Domain 2.0: Architecture & Design Flashcards
Recovery sites can be hot, warm or cold. explain the difference
hot site: is an operational ready-to-go data center; it has the fastest recovery time and highest cost
cold site: longer recovery window with a lower cost
warm site is a compromise
_____ and ____ are used to study the actions of hackers and distract them from more valuable data
honeypots/honeynets
An ____ is a combination of hardware and software/firmware that is attached to or contained inside a computer to provide cryptographic functions for tamper protection and increased performance
HSM (hardware security module)
____ is a way of detecting and preventing confidential data from being exfiltrated physically or logically from an organization by accident or on purpose
DLP (data loss prevention)
a ____ cloud provides shared resources over the Internet
public
3 common public cloud models are SaaS, PaaS and IaaS. explain the difference
SaaS: involves the delivery of a licensed application to customers over the Internet for use as a service on demand
PaaS: delivery of a computing platform, often an operating system with associated services, over the Internet without downloads or installation
IaaS: involves the delivery of computer infrastructure in a hosted service model over the Internet
a _____ is a software or hardware layer program that permits the use of many instances of an operating system or instances of different operating systems on the same machine, independent of each other
hypervisor
a Type __ native or bare-metal hypervisor is software that runs directly on a hardware platform
Type I
a Type __, or hosted, hypervisor is software that runs within an operating system environment
Type II
_____ is based on the capability to handle the changing needs of a system within the confines of the current resources
Scalability
______ is the capability to expand and reduce resources as needed at any given point in time
elasticity
____ is a method for organizations to manage network services through a decoupled underlying infrastructure, allowing quick adjustments to changing business requirements
SDN
_____ clouds consist of workloads deployed across subnets within one or more isolated availability zones that make up the VPC deployed within a geographic region
IAAS
an ____ transit gateway allows for the connection of on-premise networks to cloud-hosted networks
IaaS
a ____ is implemented to monitor event and application logs, port access, and other running processes
HIDS
_____ factors are something you are, something you have, something you know, somewhere you are, and something you do
authentication
_____, such as iris scans and fingerprints, are examples of physical access controls
biometrics
____ is presenting credentials or keys; ____ is verifying presented credentials
identification, authentication
the ____ algorithm relies on a shared secret and a moving factor or counter, which is the current time
TOTP
the ____ algorithm relies on a shared secret and a moving factor or counter
HOTP
this combo is the most common form of authentication
password and username
_____-_____ authentication is a strong form requiring possession of the token item
token based