chapter 22 terms and definitions Flashcards

1
Q

1st layer of OSI

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2nd layer of OSI

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3rd layer of OSI

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4th layer of OSI

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5th layer of OSI

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6th layer of OSI

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7th layer of OSI

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing model in which a third party CSP offers virtualized compute resources such as servers, data storage and network equipment on demand over the internet to clients.

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides customers with a complete cloud platform, including hardware, software, and infrastructure.

A

PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud-based software delivery model that allows end-users to access software applications over the internet.

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Separating network elements into segments and regulating traffic between them.

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A capability that must be enabled on firewalls, secured web gateways, and CASB’s to determine if the next system in a communication chain is legitimate or not.

A

Instance Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How did cloud security contributed to business continuity during the 2020 Covid-19 pandemic?

A

By keeping remote security going when it was rushed to be implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To combine multiple security policies to ensure cloud app security across authorized and unauthorized applications, managed and unmanaged devices.

A

CASB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A set of defined rules that enable different software components to communicate and transfer data.

A

API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An active measure to prevent errors from propagating through a system and causing trouble.

A

API content inspection

17
Q

A term used to denote the policies and procedures employed to connect to the IAM systems of the enterprise.

A

Secrets Management

18
Q

Practice that enables organizations to securely store, access, and manage digital authentication credentials, including passwords, keys, APIs, tokens, and certificates.

A

Secrets Manager

19
Q

How are permissions handled in a cloud environment?

A

Putting people in groups with certain checks and privileges based on their position in the environment.

20
Q

What are the purposes of public and private subnets in the cloud?

A

To separate public and private communication and data into two controlled environments of the cloud.

21
Q

What is the purpose of a Next-Gen SWG?

A

To protect enterprises from sophisticated cloud-enabled threat and data risks.

22
Q

What are Next-Gen SWG capabilities

A

Application control, user and entity behavior analytics and machine learning.

23
Q

A systematic procedure for allocating resources to mobile users in a time-varying environment.

A

dynamic resource allocation

24
Q

Who should maintain the keys when data in encrypted in the cloud?

A

The enterprise

25
Q

What is a common mistake in cloud computing, in terms of security?

A

Not encrypting data in a cloud system.

26
Q

In what OSI RM layers do next-gen firewalls operate?

A

Layer 4-7

27
Q

How is high availability achieved?

A

Having multiple different physical systems working together to ensure data is redundantly and resiliently stored.

28
Q

Why is it important to define cloud security requirements in the ToS agreement?

A

Because the responsibility of the security to the cloud server is up to the enterprise.

29
Q

With what two entities are cloud security controls shared?

A

Cloud Service Provider and third party solutions.

30
Q

What is the purpose of security groups?

A

Set rules and policies to manage scalability in a cloud environment.

31
Q

How do firewalls work when operating in the cloud

A

By blocking unauthorized connections to the cloud.

32
Q

A framework of business processes, policies, and technologies that manage electronic or digital identities.

A

IAM

33
Q

Cloud Service that enables the creation of a private connection between a VPC and a supported AWS by PrivateLink using its private IP address.

A

VPC Endpoint

34
Q

Packages, apps, and dependencies all bundled together.

A

Manifest

35
Q

What are some common data-specific security frameworks?

A

SOC1, SOC2, HITRUST, PCI, and FedRAMP

36
Q

How are zones used in cloud security?

A

Replicate, load-balancing, and High Availability

37
Q

What are two requirements of cloud-specific audits?

A

Understanding the cloud system and Data Security.

38
Q

How are cloud-based resources controlled?

A

Policy.