Chapter 3: Architecture and Design2 Flashcards
Departmental isolation uses a _______, whereas a computer isolation uses _________.
VLAN, airgaps
A ______ is a boundary layer between the LAN and the ______. The website situated there is called an ___________ and is normally accessed using a username and a password.
DMZ, WAN, extranet
System _________ is where a virtual machine is running out of resources.
Sprawl
The best way to prevent a SQL injection attack is by using _________ ____________. Another method is to use _______ validation.
Store procedures, input
A _____ is used is to hide the internal network, whereas _____ is multiple internal connections to one external connection.
NAT, PAT
_______ code is source code that is never used by the application.
Dead
A network intrusion detection system relies on __________ and _____________ to sense changes to the local network.
Sensors, collectors
An _______________ switch can be used to connect multiple switches together and prevents looping.
Aggregation
The cloud model ___________ as a Service is where you lease a bespoke application that cannot be _____________ and is normally accessed via a web browser.
Software, modified
If a company has the account lockout set to a maximum of three attempts, an attacker can log in twice to all of the computer systems without being detected. However, if the company installs a _______ system that uses a _____________ engine, once the third attempt is made, the attacker is locked out.
SIEM, correlation
VM _________ is where an attacker gains access to a virtual machine and then attacks the host.
Escape
A company uses a lease line to connect two sites, London and Paris. Due to budget constraints, they are going to replace the lease line with a _____-__-_____ VPN using ________ __ mode.
Site-to-site, always on
_____________ _______ is where companies in the same industry share the cost of creating and hosting a cloud-based application.
Community cloud
When a SIEM system produces a ________ positive, it could be that the wrong _______ filter is being used.
False, input
Group policy enforces policies for on-premise computers and ________ ________ _____________ __________ enforces policies for cloud-based computers.
Cloud access security broker
A waterworks and an oil __________ and both examples of _________ networks.
Refinery, SCADA
________________ can be used to mask data or code, whereas ________________ is used to embed data inside other data.
Obfuscation, steganography
___ ________ is where an unmanaged virtual machine has been placed on a virtual network. The administrator doesn’t know about it, so it will not be patched and end up as a vulnerability on the network.
VM sprawl
A company is building a new data center in Galway and is using ___________ to control access to the data center and using a ______ system to help provide availability of the computer systems and prevent them from _____________ and crashing.
Mantraps, HVAC, overheating
____________ __________ is the cloud model that has more control, whereas _________________ as a Service is the cloud service that has most control as you have to install, ___________, and patch the operating system.
Private cloud, infrastructure, configure
A company has moved the desktops in the customer services departments so that people walking past the outside windows cannot ___________ surf and has installed ________ ________ as an additional precaution.
Shoulder, screen filters
__________ is the process of testing a new application with production _______. This can be carried out by using _____________ to isolate them from the corporate network.
Staging, data, sandboxing
Using a master __________ to roll out desktop computers ensures that they have a consistent security __________.
Image, baseline
Different occupations can be regulated by __________ ____________ frameworks. An example of this would be PCI DSS for __________ ______ handling.
Industry frameworks, credit card
A high volume of web traffic can be controlled by using a ______ ___________, whereas a high volume of DDoS traffic can be controlled by using a ______ ___________ or a stateful ___________.
Load balancer, DDoS mitigator, firewall
A ________ box penetration tester can use a technique called __________ to carry out dynamic analysis of the ________ of a newly created application so that any _______________ can be addressed.
White, fuzzing, code, vulnerabilities