Domain 2: Architecture & Design Flashcards

1
Q

Network Diagrams

A

Data flow across telecommunication hardware

Display the inner behaviors of your network, such as routing protocols and subnets, and reveal how information flows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Device Diagrams

A

Shows Individual cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Naming Conventions

A

Framework used for naming/labeling your files in a specific way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP Schema

A

An IP address plan or model to avoid making duplicate IP addresses

Consistent addressing for network devices
Helps avoid duplicate IP addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Sovereignty

A

Data that resides in a country is subject to
the laws of that country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data masking

A

Data obfuscation…Hide some of the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data at-rest

A

Data on a storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data in-transit

A

Data transmitted over the network…Also called data in-motion

TLS (Transport Layer Security) & IPsec (Internet Protocol Security) Provide transport encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data in-use

A

Actively processing in memory (System RAM, CPU registers and cache)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tokenization

A

Replace sensitive data with a non-sensitive placeholder

Commonly used in NFC payments and Credit card processing.

Uses a temporary token during payment…an attacker capturing the card numbers can’t use them later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information Rights Management (IRM)

A

Control how data is used.

Restrict data access to unauthorized persons
Can prevent copy and paste, Control screenshots, Manage printing, & Restrict editing
Each user has their own set of rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSL/TLS inspection

A

Secure Sockets Layer/Transport Layer Security
Commonly used to examine outgoing SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

Mechanisms that enable two software components to communicate with each other using a set of definitions and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypots

A

Makes an attractive site for attackers and traps them there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeynets

A

More than one honeypot on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Telemetry

A

Data collected from a network environment that can be analyzed to monitor the health and performance, availability, and security of the network and its components

Can be fake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS sinkhole

A

A DNS that hands out incorrect IP addresses
Can be used for good or bad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

MSP/MSSP

A

Managed service providers - A cloud service provider
Not all cloud service providers are MSPs
Network connectivity management
Backups and disaster recovery
Growth management and planning

Managed Security Service Provider – Firewall management, Patch management, security audits
Emergency response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fog Computing

A

Decentralized computing infrastructure where the computing resources (e.g., applications) are placed between the cloud and data source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Edge computing

A

Distributed computing paradigm that brings computation and data storage closer to the sources of data.

Supposed to improve response times and save bandwidth.

Moves computer storage and processing (now often just called “compute”) to the edge of the network. This is where it is closest to users and devices and most critically, as close as possible to data sources

It is an architecture rather than a specific technology

Examples of edge use cases include self-driving cars, autonomous robots, smart equipment data and automated retail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Thin client

A

A simple computer that has been optimized for establishing a remote connection with a server-based computing environment

Typically managed remotely with limited input from the end use

A computer that has no processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Container

A

Contains everything you need to run an application like code and dependencies
A standardized unit of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Microservices/API

A

Monolithic applications
One big application that does everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Serverless architecture

A

A way to build and run applications and services without having to manage infrastructure.

Cloud based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Service Integration and Management (SIAM)

A

An approach to managing multiple suppliers of services and integrating them to provide a single business-facing IT organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Transit Gateway

A

Network transit hub that you can use to interconnect your virtual private clouds (VPCs) and on-premises networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SDN (Software Defined Networking)

A

Infrastructure as code.

An approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network

Dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Elasticity

A

Increase or decrease available resources as the
workload changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Scalability

A

The ability to increase the workload in a
given infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Open Web Application Security Project (OWASP)

A

Worldwide nonprofit organization that focuses on improving software security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Attestation

A

A claim that the data presented in the report is valid by digitally signing it using the TPM’s private key

A mechanism for software to prove it’s identity. The goal of attestation is to prove to a remote party that your operating system and application software are intact and trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

HMAC-based one-time password (HOTP)

A

Hashed Message Authentication Code

An event-based OTP algorithm that uses a shared secret key and an event counter

33
Q

Token

A

Physical or digital device that provides two-factor authentication (2FA) for a user to prove their identity in a login process

Additional authentication tools that allow’s one to prove identity electronically

34
Q

Static Code Analysis

A

Method of computer program debugging that is done by examining the code without executing the program

Identifies defects before you run a program…finds buffer overflows effectively

35
Q

Gait Analysis

A

An assessment of the way the body moves, usually by walking or running, from one place to another

36
Q

Network Interface Card (NIC) teaming

A

Hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.

