Domain 3 Flashcards

1
Q

Generator

A

sustained period of power loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Management Plane

A

The management plane of a cloud service provider’s datacenter should be reserved for use by that provider’s own engineers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RFID - Track items in a facility

A

Radio frequency identification (RFID) technology is a cost-effective way to track items in a facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DR Sites: Cold site, Warm site, Hot site

A

Hot site: A fully functional data center that’s usually kept ready around the clock. It’s a near duplicate of an organization’s primary site, with complete backups of user data and full computer systems. Hot sites are the most expensive option and are best for businesses with zero tolerance for downtime and data loss

Warm site: A data center that’s equipped with some or all of the hardware, software, and network services found in a working data center, but doesn’t have live data. Warm sites are a good option for businesses with a lower budget and a need for flexible and fast recovery

Cold site: An empty operational space with basic facilities like air conditioning, power, and communication lines. Cold sites have no or little equipment or hardware, and no network connectivity or data synchronization. Before a cold site can be used, backup data and additional hardware must be sent to the site and installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Partitioning of the virtual machines: Hypervisor

A

All of these technologies play some role in tenant partitioning. However, this question asked specifically about the partitioning of virtual machines belonging to different tenants. This is the responsibility of the hypervisor on a virtualization platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SIEM Versus SOAR

Security Information and Event Management (SIEM)

security orchestration, automation, and response (SOAR) platforms

A

SOARs use machine learning-driven automation to prioritize and respond to security incidents, while SIEMs simply identify them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RTO < MTD

the recovery time objective (RTO)
the maximum tolerable downtime (MTD)

A

the recovery time objective (RTO) data, she needs to ensure that the organization can recover from an outage in less than 30 minutes based on the maximum tolerable downtime (MTD) of 30 minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A content delivery network (CDN)

can handle DDoS attacks

A

A content delivery network (CDN) run by a major provider can handle large-scale DDoS attacks more easily than any of the other solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

business impact analysis (BIA)

A

The business impact analysis (BIA) is designed for this purpose: to determine the critical path of assets/resources/data within the organization. It is a perfect tool to use in shaping the BC/DR plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Well designed data center

A

A well-designed datacenter should have redundant systems and capabilities for each critical part of its infrastructure. That means that power, cooling, and network connectivity should all be redundant. Kim should determine how to ensure that a single system failure cannot take her datacenter offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ultimate responsibility (CEO)

for the success of the disaster recovery plan

A

The key to successfully answering this question is noticing that it asks who bears “ultimate responsibility.” The chief executive officer (CEO) bears ultimate responsibility for the success of the organization and, therefore, will be the one held accountable if the business fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The hypervisor

A

The hypervisor is responsible for coordinating access to physical hardware and enforcing isolation between different virtual machines running on the same physical platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VLAN : Data center -
network segmentation

A

Virtual local area networks (VLANs) are used to create logical separation between systems in a datacenter and are the most cost-effective way to provide network segmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk - opportunity : balance

A

Risk should always be considered from a business perspective. When a risk is accepted, it should be balanced by a corresponding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DC Tiers - availability %

A

Tier 1 datacenters are expected to achieve 99.671% availability.

Tier 2 datacenters are expected to achieve 99.741% availability.

Tier 3 datacenters are expected to achieve 99.982% availability.

Tier 4 datacenters are expected to achieve 99.995% availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

recovery point objective (RPO)

A

The recovery point objective (RPO) is a measure of data that can be lost in an outage without irreparably damaging the organization. Data replication strategies will most affect this metric, as the choice of strategy will determine how much recent data is available for recovery purposes.

17
Q

Recovery time objective (RTO)

A

Recovery time objective (RTO) is a measure of how long an organization can endure an outage without irreparable harm. This may be affected by the replication strategy, but not as much as the RPO.

18
Q

The maximum allowable downtime (MAD)

A

The maximum allowable downtime (MAD) is how long an organization can suffer an outage before ceasing to be an organization. This is not dependent on the RPO, and the data replication strategy won’t have much effect on it at all.

19
Q

The mean time to failure (MTTF)

A

The mean time to failure (MTTF) is a measure of how long an asset is expected to last (usually hardware), as determined by the manufacturer/vendor. The data replication strategy will have no bearing on this whatsoever.

20
Q

the northbound interface (NBI)

A

In software-defined networking (SDN), the northbound interface (NBI) usually handles traffic between the
SDN controllers and SDN applications

21
Q

Ping, Power, Pipe

Cloud data center characteristic

A

Ping is a term used to describe the ability of customers to access their systems remotely. Power is shorthand for electrical power to the systems. Pipe refers to the network connectivity that supports servers’ connections to the internet.

22
Q

SDN allows n/w admins n architects to

A

Software-defined networks allow administrators to perform a variety of automated functions. These include rerouting traffic based on current customer demand, creating logical subnets without having to change any physical connections, and filtering access to resources based upon specific rules or settings

23
Q

Disk Volumes - block storage
Disk volumes - when snapshot - store in less expensive object storage

A

Disk volumes used to support virtual machines are typically stored on block storage. However, when snapshotting is used to create backups of those disks, the backups are commonly stored in less expensive object storage. Dedicated disks are not generally used in cloud environments

24
Q

Most accurate reconstruction of user activity —

full packet capture

A

full packet capture provides the most accurate reconstruction of user activity, but it is costly to implement due to data storage requirements.

25
Q

IMP —-Managed service arrangement - sometimes restrict port scan and pen test

A

Many cloud providers restrict activities that are common for administrative and security purposes but can also be construed/used for hacking; this includes port scanning and penetration testing. These restrictions can reduce the customer’s ability to perform basic security functions. Customers should review these practices with service providers and confirm that they are allowed to conduct routine security activities.

26
Q

No physical access - cloud data centers

A

Cloud providers may be reluctant to grant physical access, even to their customers, on the assumption that allowing access would disclose information about security controls. In some cases, cloud customers won’t even know the location(s) of the datacenter(s) where their data is stored.

27
Q

VM Config mgmt tools should —
log file generation

A

Virtual machine (VM) configuration management (CM) tools should require that managed systems perform

28
Q

Human Safety

A

Health and human safety is a paramount goal of security; all facilities must have multiple emergency egress points