Domain 3 Flashcards

1
Q

Infrastructure as a Service (Iaas)

A

Customer is responsible for configuring VM’s, Virtual network and guest OS security as if systems were on Premises. CSP is responsible for the physical components, internal network and tool provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Platform as a Service(Paas)

A

CSP is responsible for physical components, the internal network, and tools provided. Cheaper for customer but less control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software as a Service(Saas)

A

Customer is responsible for configuring access to the cloud service for their users as well as shared responsibility for data recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Public Cloud

A

Everything run on the cloud providers hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Private Cloud

A

Cloud environment in your data centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hybrid Cloud

A

Combines Public and Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multi Cloud

A

2 or more public cloud providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multitenancy

A

Logical isolation in CSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Infrastructure as a Code

A

Management of infrastructure (Networks, VM, load balancers and connection topology) described in code. It is a key DevOps practice and is used in conjunction with continuous integration and continuous delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Serverless Architecture

A

Cloud computing execution model where cloud provider dynamically manages the allocation and provisioning of servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microservices

A

Microservices are an architectural style in software development where a system is built as a collection of small, independent, and loosely coupled services. Each service is designed to perform a specific business function and communicates with other services through well-defined APIs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logical segmentation

A

Vlans ( Layer 2) - Logically segment a local area network into subnetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN

A

Creating an encrypted tunnel between devices or networks to pass traffic using protocols like IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual routing and forwarding

A

Allows a single router or switch to function as a multiple virtual router or switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software Defined Network (SDN)

A

Network architecture approach that enables the network to be centrally controlled or programmed using software. Has a capacity to reprogram the data plane at any time. Use cases include SD-Lan and SD-Wan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Containerization

A

Lightweight portable way to package applications for multiple platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virtualization

A

Server Virtualization the process of dividing a physical server into multiple unique and isolated virtual servers by means of software application (Hypervisor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VM Escape

A

Where attacker gains access to a VM then attacks either the host machine that holds all the VMs, the hypervisor or any other VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

VM Sprawl

A

Unmanaged VM on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IOT (Internet of Things)

A

Connected to the internet . Elective curve(Smaller keys). Limited Compute resources and Limited ability to patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SCADA ( Supervisory Control and Data Acquisition)

A

Large amount of industrial equipment. Do not have direct access for greater security. Should be segmented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RTOS (Real time operating systems)

A

Smart devices like wearables and embedded systems Operate with very specific scheduling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Embedded Systems

A

Technology component of an IOT devices . A full computer system embedded inside another larger system ( Examples - GPS, Drones, VoIP phones)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Availability

A

Ensuring a system or service is accessible to authorised users when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Resilience

A

System availability to handle disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Responsiveness

A

Ability to respond to user request or events in a timely manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Scalability

A

Ability to scale resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Ease of deployment

A

Complexity and effort required implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Risk Transference

A

Security risks mitigated by transferring some responsibility to third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Internet

A

A Private network that is designed to host the information internal to the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Extranet

A

Section of an organisation network that has been sectioned off to act as intranet for the private network but also serves information to external business partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Screened Subnet

A

DMZ/ Perimeter network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Attack vectors

A

Consist of all the threat vectors that a system is exposed to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Fail-Open

A

Allows everything to pass through system when it fails. No security controls are enforced. There is no disruption in network activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Fail- Closed

A

Nothing can pass through the system when it fails . No security controls are ignored, network traffic is disrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

NIPS/NIDS - Inline

A

Place near the fire wall as an additional layer of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

NIPS/ NIDS - Tap ( Out of band)

A

replicates traffic. Active taps - require power to operate. Passive taps -does not require operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Jump Server

A

Place on Screened Subnet allows admins to connect remotely to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Forward Proxy

A

Server that controls requests from clients seeking resources on the internet or an external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Reverse Proxy

A

Placed on a screened subnet, performs the authentication and decryption of a secure session to enable it to filter the incoming traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

IDS

A

Analyses whole packets, both headers and payload looking for known events. Known event is detected, a log is generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

IPS

A

Analyses whole packets both header and payload looking for known events. Know event is detected, packet is rejected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

HIDS/HIPS

A

Host Based IDS/IPS - Monitor activity on a single system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

NIDS/NIPS

A

Can monitor activity on a network

45
Q

Behaviour based

A

Baseline of activity to identify normal behaviour

46
Q

Signature Based

A

Uses Signature - Used for known attack methods

47
Q

NIC

A

Network Interface Card - Dual network cards paired together to give maximum throughput

48
Q

802.1x

A

Is a IEEE standard for port based network access control . It is Authentication process

49
Q

EAP

A

Extensible Authentication Protocol - Allows for new authentication technologies to be compatible with existing wireless or point to point connection technologies

50
Q

PEAP

A

Encapsulates EAP within a TLS tunnel

51
Q

LEAP

A

LEAP is insecure

52
Q

EAP-TLS

A

secure version of wireless authentication requires X.509 . Involves 3 parties

53
Q

EAP- TTLS

A

Uses two phases

54
Q

Static Packet - Filtering Firewall

A

Operate layer 3 - Filters traffic by examining data from a message header

55
Q

Application Level Firewall

A

Operates at Layer 7 - Filters traffic based on a single internet service, protocol or application

