Domain 2.0: Architecture & Design Flashcards

1
Q

Recovery sites can be hot, warm or cold. explain the difference

A

hot site: is an operational ready-to-go data center; it has the fastest recovery time and highest cost
cold site: longer recovery window with a lower cost
warm site is a compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ and ____ are used to study the actions of hackers and distract them from more valuable data

A

honeypots/honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An ____ is a combination of hardware and software/firmware that is attached to or contained inside a computer to provide cryptographic functions for tamper protection and increased performance

A

HSM (hardware security module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ is a way of detecting and preventing confidential data from being exfiltrated physically or logically from an organization by accident or on purpose

A

DLP (data loss prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a ____ cloud provides shared resources over the Internet

A

public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 common public cloud models are SaaS, PaaS and IaaS. explain the difference

A

SaaS: involves the delivery of a licensed application to customers over the Internet for use as a service on demand
PaaS: delivery of a computing platform, often an operating system with associated services, over the Internet without downloads or installation
IaaS: involves the delivery of computer infrastructure in a hosted service model over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a _____ is a software or hardware layer program that permits the use of many instances of an operating system or instances of different operating systems on the same machine, independent of each other

A

hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a Type __ native or bare-metal hypervisor is software that runs directly on a hardware platform

A

Type I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a Type __, or hosted, hypervisor is software that runs within an operating system environment

A

Type II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is based on the capability to handle the changing needs of a system within the confines of the current resources

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ is the capability to expand and reduce resources as needed at any given point in time

A

elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ is a method for organizations to manage network services through a decoupled underlying infrastructure, allowing quick adjustments to changing business requirements

A

SDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ clouds consist of workloads deployed across subnets within one or more isolated availability zones that make up the VPC deployed within a geographic region

A

IAAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an ____ transit gateway allows for the connection of on-premise networks to cloud-hosted networks

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a ____ is implemented to monitor event and application logs, port access, and other running processes

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ factors are something you are, something you have, something you know, somewhere you are, and something you do

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____, such as iris scans and fingerprints, are examples of physical access controls

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ is presenting credentials or keys; ____ is verifying presented credentials

A

identification, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the ____ algorithm relies on a shared secret and a moving factor or counter, which is the current time

A

TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the ____ algorithm relies on a shared secret and a moving factor or counter

A

HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

this combo is the most common form of authentication

A

password and username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____-_____ authentication is a strong form requiring possession of the token item

A

token based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

____ lockouts prevents brute-force attacks

A

password lockout

24
Q

formal backup types include ___, ______, and _____. in addition, snapshots and copies meet requirements for certain backup use cases

A

full, incremental and differential

25
Q

a ____ backup includes all data that has changed since the last full backup, regardless of whether or when the last differential backup was made. it does not reset the archive bit

A

differential backup

26
Q

a _____ backup never requires more than 2 backups for restore operations (the last full backup and the latest differential backup)

A

differential

27
Q

an _____ backup includes all the data that has changed since the last _____ backup. it does reset the archive bit

A

incremental

28
Q

an _____ backup requires the last full backup and every ____ backup since the last full backup

A

incremental

29
Q

with _____ disks and a _____ scheme, a system can stay up and running when a disk fails, as well as during the time the replacement disk is being installed and data is being restored

A

multiple, RAID

30
Q

_____ organizes multiple disks into a large, high-performance logical disk. describe the popular types of _____

A

RAID
RAID 0: striped disk array without fault tolerance
RAID 1: mirroring and duplexing
RAID 5: independent data disks with distributed parity blocks
RAID 10: RAID 1 and RAID 0; requires a minimum of 4 disks

31
Q

_____ solutions address security requirements such as visibility, data protection, threat protection, and compliance across public cloud services

A

CASB

32
Q

Network ____ _____ are servers configured in a cluster to provide scalability and high availability

A

load balancers

33
Q

common physical _____ controls include motion detectors, CCTV monitors, and alarms

A

detective

34
Q

an access control ______ is a holding area between two entry points in which one door cannot be unlocked and opened until the other door has been closed and locked

A

vestibule

35
Q

with ____ systems, overcooling causes condensation on equipment and too dry environments lead to excessive static

A

HVAC

36
Q

this is what a sprinkler system is called _______________________
while this system has pipes filled with pressurized air instead of water

A

wet-pipe fire-suppression system
dry pipe systems

37
Q

list the different fire classes and suppression remedies

A

class a: (trash, wood, and paper), water
class b: (flammable liquids, gases, and grease), foam
class c: (energized electrical equipment, electrical fires, and burning wires), carbon dioxide based extinguishers
class d: (combustible metals), sodium chloride and copper-based dry powder

38
Q

purpose of ____: is to make physical access difficult by enclosing equipment and to make electronic access difficult by using different cables and patch panels

A

PDS

39
Q

purpose of ____: is to make physical access difficult by enclosing equipment and to make electronic access difficult by using different cables and patch panels

A

PDS

40
Q

data centers and server farms use ____ ____ facing opposing directions. fan intakes draw in cool air vented to racks facing the cold aisle, and then fan output of hot air is vented to the alternating hot aisles for removal from the data center

A

alternating rows

41
Q

____ shielding seeks to reduce electronic signals that leak from computer and electronic equipment. the shielding can be local, can cover an entire room or can cover a whole building. two types are _____ shielding and ______ cages

A

EMI
TEMPEST shielding, faraday cages

42
Q

cryptographic tech provides for ___, ____, ____, and authentication

A

confidentiality, integrity, nonrepudiation, authentication

43
Q

exchanging keys often happens securely ______ during the need to establish a secure session. any type of out of band key exchange relies on having been shared in ____

A

in band, advance

44
Q

encryption can be applied to ____ ___ which includes data at rest, transit and in use

A

data state

45
Q

____ refers to the level of change from the plaintext input to the ciphertext output, which should be significant

A

confusion

46
Q

______ ensures that any change, even minor, to the plaintext input results in significant change tot he ciphertext output

A

diffusion

47
Q

_____ key algorithms depend on a shared single key for encryption and decryption. examples: DES, 3DES, RC5, and AES

A

symmetric

48
Q

____ key algorithms use a public key for encryption and a private key for decryption. examples: RSA, Diffie-Hellman, El Gamal, and elliptic curve cryptography standards

A

asymmetric

49
Q

______ ensures proof of origin, submission, delivery and receipt

A

nonrepudiation

50
Q

_____ ciphers are not as fast, but they encrypt on blocks of a fixed length and have a higher level of diffusion compared to ___ ciphers in which encryption is performed bit by bit

A

block, stream

51
Q

_____ ____ cryptography is most common in mobile and wireless use cases

A

elliptic

52
Q

a ____ algorithm uses a mathematical formula to verify data integrity. if ___ values are different, the file has been modified

A

hashing, hash

53
Q

____ is a substitution cipher. first half of the roman alphabet corresponds to the second half and it is inverse in nature

A

ROT13

54
Q

after a session is complete, when both sides in the communication process destroy the keys, this is known as ____ ____ _____ or just ____ _____

A

perfect forward secrecy, forward secrecy

55
Q

_____ ___ agreement protocols such as DHE and ECDHE provide perfect forward secrecy

A

ephemeral key

56
Q

____ and ____ are key derivation functions (KDFs) that are primarily used for key stretching, which provides a means to stretch a key or password, making an existing key or password stronger

A

Bcrypt, PBKDF2

57
Q

_____ are igital ledgers with transactions grouped into cryptographically linked blocks

A

blockchains