Domain 2 Questions Flashcards
2
A large firm uses a non-persistent operating system for its remote users. This allows the employees to access company resources while teleworking. When the computers are turned off, the operating system disappears. Which of the following operating systems is the company using?
Full disk encryption
Trusted operating system
TPM
Live boot media
Live boot media
Live boot media is a non-persistent operating system on a compact disk or USB. Live boot media can be run on any computer to provide the user a complete operating system while the computer is on.
2
A network administrator needs a service to easily manage Virtual Private Cloud (VPC) and edge connections. The service must have a central console for ease of monitoring all components. Which of the following is the best solution for the administrator to use in a cloud computing environment?
Transit gateway
NAT gateway
Cloud storage gateway
gateway endpoint
Transit gateway
A transit gateway is a cloud network hub that allows users to interconnect virtual private clouds (VPC) and on-premises networks through a central console.
2
An application developer uses a third-party source to send cryptographic data through multiple processors to stretch the data and ensure secure algorithms. What is the developer preventing the use of?
Rainbow table attack
Weak keys
Salting
Collision
Weak keys
Weak keys are poor or short algorithms in cryptographic keys used with a specific cipher. They are vulnerable to cybersecurity attacks. Stretching keys can strengthen the algorithm to make it more secure.
2
An unmanned aerial vehicle is equipped with a component to ensure position and movement sensors are aligned and relays information to a ground control. Which of the following computing devices does this best describe?
Embedded system
SoC
Microprocessor
Microcontroller
Embedded system
An embedded system is a combination of hardware and software that contains a dedicated function and uses a computer component to complete the function.
2
A company leases access to resources from a service provider as agreed upon in a service level agreement. The company pays only for what is used on a monthly basis. Which of the following computing concepts is being used?
PaaS
On-premise
Cloud computing
Community cloud
Cloud computing
In cloud computing, a company uses a cloud service provider to deliver computing resources. A cloud-based server utilizes virtual technology to host a company’s applications offsite.
2
A recent change to an API exposes an exploit in a web application. Developers working on the project discover that dead code in the application had been executed as a result of which practice?
Code reuse
Normalization code
Unreachable code
Code obfuscation
Code reuse
Code reuse is the copying of code from one location into another. Careless or mismanaged code reuse can introduce instances of dead code.
2
A program office provides a mock production environment where users and test agencies can persistently test application code as it is being checked in after development. This practice ensures the product meets user acceptance testing and design goals. Which Agile product does this most likely represent?
Continuous deployment
Continuous validation
Continuous Integration
DevSecOps
Continuous validation
Continuous validation is the process in which a product is continually tested throughout the development lifecycle to ensure it is meeting the functional and security goals of a customer.
2
Which of the following are common constraints of embedded systems?
Select all that apply
Network range
Cryptography capability
Reliability
Compute power
Network range
Cryptography capability
Compute power
Compute power is a common constraint of an embedded system. Embedded systems are relatively small and do not have the average computing capabilities as a standard computer.
Authentication is a common constraint for embedded systems. Because they lack compute capacity, embedded systems cannot match the authentication technologies of a standard network.
The lack of size and computing power also diminishes choices for network connectivity. Transmission Control Protocol/Internet Protocol (TCP/IP)-based networking is not up to standards with embedded systems using relatively low processing power.
2
A Cloud Service Provider (CSP) outsources the entire cyber security elements to a third party for the infrastructure in which an application resides due to lack of resources. The CSP maintains responsibility of the environment and attributes. What is this an example of?
SECaaS
MSSP
Pay as you go
Resource pooling
MSSP
A managed service provider (MSP)/Managed security service provider (MSSP) offers fully outsourced responsibility for information assurance to a third party.
2
A logistics facility provides transportation services globally for many clients. Clients require their planning information to be kept in a secure environment not connected to a network until the needs have been fulfilled. Which of the following solutions would be the most ideal method of meeting this requirement for the company?
Air gap
Faraday cage
Container
Mantrap
Air gap
An air gap is a host that is not physically connected to any network. Air gaps are secure areas that protect resources against unauthorized users and spillage of information.
2
A cardiovascular patient is sent home with a monitoring device that records and sends data to a healthcare provider when triggered by abnormal cardiac activity. Response time to the data is critical to patient health. Which embedded platform is the medical device using?
Real-time
Standalone
Distributed
Networked
Real-time
A real-time operating system (RTOS) is in an embedded system intended to serve real-time applications that process data as it comes in. It provides a quicker reaction to external events than a typical operating system.
2
Which of the following cryptographic algorithm standards is best suited for Internet of Things (IoT) devices?
Elliptic curve
Asymmetric
Lightweight
Cipher suite
Lightweight
Lightweight cryptography is an encryption method that provides a small footprint and/or low computational complexity for resource-constrained systems such as an Internet of Things (IoT) device.
2
Analyze the active defense solution statements and determine which best describes the purpose of a honeyfile.
The attempts to reuse can be traced if the threat actor successfully exfiltrates it.
It is helpful in analyzing attack strategies and may provide early warnings of attacks.
Configurations are in place to route suspect traffic to a different network.
A decoy is set as a distraction to emulate a false topology and security zones.
The attempts to reuse can be traced if the threat actor successfully exfiltrates it.
A honeyfile is convincingly useful but actually fake data. This data can be made trackable, so that when a threat actor successfully exfiltrates it, the attempts to reuse or exploit it can be traced.
2
A database export allows personally identifiable information (PII) to display in report format and on screen. This poses a potential data leakage concern. In order to protect this PII, what de-identification method should the programmer consider implementing?
Hashing
Data masking
Salting
Tokenization
Data masking
Data masking is a secure coding technique used to hide sensitive or private data from disclosure. All or part of the data fields are altered by substituting character strings with a random character.
2
An application user is contacted after an attempt to login to a company application to verify activity. Which form of two-factor authentication is this?
Phone call
SMS
Push notification
Voice recognition
Phone call
A phone call is a form of two-factor authentication (2FA). An automated service dials the registered number on file to confirm authentication of a user.