Teaming: The process of combining multiple network cards together for performance, load balancing, and redundancy reasons.

37
Q

Storage Area Network (SAN)

A

Specialized, high-speed network that provides network access to block level storage

A high-speed network that provides multiple servers access to consolidated pools of shared, block-level storage

38
Q

Full Backup

A

Copies all source files and folders every time you run the backup, regardless of whether the source files have been changed since the last backup

39
Q

Incremental Backup

A

Starts with a full backup. It backs up anything that has changed since the last full or incremental backup

40
Q

Differential Backup

A

Backs up anything that has changed since the last full backup

41
Q

Snapshot

A

The state of a system at a particular point in time

42
Q

Tape backup

A

The practice of periodically copying data from a primary storage device to a tape cartridge so the data can be recovered if there is a hard disk crash or failure

43
Q

Disk Backup

A

Data backup and recovery method that backs data up to hard disk storage

44
Q

Network Access Control (NAC)

A

The set of rules, protocols, and processes that govern access to network-connected resources

Can be configured on your network devices to deny access to clients that don’t have the latest antivirus signatures or that are running an older version of their operating system

An approach to computer security that attempts to unify endpoint security technology (such as anti-virus, HIP, and vulnerability assessment), user or system authentication, and network security enforcement. When a remote workstation connects to the network, NAC will place it into a segmented portion of the network (sandbox), scan it for malware and validate its security controls, and then based on the results of those scans, either connect it to the company’s networks or place the workstation into a separate quarantined portion of the network for further remediation

45
Q

Persistance

A

When attacker discreetly maintains long-term access to systems despite disruptions such as restarts or changed credential

46
Q

Non-persistent

A

Stateless. Environment is always in motion, and application instances can be created, changed, or removed at any time. Desktop state is automatically destroyed at regular intervals. Depending on company policy, it could be at each logoff, every night, or even once a week. Nothing is saved

If you shut down computer, all your data remains as-is on your hard drive, you have persistence. If you shut down computer, all the contents of your computer’s memory are erased, that’s non-persistence. With the growth of automation and public cloud, non-persistence has become more important. With non-persistence, you can more easily automate

Non-persistent system components and services are activated as required using protected information and terminated periodically or at the end of sessions.

47
Q

Raspberry Pi

A

Small single-board computer

Microcomputer

48
Q

Field-programmable gate array (FPGA)

A

Integrated circuit designed to be configured by a customer or a designer after manufacturing

Programmable device…used within embedded systems

Electronic component used to build reconfigurable digital circuits

49
Q

Arduino

A

Open-source electronics platform based on easy-to-use hardware and software

Refers to an open-source electronics platform or board and the software used to program it

A little computer you can program to do things

50
Q

SCADA

A

Supervisory Control and Data Acquisition - Type of ICS (Industrial Control System) that manages large-scale, multi-site devices and equipment spread over a geographic region.

Commonly used in manufacturing companies

51
Q

IoT

A

Internet of Things - Group of objects, and they could be electronic or not, and they all have to be connected to the wider Internet by using embedded electronic components
Ex. Smart watch, thermostat, smart refrigerator

52
Q

VoIP

A

Digital phone service provided by software or hardware devices over a data network.

Technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line

Cheaper that PBX, more secure, takes a lot of bandwidth, becoming the replacement for PBC

53
Q

MFD

A

Multi-Function Device - device that performs a variety of functions otherwise carried out by separate devices
Ex. All in one printer (MFP, Multi-Function Printer)

54
Q

RTOS

A

Real-time operating system - Operating system for real-time applications that processes data and events that have critically defined time constraints

OS that guarantees real-time applications a certain capability within a specified deadline

55
Q

Baseband Processor

A

Chip in a smartphone, tablet or other device that helps convert digital data into radio frequency signals (and vice-versa) which can then be transmitted over a RAN (Radio Access Network).

