Domain 2.0: Architecture & Design Flashcards

1
Q

Recovery sites can be hot, warm or cold. explain the difference

A

hot site: is an operational ready-to-go data center; it has the fastest recovery time and highest cost
cold site: longer recovery window with a lower cost
warm site is a compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ and ____ are used to study the actions of hackers and distract them from more valuable data

A

honeypots/honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An ____ is a combination of hardware and software/firmware that is attached to or contained inside a computer to provide cryptographic functions for tamper protection and increased performance

A

HSM (hardware security module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ is a way of detecting and preventing confidential data from being exfiltrated physically or logically from an organization by accident or on purpose

A

DLP (data loss prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a ____ cloud provides shared resources over the Internet

A

public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 common public cloud models are SaaS, PaaS and IaaS. explain the difference

A

SaaS: involves the delivery of a licensed application to customers over the Internet for use as a service on demand
PaaS: delivery of a computing platform, often an operating system with associated services, over the Internet without downloads or installation
IaaS: involves the delivery of computer infrastructure in a hosted service model over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a _____ is a software or hardware layer program that permits the use of many instances of an operating system or instances of different operating systems on the same machine, independent of each other

A

hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a Type __ native or bare-metal hypervisor is software that runs directly on a hardware platform

A

Type I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a Type __, or hosted, hypervisor is software that runs within an operating system environment

A

Type II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is based on the capability to handle the changing needs of a system within the confines of the current resources

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ is the capability to expand and reduce resources as needed at any given point in time

A

elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ is a method for organizations to manage network services through a decoupled underlying infrastructure, allowing quick adjustments to changing business requirements

A

SDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ clouds consist of workloads deployed across subnets within one or more isolated availability zones that make up the VPC deployed within a geographic region

A

IAAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an ____ transit gateway allows for the connection of on-premise networks to cloud-hosted networks

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a ____ is implemented to monitor event and application logs, port access, and other running processes

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ factors are something you are, something you have, something you know, somewhere you are, and something you do

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____, such as iris scans and fingerprints, are examples of physical access controls

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ is presenting credentials or keys; ____ is verifying presented credentials

A

identification, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the ____ algorithm relies on a shared secret and a moving factor or counter, which is the current time

A

TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the ____ algorithm relies on a shared secret and a moving factor or counter

A

HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

this combo is the most common form of authentication

A

password and username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____-_____ authentication is a strong form requiring possession of the token item

A

token based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

____ lockouts prevents brute-force attacks

A

password lockout

24
Q

formal backup types include ___, ______, and _____. in addition, snapshots and copies meet requirements for certain backup use cases

A

full, incremental and differential

25
a ____ backup includes all data that has changed since the last full backup, regardless of whether or when the last differential backup was made. it does not reset the archive bit
differential backup
26
a _____ backup never requires more than 2 backups for restore operations (the last full backup and the latest differential backup)
differential
27
an _____ backup includes all the data that has changed since the last _____ backup. it does reset the archive bit
incremental
28
an _____ backup requires the last full backup and every ____ backup since the last full backup
incremental
29
with _____ disks and a _____ scheme, a system can stay up and running when a disk fails, as well as during the time the replacement disk is being installed and data is being restored
multiple, RAID
30
_____ organizes multiple disks into a large, high-performance logical disk. describe the popular types of _____
RAID RAID 0: striped disk array without fault tolerance RAID 1: mirroring and duplexing RAID 5: independent data disks with distributed parity blocks RAID 10: RAID 1 and RAID 0; requires a minimum of 4 disks
31
_____ solutions address security requirements such as visibility, data protection, threat protection, and compliance across public cloud services
CASB
32
Network ____ _____ are servers configured in a cluster to provide scalability and high availability
load balancers
33
common physical _____ controls include motion detectors, CCTV monitors, and alarms
detective
34
an access control ______ is a holding area between two entry points in which one door cannot be unlocked and opened until the other door has been closed and locked
vestibule
35
with ____ systems, overcooling causes condensation on equipment and too dry environments lead to excessive static
HVAC
36
this is what a sprinkler system is called _______________________ while this system has pipes filled with pressurized air instead of water
wet-pipe fire-suppression system dry pipe systems
37
list the different fire classes and suppression remedies
class a: (trash, wood, and paper), water class b: (flammable liquids, gases, and grease), foam class c: (energized electrical equipment, electrical fires, and burning wires), carbon dioxide based extinguishers class d: (combustible metals), sodium chloride and copper-based dry powder
38
purpose of ____: is to make physical access difficult by enclosing equipment and to make electronic access difficult by using different cables and patch panels
PDS
39
purpose of ____: is to make physical access difficult by enclosing equipment and to make electronic access difficult by using different cables and patch panels
PDS
40
data centers and server farms use ____ ____ facing opposing directions. fan intakes draw in cool air vented to racks facing the cold aisle, and then fan output of hot air is vented to the alternating hot aisles for removal from the data center
alternating rows
41
____ shielding seeks to reduce electronic signals that leak from computer and electronic equipment. the shielding can be local, can cover an entire room or can cover a whole building. two types are _____ shielding and ______ cages
EMI TEMPEST shielding, faraday cages
42
cryptographic tech provides for ___, ____, ____, and authentication
confidentiality, integrity, nonrepudiation, authentication
43
exchanging keys often happens securely ______ during the need to establish a secure session. any type of out of band key exchange relies on having been shared in ____
in band, advance
44
encryption can be applied to ____ ___ which includes data at rest, transit and in use
data state
45
____ refers to the level of change from the plaintext input to the ciphertext output, which should be significant
confusion
46
______ ensures that any change, even minor, to the plaintext input results in significant change tot he ciphertext output
diffusion
47
_____ key algorithms depend on a shared single key for encryption and decryption. examples: DES, 3DES, RC5, and AES
symmetric
48
____ key algorithms use a public key for encryption and a private key for decryption. examples: RSA, Diffie-Hellman, El Gamal, and elliptic curve cryptography standards
asymmetric
49
______ ensures proof of origin, submission, delivery and receipt
nonrepudiation
50
_____ ciphers are not as fast, but they encrypt on blocks of a fixed length and have a higher level of diffusion compared to ___ ciphers in which encryption is performed bit by bit
block, stream
51
_____ ____ cryptography is most common in mobile and wireless use cases
elliptic
52
a ____ algorithm uses a mathematical formula to verify data integrity. if ___ values are different, the file has been modified
hashing, hash
53
____ is a substitution cipher. first half of the roman alphabet corresponds to the second half and it is inverse in nature
ROT13
54
after a session is complete, when both sides in the communication process destroy the keys, this is known as ____ ____ _____ or just ____ _____
perfect forward secrecy, forward secrecy
55
_____ ___ agreement protocols such as DHE and ECDHE provide perfect forward secrecy
ephemeral key
56
____ and ____ are key derivation functions (KDFs) that are primarily used for key stretching, which provides a means to stretch a key or password, making an existing key or password stronger
Bcrypt, PBKDF2
57
_____ are igital ledgers with transactions grouped into cryptographically linked blocks
blockchains