Domain 2: Architecture and Design (21%) Flashcards

1
Q

*2.4 (AAA)

Authentication

A

when a person’s identity is established with proof and confirmed by a system.

Remember
something you know, something you are, something you have, something you do, and somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

*2.4 (AAA)

Authorization

A

occurs when a user is given access to a certain piece of data or certain areas of a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

*2.4 (AAA)

Accounting

A

Tracking of data, computer usage, and network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

*2.8 Common use cases

non-repudiation

A

when you have proof that someone has taken an action.

You said it. You can’t deny it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

*2.5 Backup types

Network Attached Storage (NAS)

A

Storage devices that connect directly to your organization’s network.

*File level access

NAS systems often implement RAID arrays to ensure high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

*2.5 Backup types

Storage Area Network (SAN)

A

Network designed specifically to perform block storage functions that may consist of NAS devices.

*Block level access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

*2.6 Communication considerations

Subscriber Identity Module (SIM)

A

An integrated circuit that securely stores the international mobile subscriber
identity (IMSI) number and its related key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*2.6 Embedded systems

Field-programmable gate array (FPGA)

A

-FPGA is an anti-tamper mechanism. (sealed aspirin bottle example, seal is anti-tamper mechanism)

-An anti-tamper mechanism is a method that makes it difficult for an attacker to alter the authorized execution of software.

if somebody tries to tamper with the system,
what these things will do is actually zero out your cryptographic key, which then can automatically wipe out the information on that system, making sure you know it’s been tampered with and therefore, nobody can get the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*2.2 Virtualization

VM sprawl avoidance

A

Occurs when virtual machines are created, used, and deployed without
proper management or oversight by the system admins.

The solution is Formal process and detailed documentation
– You should have information on every virtual object.

To avoid VM sprawl and maintain a manageable attack surface, it is important to set resource policies that limit users’ ability to dynamically allocate new resources on the fly. This also avoids the potential pitfall of the organization receiving a whopping bill after unknown or unplanned resources have been consumed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

*2.2 Virtualization

VM escape protection

A

An attack that allows an attacker to break out of a normally isolated VM
by interacting directly with the hypervisor.

Pretection: sandboxing, patching the hypervisor and continuous monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

*2.3 Automation/scripting

Continuous integration

A

A software development method where code updates are tested and
committed to a development or build server/code repository rapidly

§ Continuous integration can test and commit updates multiple times per
day

§ Continuous integration detects and resolves development conflicts early
and often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

*2.3 Automation/scripting

Continuous delivery

A

A software development method where application and platform
requirements are frequently tested and validated for immediate
availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

*2.3 Automation/scripting

Continuous deployment

A

A software development method where application and platform
updates are committed to production rapidly

§ Continuous delivery focuses on automated testing of code in order to get
it ready for release

§ Continuous deployment focuses on automated testing and release of
code in order to get it into the production environment more quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

*2.2 Infrastructure as code

A

§ A provisioning architecture in which deployment of resources is performed by scripted automation and orchestration

§ IaC allows for the use of scripted approaches to provisioning
infrastructure in the cloud

§ Robust orchestration can lower overall IT costs, speed up deployments,
and increase security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

*2.4 Biometrics

False Acceptance

A

False Acceptance Rate (FAR): Rate that a system authenticates a user as authorized or valid when they
should not have been granted access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2.4 *Biometrics

False Rejection

A

False Rejection Rate (FRR): Rate that a system denies a user as authorized or valid when they should
have been granted access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2.4 *Biometrics

Crossover Error rate

A

Crossover Error Rate (CER):

An equal error rate (ERR) where the false acceptance rate and false

rejection rate are equal
§ CER measures the effectiveness of a biometric system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

2.7 *Bollards/barricades

A

Bollards are a physical security control that is designed to prevent a vehicle-ramming attack. Bollards are typically designed as a sturdy, short, vertical post. Some organizations have installed more decorative bollards that are created out of cement and are large enough to plant flowers or trees inside. Mantraps are designed to prevent individuals from tailgating into the building. Security guards and intrusion alarms could detect this from occurring, but not truly prevent them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

2.7 *Fire supression

A

§ Process of controlling and/or extinguishing fires to protect an
organization’s employees, data, equipment, and buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2.7 *Faraday Cages

A

Faraday Cage

Shielding installed around an entire room that prevents electromagnetic
energy and radio frequencies from entering or leaving the room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

2.6 Heating, ventilation, air conditioning (HVAC)

A

Heating, Ventilation, and Air Conditioning

o Humidity should be kept around 40%

o HVAC systems may be connected to ICS and SCADA networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

2.6 *Internet of Things (IoT)

A

A group of objects (electronic or not) that are connected to the wider
Internet by using embedded electronic components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2.6 *System on Chip

