Chapter 5 Flashcards
- The Symmetric encryption has what benefit compared to the asymmetric encryption?
A. Symmetric encryption is faster to run
B. Symmetric encryption uses 2 keys
C. Symmetric encryption is more secure
D. Symmetric encryption uses longer keys
A. The correct answer is Symmetric encryption is faster to run.
Symmetric cryptography is faster to run (in terms of both encryption and decryption) because the keys used are much shorter than they are in asymmetric cryptography. Additionally, the fact that only one key gets used (versus two for asymmetric cryptography) also makes the entire process faster.
- Which of the listed options gives users access to web-based applications by the cloud providers?
A. DaaS
B. PaaS
C. SaaS
D. IaaS
C. The correct answer is SaaS. Software as a service (SaaS) is a
cloud-based software delivery model in which the cloud provider develops and maintains cloud application software, provides automatic software updates, and makes software available to its customers via the internet on a pay-as-you-go basis.
- The deception technique that logs on going events such as user logins and logout after configuring a honeypot is called?
A. Honey telemetry
B. Fake nets
C. Honeynets
D. Fake telemetry
D. The correct answer is Fake telemetry. Telemetry is the
automated communication processes from multiple data sources. Telemetry data is used to improve customer experiences, monitor security, application health, quality, and performance. When monitoring an application to ensure acceptable uptime and performance for your users, you need to start with the components. This includes the physical servers themselves and, to start, their overall availability
- What datacenter element should you be worried about when infrared cameras are being used to ensure that the servers within the datacenter are utilized properly?
A. Hot aisle and cold aisle
B. Humidity
C. Electromagnetic interference
D. Radio-frequency interference
A. The correct answer is Hot aisle and cold aisle. Hot / cold aisle is a layout design for server racks in a data center. The goal of it is to increase the effectiveness of the cooling system by managing air flow in the data center.
In the simplest form, this design involves lining up server racks in different rows with cold air facing one way and hot exhausts facing the other. Typically, cold aisles, which are usually composed of rack fronts, face AC output, and hot aisles face return ducts
- Which of the following procedures can be used to provide an important layer of security between the user interface and the database?
A. Security procedures
B. Database procedures
C. Interface procedures
D. Stored procedures
D. The correct answer is Stored procedures. A stored procedure provides an important layer of security between the user interface and the database. It supports security through data access controls because end users may enter or change data, but do not write procedures. A stored procedure preserves data integrity because information is entered in a consistent manner. It improves productivity because statements in a stored procedure only must be written once.
- Which of the listed models allows a system to boot their
resources from a centralized server environment instead of their hard drives?
A. Thin client
B. Containers
C. Edge computing
D. Microservices
A. The correct answer is Thin client. A thin client is a simple
computer that has been optimized for establishing a remote
connection with a server-based computing environment. The server does most of the work, which can include launching software programs, performing calculations, and storing data.
- Which of the following is not a popular means of shielding information from being compromised?
A. SAML
B. OAuth
C. TACACS+
D. ABAC
B. The correct answer is OAuth. OAuth (Open Authorization) is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
- Which of the following IEEE technologies will you use to
develop an embedded system that would provide peer-to-peer communications, low cost and low-power?
A. 802.1X
B. Zigbee
C. Radius
D. WPA
B. The correct answer is Zigbee. Code reuse attacks are attacks
repurposing existing components. In particular, they repurpose existing code to perform arbitrary computations. It is commonly used in control-flow hijacking vulnerabilities, which are memory corruption bugs that allow an attacker to take over a code pointer.
- An off-site cold backup usually operates on what backup technology?
A. Tape
B. Cloud
C. Network-attached network
D. Storage area network
A. The correct answer is Tape. Tape backup is the practice of
periodically copying data from a primary storage device to a tape cartridge so the data can be recovered if there is a hard disk crash or failure. Tape backups can be done manually or be programmed to happen automatically with appropriate software. An off-site cold backup usually operates on Tape backup technology.
- What are the two most important features that deploying a NIC teaming on a server?
A. NIC offers lower latency and lower throughput
B. NIC offers lower latency and greater throughput
C. NIC offers fault tolerance and lower throughput
D. NIC offers fault tolerance and greater throughput
D. The correct answer is NIC offers fault tolerance and greater
throughput. NIC teaming is the process of combining multiple
network cards together for performance, load balancing, and
redundancy reasons.
- Which of these options would serve as a fault-tolerant solution that can handle two drives failing?
A. RAID 6
B. RAID 5
C. RAID 4
D. RAID 3
A. The correct answer is RAID 6. In RAID 6, two disk drives can fail without total data loss occurring. This means better security than RAID 5, but it also means even slower write speeds since one additional checksum must be created.
- Which of these cryptosystems would most often provide cryptographic algorithm with low latency?
A. Symmetric encryption
B. Lightweight cryptography
C. Homomorphic encryption
D. Steganography
A. The correct answer is Symmetric encryption. Symmetric
cryptography is faster to run (in terms of both encryption and
decryption) because the keys used are much shorter than they are in asymmetric cryptography. Additionally, the fact that only one key gets used (versus two for asymmetric cryptography) also makes the entire process faster.
- Which of these options will surely protect a phone from attack or breach from the charger being used to charge it?
A. USB data locker
B. Lighting
C. Fencing
D. USB data blocker
D. The correct answer is USB data blocker. A USB data blocker is a device that plugs into the charging port on your phone, acting as a shield between the public charging station’s cord and your phone. USB data blockers, also known as USB condoms, restrict hackers from accessing your phone’s data.
- The director of your company understands that for
cryptographic systems, computational overheads are a concern. What can you do to limit the computational needs of the company’s solution?
A. Apply elliptic curve cryptography
B. Apply lightweight cryptography
C. Apply homomorphic encryption
D. Apply steganography
A. The correct answer is to apply elliptic curve cryptography. Elliptic curve cryptography is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography to provide equivalent security.
- What computational design concept can be used to describe a situation in which you deploy servers and storage to all of your company’s facilities so that scientific equipment can forward data at the right speed?
A. Containers
B. Microservices
C. Edge computing
D. Fog computing
C. The correct answer is Edge computing. Edge computing is a
distributed computing paradigm that brings computation and data storage closer to the sources of data. This is expected to improve response times and save bandwidth