Chap3 - Architecture and Design Flashcards
What type of documents should I review prior to creating policy documents related to the company’s computer systems?
Prior to creating policies, companies should look at all regulations and frameworks to ensure that they comply with them.
What type of frameworks are COBIT and ITIL and are they legally enforceable?
COBIT and ITIL are non-regulatory and not legally enforceable as they are both good practice frameworks.
Why would a multinational company purchase broadband from two different companies at the same time?
Purchasing broadband from two different companies provides vendor diversity, therefore, if one company fails, then the other still provides broadband.
What is the name of the boundary layer between the LAN and WAN and what is the name of the web server located there?
The boundary layer between the LAN and the WAN is called the DMZ; it hosts the extranet web server that is normally used for suppliers and needs credentials to access it
What would be the reason for the IT team to air gap a laptop computer?
If a laptop had sensitive information such as research and development data, the IT team could isolate it from the network by air gapping it so nobody could connect to it.
When a company sets up full device encryption on a laptop, what hardware must be built into the motherboard to store the keys?
When full disk encryption such as BitLocker is used on a laptop, the laptop needs to have either a TPM chip or an HSM to store the encryption keys.
Why would the IT security team roll out a honeypot and what would the benefits be?
An IT security team would roll out a honeypot when they want to observe the attack methods being used by an attacker. The benefits would be to enable them to defend against such an attack.
You are the network administrator and need to deal with a high volume of website traffic, as well as an exceptionally large volume of DDoS traffic. What device(s) would you use?
A network administrator would use a load balancer to balance the website traffic so that each request would go to the least utilized host, but would use a firewall to prevent the DDoS traffic from entering the company network.
A company has two different locations and has been paying $10,000 a year for a leased line. How can they connect the two locations with a much cheaper solution?
A site-to-site VPN is a solution that can connect two different locations as long as it is set to always on; this is a much cheaper solution that a leased line.
How can a security analyst capture the network traffic going to one port on the switch?
Port mirroring or a tap can capture traffic going to a port on a switch and display it on another device for analysis.
What is the role of a VPN concentrator?
The role of the VPN concentrator is to set up a secure session.
What type of trust model is being used if I install BitLocker on my laptop to provide full disk encryption?
If I am using full disk encryption, the trust model being used is known as a hardware root of trust.
Why would a company make standard operating procedures?
Standard operating procedures are the step-by-step instructions on how to carry out a task.
The company research and development department needs a laptop for one of its employees. How should the security administrator set this machine up so that it isn’t on the normal network but isolated?
The company would set this laptop up so that it is air gapped—that would isolate it from the network.
Your company leases business units and you have four different companies located on the same switch. How should you set up the switch so that they remain isolated from the other companies?
You would create four VLANs and put each company in its own VLAN, therefore, isolating them from each other. This would give control to each VLAN and reduce the broadcast domains.
The application whitelist is a list of approved applications and the blacklist is a list of banned applications. If my new application called App1 does not run or install, is it because it is on the blacklist? What reason could there be for it not running or installing?
If an application will not run or install, it is simply because it has not been added to the whitelist; it does not necessarily need to be on the blacklist. The blacklist is for applications that will never be installed as they are banned.
What common threat do printers and multi-functional devices both share as an attack vector against them?
The most common threat to printers and multifunction devices would be the network interface as most devices are now fully connected.
A research and development department wants to test some applications that they have developed. However, some of these applications could be quite dangerous. What type of environment should the IT manager recommend for them to use but at the same time protect the company’s existing network with?
Sandboxing is where an isolated virtual machine can be used for patching, testing, or isolation of a dangerous application, therefore, the research and development department would put it in a sandbox.
Your company houses one of the largest data centers in Europe and they have just expanded a site in London. But since then, there have been fluctuations in temperature at only that site. What is causing this temperature change and how can this be remedied?
The temperature rise is due to the additional increase in computers but it looks like they have not set up the hot aisles and cold aisles to regulate the temperature.
A professor has just automated most of his household gadgets using IoT technology. He told a colleague that it was very simple as all of the devices worked straight out of the box. What are two security measures that he may have overlooked?
The professor has failed to change the default username or the default password of each of these devices, leaving himself vulnerable to attack.