Domain 2 Flashcards

1
Q

What is the MTD metric

A

Maximum tolerable downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is scalability

A

Capacity to increase resources to meet demand within similar cost ratios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two types of scalability

A

Scale out to add more resources in parallel
Scale up to increase power of existing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does elasticity refer to

A

The ability to handle scalability changes in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A power distribution unit is like what?

A

Like a surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Raid 0

A

Striping performance gain no redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Raid 1

A

1 disk failure redundancy in 2 disk setup
Con is low storage efficiency 50%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Raid 5

A

Min 3 disks
Striping with parity
One disk can fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Raid 6

A

Min 4 disk
Double parity
Min 4 disks
Can have 2 disks fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Raid 10 nested

A

Striped set of mirrored subgroups
Faster speeds
Each subgroup can have one failure disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Raid 50

A

Min 6 drives
Striped set of parity subgroups
Each subgroup can lose one disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multipath provides what that raid doesn’t

A

Raid deals with drive failures
Multipath deals with storage path such as bus controllers and multiple network paths to storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Geographical dispersal

A

Data replicating hot and warm sites physically distant from each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 2 1 backup rules

A

3 copies 2 different media 1 offline and 1 off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a master image

A

Copy that has os up to date, all patches, and software installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is automated build from template?

A

Build instructions for an instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does layered security provide

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What port does ldaps and ldap use?

A

Ldaps Port 636
Ldap port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is snmp v1 and v2c not secure

A

Sends community string in plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What security benefit does snmp v3 provide

A

Supports encryption and strong user based authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does tls 1.3 remove which makes it now more secure

A

Ability to downgrade to lower SSL levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In Tpm can endorsement key be changed?

A

No it cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is difference between measured boot and boot attestation

A

Measured boot measures boot process to report on any potential malware
Boot attestation sends a log signed by Tpm to report any issues like unsigned drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a cookie what does the httponly attribute do?

A

Prevents dom based attacks and client side scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In a cookie what does the same site attribute do

A

Control from where cookie may be sent protecting against request forgery attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does hsts do in web browsers?

A

Prevents downgrading to http and sslstripping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does content security policy csp do?

A

Mitigates click jacking, script injection, and other client side attacks

28
Q

Why might you use cache control in a web app

A

Prevent caching attacks, make sure sensitive data isn’t stored

29
Q

What are the forms of execution control

A

Allow and block list

30
Q

What are the two available execution control options in Linux

A

Apparmor and selinux through Linux security modules

31
Q

What is a bastion host

A

In a dmz running minimal services to reduce attack service

32
Q

What is north south traffic

A

Refers to traffic coming in and out of data center

33
Q

What is east west

A

Traffic between devices in network like servers

34
Q

What does affinity and persistence do in load balancing

A

Keep connections connected to a specific web server
Affinity is layer 4 based on ip port
Persistence is based on cookie layer 7

35
Q

What is latency

A

Time it takes transmission to reach recipient measured in ms

36
Q

What is jitter

A

Variation in delay or inconsistent rate of packet delivery

37
Q

What is a forward proxy?

A

Provides for protocol specific outbound traffic

38
Q

Non transparent proxy

A

Client must be configured with proxy info to use

39
Q

Transparent proxy and where is it usually setup ?

A

Intercepts client traffic without client configuration. Usually setup on router, switch, or some other inline device

40
Q

Reverse proxy server

A

Protects servers from direct contact with client requests

41
Q

What is static dynamic source nat

A

1 to 1 translation public to private ip

42
Q

What is overloaded nat/napt/pat

A

Lots of private ips mapped to single public ip

43
Q

What is one of the core features of a hids?

A

Fim file integrity monitoring

44
Q

What does IPsec provide ?

A

Confidentiality by encrypting packets and integrity antireplay by signing each packet

45
Q

Why isn’t IPsec ah used that often ?

A

Doesn’t provide confidentiality since payload isn’t encrypted, also fails in nat environments due to ip header fields in icv

46
Q

What are features of IPsec esp

A

Provides confidentiality and integrity. Can be used to encrypt packet

47
Q

What two modes can IPsec be used in and what do they do?

A

Transport mode used to secure communications between hosts esp doesn’t encrypt ip header but ah can be used to do that
Tunnel mode used for communications between vpn gateways esp can encrypt whole packet

48
Q

What does ike do in ipsec

A

Handles authentication and key exchange referred to as security associations

49
Q

What is big difference between ike v1 and v2

A

Version 1 for clients you still had to use something like l2tp but version 2 has added features where you can just use it to gain access to internal network resources

50
Q

Each wap is identified by it’s Mac address which is also called what ?

A

Basic service set identifier

51
Q

What technology has replaced wps in wifi

A

Easy connect using keys and qr codes

52
Q

Eap defines framework for negotiating what

A

Authentication methods like smart cards

53
Q

What security feature does a docker namespace provide

A

Prevent one container from reading or writing processes in another container

54
Q

What security feature does a docker control group provide

A

Ensures one container can’t overwhelm others in an attack such as dos

55
Q

In the cloud what does a resource policy do?

A

Acts as ACL for an object

56
Q

What is a transit gateway in cloud computing ?

A

Allows vpc subnets and vpn gateways to talk to each other

57
Q

Which 3 ways can casbs be implemented ?

A

Forward proxy
Reverse proxy
API

58
Q

The comman name in certificate was replaced with what

A

San subject alternative name

59
Q

What are the two different types of validations for certificate requests

A

Domain and extended validation

60
Q

Extended validation doesn’t allow you to get what kind of certificate

A

Wildcard cert

61
Q

What is escrow key storage in pki

A

Third party storing those keys

62
Q

What is m of n control in pki

A

Means only m of the total n authorized users should be present to access the key

63
Q

What is ocsp stapling

A

Web server caches ocsp response and provides it to clients

64
Q

What is certificate pinning

A

A way for clients to bypass ca hierarchy and chain of trust to minimize mitm attacks when inspecting certificate

65
Q

What is a pkcs 12 file

A

Allows export of private key with cert. Can be protected with password and in a binary format like pfx

66
Q

What is the pkb 7 format in pki. Where is it usually used in?

A

Uses pkcs #7 allows to combine multiple certificate in a file such as chain. Usually used in s/mime to encrypt emails