56
Q

Circuit Level Firewall

A

Layer 5 - Used to establish communication sessions between trusted partners

57
Q

Stateful Inspection Firewall

A

Evaluates the state, session or the context of network traffic

58
Q

Stateless Firewall

A

Watch network traffic . Block packets based on source and destination addresses or static values. Heavier traffic loads

59
Q

Statefull

A

Can watch traffic streams from end to end

60
Q

WAF (Web Application Firewall)

A

HTTP traffic ( Protects from XSS, CSRF, SQL injection)

61
Q

NGFW ( Next Generation)

A

Deep Packet firewall. Adds Application level inspection, IPS and brings intelligence from outside. It is multifunctional

62
Q

Deep Packet Inspection

A

Filters the header and payload

63
Q

Unified Threat Management

A

Multifunction device (IDS, IPS, TLS/SSL proxy, web filtering, bandwidth throttling, NAT, VPN anchoring, antivirus

64
Q

Split Tunnel

A

Traffic destined for corporate network only, Internet traffic direct through normal route

65
Q

IPSEC Protocols

A

AH ( Authentication Header and ESP (Encapsulating Security Payload). AH does not perform encryption ESP provides data confidentiality, integrity, data origin authentication)

66
Q

SD-WAN ( Software Define Wide Area Network)

A

Enables users in branch office to remotely connect to enterprise network. Security is based on IP Security, VPN tunnel, NGFW, micro segmentation

67
Q

SASE (Secure Access Service Edge)

A

Related to Zero Trust Architecture - Brings together networking and security functions and delivers them as an integrated cloud service ( Includes Firewall, Antimalware, Secure web gateway, DLp, IPS , CASB

68
Q

Regulated Data

A

Data Subjects to Specific laws and regulations governing its collection, storage and Use . Examples PHI, financial information, PII

69
Q

Trade Secret

A

Intellectual property of inventor Eg: Formulas, product design

70
Q

Intellectual Property

A

Creation of minds - Intangible assets Patents (20 Years), Copyrights, Trademarks (10 Years), Trade secret (must be disclosed), Copyright (70 years)

71
Q

Financial Information

A

Financial Records (GLBA and PCI-Dss)

72
Q

Public Data

A

Freely accessible information intended for general public

73
Q

Private Data

A

Information about individual that should be kept Confidential (PII, PHI)

74
Q

Confidential Data

A

Organisation intends to keep secret within a designated group

75
Q

Restricted Data

A

Subject to external regulations or legal requirement

76
Q

Sensitive Data

A

Information is not publicly known (includes private, confidential, restricted)

77
Q

Restricted Data

A

Subject to external regulations or legal requirements that limit access and control its handling

78
Q

Full Disk Encryption

A

Helps to encrypt Windows and Linux Iaas VM’s using Bitlocker for Windows and Dm-Crypt for Linux

79
Q

Transparent Data Encryption

A

Helps to protect SQL database and data warehouses against threat of malicious activity with real time encryption and decryption of database

80
Q

Data Sovereignty

A

Data is subject to the laws and regulation of the country in which it was created. It cannot be moved to another region. Data is subject to the laws of where it is stored

81
Q

Geolocation

A

Use GPS to give the actual location of a mobile device - Somewhere you are

82
Q

Encryption

A

Two way function ( Symmetric and Asymmetric)

83
Q

Hashing

A

One way function that scrambles plain text to produce a unique message digest

84
Q

Data Masking

A

Only partial data is left in a data field

85
Q

Tokenization

A

Meaningful data is replaced with a token that is generated randomly and original data is held in a vault

86
Q

Pseudonymization

A

De-identification procedure in which PII fields within a data record are replaced by one or more artificial identifiers or pseudonyms

87
Q

Anonymization

A

process of removing all relevant data so that it is impossible to identify original subject or person

88
Q

Obfuscation

A

Intentionally making data less readable or understandable

89
Q

Segmentation

A

Method involving dividing data into smaller isolated segments

90
Q

Clustering

A

Combines multiple servers into a single, highly available entity ensuring continuous service even when individual servers fail

91
Q

Platform Diversity

A

Utilizing mix of different platforms

92
Q

COOP (Continuity of Operations)

A

Procedures and Resources to maintain critical business functions

93
Q

Cold Site

A

A data centre space

94
Q

Warm Site

A

Preventative site

95
Q

HOT site

A

Hot site allows you to keep servers and a live backup site up and running

96
Q

Capacity Planning

A

Process of proactively assessing and ensuring an organisation has sufficient resources

97
Q

Tabletop

A

Structured Walkthrough _ Paper based, hypothetical (Talking Only)

98
Q

Failover

A

Shut down primary site and test recovery site

99
Q

Simulation

A

Test the plans in a simulated operational environment

100
Q

Parallel Processing

A

Activating it during the test

101
Q

Onsite/ Offsite

A

Onsite - Physical location, Offsite - Separate locations

102
Q

Snapshot

A

Point in time copies of data at a specific moment - Common in VM

103
Q

Recovery

A

Restoring data from a backup to its original location or a new location

104
Q

Replication

A

Creating identical copies of data in multiple location

105
Q

Journaing

A

Transaction logging, records all changes made to data in a sequential log file

106
Q

UPS (Uninterrupted Power Supply)

A

Self charging battery - Primary power fails it provides power

107
Q

Generator

A

Standby power source that is powered by diesel, gasoline, propane or natural gas for extended period of time

108
Q
A