Chapter 6 Application deployment and security Flashcards

1
Q

Typically, large organizations use a four-tier structure

A

Development, testing, staging, and production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the most common deployment models?

A
  • Bare Metal
  • Virtual Machine
  • Container-based infraestructure
  • serveless computing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is software that creates and manages VMs

A

Hipervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The total amount of virtual memory allocated to these three VMs is greater than the amount of RAM available on the host machine. This is called

A

Overcommiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are types of infraestructures

  1. On-Premises
  2. On-Line
  3. Private Cloud
  4. Working-Cloud
  5. Public-Cloud
  6. Hybrid-Cloud
  7. Static-Cloud
  8. Edge-Cloud
A

1, 2, 3, 5, 6, 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infraestructure any system that is literally withim the confines of your building

A

On-premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infraestructure that is a system that provides self-service provisioning for compute resources, networking, and storage.

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Infraestructure that is gaining popularity because of the growth of the Internet of Things (IoT). These connected devices, such as connected cameras, autonomous vehicles, and even smartphones, increasingly benefit from computing power that exists closer to them on the network.

A

Edge Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a format that wraps a number of different technologies to create what we know today as containers

A

Dockers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a philosophy for software deployment that figures prominently in the field of DevOps. DevOps itself is about communication and making certain that all members of the team are working together to ensure smooth operation.

A

Continuous Integration/Continuous Deployment (CI/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In CI/CD In order to avoid impacting users, or at least to limit the impact, you can use deployment strategies such as:

A
  • Rolling upgrade
  • Canary pipeline
  • Blue-green deployment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Deploymente strategy/ In this case, the new version is rolled out to a subset of users (or servers, depending on the architecture). If these users experience problems, the changes can be easily rolled back. If these users do not experience problems, the changes are rolled out to the rest of production.

A

Canary pipeline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is the most straightforward version of Continuous Delivery, in which changes are periodically rolled out in such a way that they do not impact current users, and nobody should have to “reinstall” the software.

A

Rolling upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In this case, an entirely new environment (Blue) is created with the new code on it, but the old environment (Green) is held in reserve. If users on the new environment experience problems, traffic can be diverted back to the original environment

A

Blue / Green deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Integration with agile methofdology
Shorter Mean Time to resolution
Automated deployment
Less disruptive feature releases
Improve quality
Improve time to market

A

CI/CD Benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some of the applications you need to consider when it comes to cloud deployment:

A
  • Firewalls
  • Load balancers
  • DNS
  • Reverse proxies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Different ways that a Load Balancer manage a particular request….

A
  • Persist session
  • Rounf Robin
  • Least connection
  • Ip hash
18
Q

Works to make sure responses look like they all come from the same server.

A

Reverse Proxy

19
Q

is a code injection technique that is used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application’

A

SQL Injection

20
Q

Examples of SQL Injection detection tools

A
  • SQLmap
  • SQLninja
21
Q

Are designed to analyze source code and/or compiled versions of code to help find security flaws.

A

Static Application Security Testing (SAST)

22
Q

Detect SQL injections based on the number of invalid queries from a host, while there are OR and UNION blocks inside of the request, or others.

A

Database firewalls

23
Q

This coding style allows the database to distinguish between code and data, regardless of what user input is supplied.

A

Use prepared statements

24
Q

Happen when user-submitted content that has not been sanitized is displayed to other users. The most obvious version of this exploit is where one user submits a comment that includes a script that performs a malicious action, and anyone who views the comments page has that script executed on their machine.

A

Cross-Site Scripting (XSS)

25
Q

Sometimes pronounced “Sea Surf.” In both cases, the attacker intends for the user to execute the attacker’s code, usually without even knowing it. The difference is that CSRF attacks are typically aimed not at the target site, but rather at a different site, one into which the user has already authenticated.

A

Cross-Site Request Forgery (CSRF)

26
Q

Refers to “chopping something into small pieces” to make it look like a “confused mess”.

A

Hashing

27
Q

A company has remote employees who need to connect to the company network in order to participate in meetings and to share the data and progress of application development. Which data transportation security technique can be implemented to allow remote employees to securely connect to the company private network?

A

Virtual Private Network (VPN)

28
Q

What type of test is used to identify the possible weak spots in applications, servers,
or networks?
a. Pen
b. White box
c. Eraser
d. Unit

A

A

29
Q

Which of the following is a tool that can be used for network discovery and security
auditing?
a. Nslookup
b. Nmap
c. ps
d. curl

A

B

30
Q

What is the minimum number of identity components MFA uses to authenticate a
user’s identity?
a. One
b. Two
c. Three
d. Four

A

B

31
Q

Which of the following is used for fingerprinting of data to detect whether the data
has been modified?
a. Private key
b. Public key
c. One-way hash
d. Certificate

A

A,C

32
Q

Data needs to be secured in multiple locations. Which of the following are the correct
locations?
a. Memory, storage, and network
b. Flash, wire, and optics
c. Hard disk, database, and analytics
d. AWS, Google Cloud, and Azure

A

A

33
Q

Which modes best describe IDSs and IPSs, respectively?
a. Passive, passive
b. Passive, active
c. Active, passive
d. Active, active

A

B

34
Q

Which characteristic matches an SaaS deployment model?
a. Provider deploys your software customizations.
b. Any update to the software requires a new license.
c. You can recommend tweaks to the underlying infrastructure.
d. None of the above

A

D

35
Q

Which is a good deployment model for real-time IoT sensors?
a. SaaS model
b. Edge computing model
c. Private cloud model
d. Hybrid cloud model

A

B

36
Q

In which of the following ways are containers different from virtual machines?
(Choose two.)
a. Containers have less storage requirements than VMs.
b. VMs can run any operating system, but containers run only on Linux.
c. Containers start in 500 ms, and VMs start in minutes.
d. VMs are better if you have a microservice architecture.

A

A,C

37
Q

Which deployment method is best for processes that are run periodically?
a. Serverless
b. Containers
c. Virtual machines
d. All of the above

A

A

38
Q

What is the second way of DevOps?
a. Automation
b. Continuous learning and experimentation
c. Culture
d. Feedback loop

A

D

39
Q

What is continuous integration?
a. Automated software delivery and deployment
b. An Agile software development technique
c. The process of merging development work with the code base for automated
testing
d. None of the above

A

C

40
Q

A Docker images uses what type of file system?
a. Layered file system
b. NFS
c. XFS
d. Union file system

A

D

41
Q

What command do you use to launch an nginx container on port 80 of the host file
system?
a. docker image build -p 80 nginx
b. docker start -it -d nginx -p 80|80
c. docker container run -p 80:80 -d nginx
d. None of the above

A

C

42
Q
  • Cost
  • Scalability
  • easy to use and write code for
A

Advantages of serveless deployment