software development method in which app and platform updates are committed to production rapidly.

Continuous delivery is a software development method in which app and platform requirements are frequently tested and validated for immediate availability.
Continuous integration is a software development method in which code updates are tested and committed to a development or build server/code repository rapidly.
Continuous monitoring is the technique of constantly evaluating an environment for changes so that new risks may be more quickly detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following utilizes a well-written set of carefully developed and tested scripts to orchestrate runbooks and generate consistent server builds across an enterprise?

a. Software as a Service (SaaS)
b. Infrastructure as a Service (IaaS)
c. Infrastructure as a Code (IaC)
d. Software Defined Networking (SDN)

A

c. Infrastructure as a Code (IaC)

IaC is designed with the idea that a well-coded description of the server/network operating environment will produce consistent results across an enterprise, and significantly reduce IT overhead costs through automation while precluding the existence of security vulnerabilities. SDN uses software to define networking boundaries, but does not necessarily handle server architecture in the same way that IaC can. Infrastructure as a Service (IaaS) is a computing method that uses the cloud to provide any or all infrastructure needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of system would classify traffic as malicious or benign based on explicitly defined examples of malicious and benign traffic?

a. Artificial intelligence
b. Machine learning
c. Deep learning
d. Generative adversarial network

A

b. Machine Learning

A machine learning (ML) system uses a computer to accomplish a task without ever being explicitly programmed to do it. In the context of cybersecurity, ML generally works by analyzing example data sets to create its own ability to classify future items presented. If the system was presented with large datasets of malicious and benign traffic, it will learn which is malicious and use that to categorize future traffic presented to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly