Chapter 3: Architecture and Design2 Flashcards

1
Q

Departmental isolation uses a _______, whereas a computer isolation uses _________.

A

VLAN, airgaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ______ is a boundary layer between the LAN and the ______. The website situated there is called an ___________ and is normally accessed using a username and a password.

A

DMZ, WAN, extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System _________ is where a virtual machine is running out of resources.

A

Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The best way to prevent a SQL injection attack is by using _________ ____________. Another method is to use _______ validation.

A

Store procedures, input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____ is used is to hide the internal network, whereas _____ is multiple internal connections to one external connection.

A

NAT, PAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_______ code is source code that is never used by the application.

A

Dead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network intrusion detection system relies on __________ and _____________ to sense changes to the local network.

A

Sensors, collectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An _______________ switch can be used to connect multiple switches together and prevents looping.

A

Aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The cloud model ___________ as a Service is where you lease a bespoke application that cannot be _____________ and is normally accessed via a web browser.

A

Software, modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a company has the account lockout set to a maximum of three attempts, an attacker can log in twice to all of the computer systems without being detected. However, if the company installs a _______ system that uses a _____________ engine, once the third attempt is made, the attacker is locked out.

A

SIEM, correlation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VM _________ is where an attacker gains access to a virtual machine and then attacks the host.

A

Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company uses a lease line to connect two sites, London and Paris. Due to budget constraints, they are going to replace the lease line with a _____-__-_____ VPN using ________ __ mode.

A

Site-to-site, always on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____________ _______ is where companies in the same industry share the cost of creating and hosting a cloud-based application.

A

Community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a SIEM system produces a ________ positive, it could be that the wrong _______ filter is being used.

A

False, input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Group policy enforces policies for on-premise computers and ________ ________ _____________ __________ enforces policies for cloud-based computers.

A

Cloud access security broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A waterworks and an oil __________ and both examples of _________ networks.

A

Refinery, SCADA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

________________ can be used to mask data or code, whereas ________________ is used to embed data inside other data.

A

Obfuscation, steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ ________ is where an unmanaged virtual machine has been placed on a virtual network. The administrator doesn’t know about it, so it will not be patched and end up as a vulnerability on the network.

A

VM sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company is building a new data center in Galway and is using ___________ to control access to the data center and using a ______ system to help provide availability of the computer systems and prevent them from _____________ and crashing.

A

Mantraps, HVAC, overheating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____________ __________ is the cloud model that has more control, whereas _________________ as a Service is the cloud service that has most control as you have to install, ___________, and patch the operating system.

A

Private cloud, infrastructure, configure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company has moved the desktops in the customer services departments so that people walking past the outside windows cannot ___________ surf and has installed ________ ________ as an additional precaution.

A

Shoulder, screen filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__________ is the process of testing a new application with production _______. This can be carried out by using _____________ to isolate them from the corporate network.

A

Staging, data, sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Using a master __________ to roll out desktop computers ensures that they have a consistent security __________.

A

Image, baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Different occupations can be regulated by __________ ____________ frameworks. An example of this would be PCI DSS for __________ ______ handling.

A

Industry frameworks, credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A high volume of web traffic can be controlled by using a ______ ___________, whereas a high volume of DDoS traffic can be controlled by using a ______ ___________ or a stateful ___________.

A

Load balancer, DDoS mitigator, firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ________ box penetration tester can use a technique called __________ to carry out dynamic analysis of the ________ of a newly created application so that any _______________ can be addressed.

A

White, fuzzing, code, vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PowerShell is an example of infrastructure as _______ where automation is paramount.

A

Code

25
Q

To protect data at rest on a laptop, full disk encryption can be used. However, this will require a _____ chip to be built into the laptop’s motherboard.

A

TPM

26
Q

The IT director is writing a new policy for the use of a new system and the technical lead is designing technical controls for this system. What they are both participating in is called _________ __________.

A

Control diversity

27
Q

Using a mobile phone to provide internet access to a laptop is called ____________.