A

A processor that integrates the platform functionality of multiple logical
controllers onto a single chip

System-on-Chip are power efficient and used with embedded systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

2.6 *Real-Time Operating System (RTOS)

A

A type of OS that prioritizes deterministic execution of operations to
ensure consistent response for time-critical tasks

Embedded systems typically cannot tolerate reboots or crashes and must
have response times that are predictable to within microsecond
tolerances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

2.6 Embedded Systems

*Field-programmable gate array (FPGA)

A

A processor that can be programmed to perform a specific function by a
customer rather than at the time of manufacture

End customer can configure the programming logic to run a specific
application instead of using an ASIC
(application-specific integrated circuit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

2.6 *Industrial Control Systems (ICS)

A

A network that manages embedded devices.

ICS is used for electrical power stations, water suppliers, health services,
telecommunications, manufacturing, and defense needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

2.6 *Supervisory Control and Data Acquisition (SCADA)

A

A type of industrial control system that manages large-scale,
multiple-site devices and equipment spread over geographic region

SCADA typically run as software on ordinary computers to gather data
from and manage plant devices and equipment with embedded PLCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

2.4 Authentication methods

*Time-based one-time password (HOTP)

A

A password is computed from a shared secret and current time

29
Q

2.4 Authentication methods

HMAC-based One Time Password (HOTP)

A

A password is computed from a shared secret and is synchronized
between the client and the server

30
Q

2.4 Authentication methods

*Attestation

A

A claim that the data presented in the report is valid by digitally
signing it using the TPM’s private key.

31
Q

when a person’s identity is established with proof and confirmed by a system.

Remember
something you know, something you are, something you have, something you do, and somewhere you are

A

*2.4 (AAA)

Authentication

32
Q

occurs when a user is given access to a certain piece of data or certain areas of a building.

A

*2.4 (AAA)

Authorization

33
Q

Tracking of data, computer usage, and network resources.

A

*2.4 (AAA)

Accounting

34
Q

when you have proof that someone has taken an action.

You said it. You can’t deny it

A

*2.8 Common use cases

non-repudiation

35
Q

Storage devices that connect directly to your organization’s network.

*File level access

NAS systems often implement RAID arrays to ensure high availability.

A

*2.5 Backup types

Network Attached Storage (NAS)

36
Q

Network designed specifically to perform block storage functions that may consist of NAS devices.

*Block level access

A

*2.5 Backup types

Storage Area Network (SAN)

37
Q

An integrated circuit that securely stores the international mobile subscriber
identity (IMSI) number and its related key.

A

*2.6 Communication considerations

Subscriber Identity Module (SIM)

38
Q

-FPGA is an anti-tamper mechanism. (sealed aspirin bottle example, seal is anti-tamper mechanism)

-An anti-tamper mechanism is a method that makes it difficult for an attacker to alter the authorized execution of software.

if somebody tries to tamper with the system,
what these things will do is actually zero out your cryptographic key, which then can automatically wipe out the information on that system, making sure you know it’s been tampered with and therefore, nobody can get the information.

A

*2.6 Embedded systems

Field-programmable gate array (FPGA)

39
Q

Occurs when virtual machines are created, used, and deployed without
proper management or oversight by the system admins.

The solution is Formal process and detailed documentation
– You should have information on every virtual object.

To avoid VM sprawl and maintain a manageable attack surface, it is important to set resource policies that limit users’ ability to dynamically allocate new resources on the fly. This also avoids the potential pitfall of the organization receiving a whopping bill after unknown or unplanned resources have been consumed.

A

*2.2 Virtualization

VM sprawl avoidance

40
Q

An attack that allows an attacker to break out of a normally isolated VM
by interacting directly with the hypervisor.

Pretection: sandboxing, patching the hypervisor and continuous monitoring.

A

*2.2 Virtualization

VM escape protection

41
Q

A software development method where code updates are tested and
committed to a development or build server/code repository rapidly

§ Continuous integration can test and commit updates multiple times per
day

§ Continuous integration detects and resolves development conflicts early
and often

A

*2.3 Automation/scripting

Continuous integration

42
Q

A software development method where application and platform
requirements are frequently tested and validated for immediate
availability

A

*2.3 Automation/scripting

Continuous delivery

43
Q

A software development method where application and platform
updates are committed to production rapidly

§ Continuous delivery focuses on automated testing of code in order to get
it ready for release

§ Continuous deployment focuses on automated testing and release of
code in order to get it into the production environment more quickly

A

*2.3 Automation/scripting

Continuous deployment

44
Q

§ A provisioning architecture in which deployment of resources is performed by scripted automation and orchestration

§ IaC allows for the use of scripted approaches to provisioning
infrastructure in the cloud

§ Robust orchestration can lower overall IT costs, speed up deployments,
and increase security

