Designs Secure Network Architecture Flashcards

1
Q

All-in-one security appliances and agents that combine the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and so on.

A

unified threat management (UTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security appliance or software that uses passive hardware sensors to monitor traffic on a specific segment of the network.

A

Network intrusion detection system (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it.

A

network intrusion prevention system (NIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A sign that an asset or network has been attacked or is currently under attack.

A

Indicator of compromise (IOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe a solution designed to validate the health of an endpoint prior to allowing access.

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security framework and tools to facilitate use of personally-owned devices to access corporate networks and data.

A

Bring your own device (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A logically separate network, created by using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate.

A

virtual local area networks (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enterprise management software designed to mediate access to cloud services by users across all types of devices.

A

cloud access security broker (CASB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify some practical DLP example use-cases.

A

Blocking use of external media, print blocking, Remote Desktop Protocol (RDP) blocking, clipboard privacy controls, restricted virtual desktop infrastructure (VDI) implementation, data classification blocking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ______________________________________ leverages the global footprint of cloud platforms by distributing and replicating the components of a service to improve performance to all the key service areas needing access to the content.

A

Content Delivery Network (CDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of applying confidentiality and privacy labels to information.

A

Data classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____________________________ is assigned to cloud resources through the use of tags and is frequently exploited to expose configuration parameters which may reveal misconfigured settings.

A

Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the data obfuscation method that replaces sensitive data with an irreversible value?

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What data obfuscation method is designed to protect personally identifiable information so that data can be shared?

A

Anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of software that reviews system files to ensure that they have not been tampered with.

A

File Integrity Monitoring (FIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The process an organization uses to maintain the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations.

A

Data retention

17
Q

This generally defines the amount of data that can be lost without irreparable harm to the operation of the business.

A

Recovery Point Objective

18
Q

This VM exploit gives an attacker access to the underlying host operating systems and thereby access to all other VMs running on that host machine.

19
Q

A guest operating system installed on a host computer using virtualization software (a hypervisor), such as Microsoft Hyper-V or VMware.

A

virtual machines (VM)

20
Q

Type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographically large areas from a host computer.

A

supervisory control and data acquisition (SCADA)

21
Q

Which cloud service type represents the lowest amount of responsibility for the customer?

22
Q

Cloud service model that provisions application and database services as a platform for development of apps.

A

Platform as a Service (PaaS)

23
Q

Cloud service model that provisions virtual machines and network infrastructure.

A

Infrastructure as a Service (IaaS)