A

Tethering

28
Q

____________ ___________ is derived from legislation and ensures compliance.

A

Regulatory framework

29
Q

The cybersecurity incident response team has launched a new ____________ so that they can discover the new web-based attack methods being used.

A

Honeypot

30
Q

A __________ __ _______ model is where the security team uses multiple layers of protection so that if one layer fails, the _______ layer should prevent the attack.

A

Defence in depth, next

31
Q

In a BYOD environment, inserting an SD card to keep business data separate from your personal data is an example of ___________ _____________, also known as _________________.

A

Storage segmentation, containerization

32
Q

____-_____________ configuration can be used to roll back to a previous state, should any unforeseen problems occur. In a virtual environment, a __________ can be used.

A

Non-persistent, snapshot

33
Q

PGP uses a _____ __ _________, FDE uses a _________ _____ __ ________, and two separate ______ use a bridge of trust model, commonly known as a _______ _________.

A

Web of trust, hardware root of trust, CAs, trust model

34
Q

A company has leased a SaaS application for its sales team, but they have complained about the interface and want customization to be carried out. The IT director has informed the sales team that these proposed changes _________ be made.

A

Cannot

35
Q

RAID 5 uses ________ parity and can lose ______ disk, whereas RAID 6 uses _________ parity and can afford to lose ______ disks. RAID __ is more resilient.

A

Single, one, double, two, 6

36
Q

To secure a mobile phone, you should use ________ passwords, ________ ______, and full disk _____________.

A

Strong, screen locks, encryption

37
Q

Vendor-specific _________ are rolled out with each piece of equipment to show you how they should be set up.

A

Guides

38
Q

If a company wishes to move its bespoke applications to the cloud but still maintain them, it will adopt the cloud model ___________ as a Service.

A

Platform

39
Q

A refrigerator is an example of an _____ device, whereas a life support system is an example of ______.

A

IoT, SoC

40
Q

____________ is a development life cycle model that requires the whole stage to complete before we move on to the next stage. ________ can start multiple stages at one time and its aim is customer satisfaction. It is similar to scrum.

A

Waterfall, agile

41
Q

The ______ ______ protocol is used for voice traffic over IP networks and the secure version is called _______.

A

Real time, SRTP

42
Q

___________ as a Service can provide identity management using _______ tokens.

A

Security, SAML

43
Q

Should a SIEM system find a false __________ on a known ____________ operating system, it may be using ________ input filters.

A

Positive, hardened, wrong

44
Q

Kerberos authentication and SIEM systems are both reliant on ______
_______________.

A

Time synchronization

45
Q

To mitigate attacks on household IoT devices, ensure that the default _____________ ____ ___________ are changed ________________ and that they cannot ___________ access the internet.

A

Username and passwords, immediately, directly

46
Q

A cybersecurity response team can capture all of the traffic going to one port on a switch using a ______ _________ or _____.

A

Port mirror, tap

47
Q

Containers are __________ virtual machines, whereas containerization is __________ _______________ on a mobile device.

A

Isolated, storage segmentation

48
Q

A boundary layer between the LAN and the WAN.

A

DMZ

49
Q

Taking a list of applications on a laptop two months apart.

A

Baseline

50
Q

Prevents a SQL injection attack.

A

Stored procedure

51
Q

A control that helps you rekey an ID badge.

A

Administrative

52
Q

Testing an application with real data prior to going into production.

A

Staging

53
Q

Attack a virtual host from a guest virtual machine.

A

VM escape

54
Q

Type of switch that connects multiple switches together.

A

Aggregation

55
Q

Used to isolate applications for patching, isolation, or testing.

A

Sandboxing

56
Q

Wireless network for visitors or employees at lunchtime.

A

Guest

57
Q

The attack vector for visitors or employees.

A

Network interface

58
Q

A life support machine is an example of this.

A

SoC

59
Q

Leasing a software package on the cloud.

A

SaaS

60
Q

A control that mitigates risk.

A

Technical

61
Q

Putting an unmanaged VM onto a virtual network.

A

VM sprawl

62
Q

To prevent an attack on a home IoT device, turn off the…

A

Internet connection