Manages all the wireless radio functions of a cellular device

56
Q

Zigbee

A

Standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks

57
Q

Access control vestibules/Man-trap

A

Part of a physical access control system that typically provides a space between two sets of interlocking doors

One set of the doors must close before the other one can be opened

Ex. Subway Turnstyle

58
Q

Two-person integrity/control

A

TPI - form of Separation of Duties where the presence or action of two people are required to complete a specific task or action

59
Q

Faraday cages

A

Enclosure used to block electromagnetic fields

60
Q

Air Gap

A

Physical Separation that will require manual transport of files, patches, and other data between 2 environments.

Security measure that involves physically isolating a computer or network and preventing it from establishing an external connection

61
Q

Screened subnet (DMZ zone)

A

Perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic

Network architecture where a single firewall is used with three network interfaces

62
Q

Hot aisle/Cold aisle

A

lining up server racks in alternating rows with cold air intakes facing one way and hot air exhausts facing the other

63
Q

Key stretching

A

Used in Cryptography to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) it takes to test each possible key.

Converting a password to a longer and more random key for cryptographic purposes such as encryption.

64
Q

ECC

A

Elliptic Curve Cryptography – key-based technique for encrypting data. Small key size but is still very secure
Used a lot in mobile devices. Asymmetric

Focuses on pairs of public and private keys for decryption and encryption of web traffic

Based on the algebraic structure of elliptic curves over finite fields.

65
Q

Perfect forward secrecy

A

A style of encryption that enables short-term, private key exchanges between clients and servers

Produces temporary private key exchanges between clients and servers. For every individual session initiated by a user, a unique session key is generated. If one of these session keys is compromised, data from any other session will not be affected.

66
Q

Quantum Computing

A

A computer that uses quantum mechanics to generate and manipulate quantum bits known as qubits in order to access enormous processing power

Harnesses the laws of quantum mechanics to solve problems too complex for classical computers.

66
Q

Post-quantum cryptography

A

Refers to algorithms thought to have capabilities to secure against an attack by a quantum computer

67
Q

Ephemeral

A

A cryptographic key that is generated for each execution of a key-establishment process and that meets other requirements of the key type

*Diffie-Hellman

68
Q

Block Chain

A

A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system
*Public ledger

Peer to peer. The longer the blockchain usually the more secure

69
Q

Cipher suite

A

A set of algorithms that help secure a network connection

70
Q

Stream cipher

A

Symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream

Encryption technique that works byte by byte to transform plain text into code that’s unreadable to anyone without the proper key

Convert plaintext to ciphertext 1 byte at a time

71
Q

Block cipher

A

Symmetric Takes a block of plaintext bits and generates a block of ciphertext bits, generally of same size

Block ciphers transform plaintext 1 block (64/128/256 bits) at a time

Slower than stream cipher

72
Q

Symmetric

A

The use of a single shared secret to share encrypted data between parties

Uses the same shared key for encryption and decryption

Uses a public-private key pair where one key is used to encrypt and the other to decrypt

Shared keys. Same Key = Symmetric. 1 key between 2 people

73
Q

Asymmetric

A

One key is used to encrypt and another is used to decrypt

2 Seperate keys

Uses private keys to decrypt and Public keys to encrypt…Public Keys can be shared but private keys can’t

The encryption key (also called the public key) and the corresponding decryption key (also called the private key) are different

74
Q

Lightweight cryptography

A

Encryption method that features a small footprint and/or low computational complexity

Designed for resource-constrained devices

75
Q

Steganography

A

The practice of hiding a secret message inside of (or even on top of) something that is not secret

The practice of hiding an image, message, or file within something that isn’t a secret

Hiding messages and data

76
Q

Homomorphic encryption

A

Enables complex mathematical operations to be performed on encrypted data without compromising the encryption

The conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form

Encryption method that allows calculations to be performed on data without decrypting it first

77
Q

Use cases

A

An attack scenario that a security control, policy, or guideline is intended to prevent or mitigate

Map with a detailed listing of steps that are clearly explained when what to use and how to use a particular product, service, or system

78
Q

Entropy

A

Used to produce random numbers, which in turn are used to produce security keys to protect data while it’s in storage or in transit

The randomness collected by a system for use in algorithms that require random seeds. A lack of good entropy can leave a crypto system vulnerable and unable to encrypt data securely

The measure of unpredictability of information contained in a message

The measuring of randomness