A

*2.2 Infrastructure as code

45
Q

False Acceptance Rate (FAR): Rate that a system authenticates a user as authorized or valid when they
should not have been granted access to the system

A

*2.4 Biometrics

False Acceptance

46
Q

False Rejection Rate (FRR): Rate that a system denies a user as authorized or valid when they should
have been granted access to the system

A

2.4 *Biometrics

False Rejection

47
Q

Crossover Error Rate (CER):

An equal error rate (ERR) where the false acceptance rate and false

rejection rate are equal
§ CER measures the effectiveness of a biometric system

A

2.4 *Biometrics

Crossover Error rate

48
Q

Bollards are a physical security control that is designed to prevent a vehicle-ramming attack. Bollards are typically designed as a sturdy, short, vertical post. Some organizations have installed more decorative bollards that are created out of cement and are large enough to plant flowers or trees inside. Mantraps are designed to prevent individuals from tailgating into the building. Security guards and intrusion alarms could detect this from occurring, but not truly prevent them.

A

2.7 *Bollards/barricades

49
Q

§ Process of controlling and/or extinguishing fires to protect an
organization’s employees, data, equipment, and buildings

A

2.7 *Fire supression

50
Q

Faraday Cage

Shielding installed around an entire room that prevents electromagnetic
energy and radio frequencies from entering or leaving the room

A

2.7 *Faraday Cages

51
Q

Heating, Ventilation, and Air Conditioning

o Humidity should be kept around 40%

o HVAC systems may be connected to ICS and SCADA networks

A

2.6 Heating, ventilation, air conditioning (HVAC)

52
Q

A group of objects (electronic or not) that are connected to the wider
Internet by using embedded electronic components

A

2.6 *Internet of Things (IoT)

53
Q

A processor that integrates the platform functionality of multiple logical
controllers onto a single chip

System-on-Chip are power efficient and used with embedded systems

A

2.6 *System on Chip

54
Q

A type of OS that prioritizes deterministic execution of operations to
ensure consistent response for time-critical tasks

Embedded systems typically cannot tolerate reboots or crashes and must
have response times that are predictable to within microsecond
tolerances

A

2.6 *Real-Time Operating System (RTOS)

55
Q

A processor that can be programmed to perform a specific function by a
customer rather than at the time of manufacture

End customer can configure the programming logic to run a specific
application instead of using an ASIC
(application-specific integrated circuit)

A

2.6 Embedded Systems

*Field-programmable gate array (FPGA)

56
Q

A network that manages embedded devices.

ICS is used for electrical power stations, water suppliers, health services,
telecommunications, manufacturing, and defense needs.

A

2.6 *Industrial Control Systems (ICS)

57
Q

A type of industrial control system that manages large-scale,
multiple-site devices and equipment spread over geographic region

SCADA typically run as software on ordinary computers to gather data
from and manage plant devices and equipment with embedded PLCs

A

2.6 *Supervisory Control and Data Acquisition (SCADA)

58
Q

A password is computed from a shared secret and current time

A

2.4 Authentication methods

*Time-based one-time password (HOTP)

59
Q

A password is computed from a shared secret and is synchronized
between the client and the server

A

2.4 Authentication methods

HMAC-based One Time Password (HOTP)

60
Q

A claim that the data presented in the report is valid by digitally
signing it using the TPM’s private key.

A

2.4 Authentication methods

*Attestation

61
Q

Utilizes a keystream generator to encrypt data bit by bit using a
mathematical XOR function to create the ciphertext

A

2.8 Cipher suites

Stream Cipher

62
Q

Breaks the input into fixed-length blocks of data and performs the
encryption on each block

Block ciphers are easier to implement through a software solution (Software Solution)

A

2.8 Cipher suites

Block Cipher

63
Q

The science and art of hiding messages within other messages
§ …. is a form of obfuscation, not encryption

A

2.8 Steganography

64
Q

A one-way cryptographic function which takes an input and produces a
unique message digest

A

2.8 Hashing
3.2 Database - Hashing

65
Q

A technique that is used to mitigate a weaker key by increasing the time
needed to crack it
§ WPA, WPA2, PGP, bcrypt, and other algorithms utilize key stretching

A

2.8 Key Stretching

66
Q

Adding random data into a one-way cryptographic hash to help protect
against password cracking techniques
§ A “nonce” is used to prevent password reuse

A

2.8 Salting
3.2 Database - Salting

67
Q

prevent collisions from being used to spoof the integrity of a message

use either DSA, RSA, ECDSA, or SHA

A

2.8 Digital signatures

A digital signature is created by hashing a file and then taking that resulting hash digest and encrypting it with a private key.

68
Q

Exposes the hard drive to a powerful magnetic field which in turn causes
previously-written data to be wiped from the drive

A

2.7 Secure data destruction

Degaussing