Domain 3 : Explain the importance of resilience and recovery in security architecture Flashcards

1
Q

High Availability

A

A high-availability infrastructure is designed to not only withstand relentless cyberattacks but also possesses the technical sophistication to autonomously detect, mitigate, and heal vulnerabilities in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Least Utilized Host

A

The load balancer monitors the health of all web servers within the server farms and identifies the least utilized host (that is, the host with the lightest current workload) using a smart scheduling algorithm. This method is effective for applications where server load varies, and the goal is to optimize resource utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS round robin

A

With DNS round robin, when the request comes in, the load balancer contacts the DNS server and rotates requests starting with the IP address that has the lowest number first. It rotates through Web 1, Web 2, and Web 3, and then keeps the sequence going by going back to Web 1 on a rotational basis, as illustrated by Figure 13.2:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Affinity

A

: Affinity is a technique in which the load balancer directs requests from the same client to the same backend server for the duration of a session. The client is identified by their IP address or another session attribute. When the load balancer is set to “Affinity”, the request is sent to the same web server based on the requester’s IP address. This is also known as session persistence or a sticky session, where the load balancer uses the same server for the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

active/active load balancer configuration

A

load balancers function together as a dynamic array, actively managing incoming traffic. The configuration can include multiple load balancers and there must be at least two. They not only distribute traffic but also cache requests for enhanced efficiency. An interesting feature is that if a user returns to a website for a subsequent visit, they are directed to the same load balancer that handled their initial request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

active/passive load balancer configuration

A

has one active load balancer and one or more passive load balancers. The active node is responsible for actively load-balancing incoming requests. Simultaneously, the passive node or nodes operate in standby mode, constantly monitoring the active node’s health and status. Should the active node encounter a failure or become unavailable, a passive node seamlessly takes over, ensuring uninterrupted service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Downtime

A

: time during which production is stopped especially during setup for an operation or when making repairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Clustering

A

clustering involves grouping multiple servers or nodes together to operate as a single system. Clustering involves an active node and a passive node that share a common quorum disk, reinforced by a witness server, heartbeat communication, and a VIP at the forefront.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Quorum Disk

A

: The quorum disk is a shared storage resource that members of the cluster share. It acts as a neutral arbiter, storing critical configuration and state information that both the active and passive nodes access. This shared resource serves as the backbone of decision-making within the cluster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Witness server

A

Adding an additional layer of reliability, the witness server is an impartial entity that assists in determining the state of the cluster. The witness server helps prevent split-brain scenarios and ensures that the cluster operates smoothly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Heartbeat communication

A

Communication between the active and passive nodes is facilitated through a heartbeat mechanism. This heartbeat—analogous to the rhythmic pulse of a living organism—involves regular exchanges of status updates, or a “node heartbeat.” The passive node continuously monitors the active node’s heartbeat. If it detects an absence or irregularity in the node heartbeat, it knows that the active node has failed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virtual IP (VIP):

A

: At the forefront of the clustering setup is the VIP. It’s the public-facing interface of the cluster, acting as the entry point for external requests. The VIP ensures that even if the active node experiences any failures, the cluster remains accessible to users without disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hot site

A

: A hot site is the best site for rapid recovery. It is a fully operational site that mirrors your primary data center or infrastructure. This site is up and running with staff loading data into the systems immediately as it is replicated. This immediate response capability makes hot sites the most expensive option to maintain but also the fastest to recover from downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Warm site

A

: A warm site is fully functional, but data synchronization typically lags behind that of a hot site. Data may be sent to the warm site by courier or other means, resulting in a delay of 3–4 hours compared to the primary site. This setup allows for a reasonably swift recovery while being more cost-effective than a hot site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cold site

A

Where the budget is very limited, a cold site presents an economical choice. Unlike hot and warm sites, a cold site is essentially an empty shell. It provides essential infrastructure, such as a power and water supply, but lacks staff, equipment, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geographic disperation

A

Geographic dispersion involves the strategic distribution of data centers, servers, and critical infrastructure across different geographical locations, often separated by significant distances. The primary objective is to enhance resilience by reducing the risk of a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Local Redundant Storage (LRS)

A

In LRS, three copies of your data are replicated within a single physical location or data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Zone Redundant Storage (ZRS)

A

ZRS takes redundancy a step further by replicating data between three separate availability zones within your primary cloud region

19
Q

Availability Zone

A

Availability zones have independent power, cooling, and networking infrastructure. They’re designed so that if one zone experiences an outage, then regional services, capacity, and high availability are supported by the remaining zones.

20
Q

GEO Redundant Storage (GRS

A

Similarly to LRS, GRS offers robust redundancy by creating three copies of your data within a single physical location in the primary region. However, GRS takes this a step further by also storing one copy of the data in a secondary region, often located at a considerable geographical distance. This approach provides protection against regional disasters while maintaining high availability within the primary region.

21
Q

GEO Zone Redundant Storage (GZRS)

A

GZRS combines the benefits of ZRS and GRS. It replicates data between three separate availability zones within your primary region and one copy to a secondary region, ensuring both regional and zone-level redundancy. This comprehensive approach maximizes data resilience and availability.

22
Q

Data sovereignty

A

Data sovereignty regulations in various countries dictate where data can be stored and processed.

23
Q

Continuity of Operations (COOP)

A

COOP is a comprehensive strategy that enables organizations to continue essential functions and services during and after disruptive events.

24
Q

COOP Includes

A

Resilience and redundancy: COOP aims to build resilience into an organization’s infrastructure, systems, and processes. This includes redundancy in critical systems, data backups, and alternate communication methods. The goal is to reduce single points of failure.
Communication plans: Effective communication is vital during a crisis. COOP includes well-defined communication plans that ensure information flows smoothly within the organization and to external stakeholders. This helps maintain trust and transparency during challenging times.
Personnel preparedness: COOP involves training personnel to carry out their roles during disruptions. This includes cross-training, developing clear responsibilities, and ensuring that key personnel are available, even during emergencies. Organizations simulate disruptions to evaluate their ability to execute the plan and make improvements as necessary.
Review and updates: Regular reviews and updates are essential to keep the plan aligned with current risks and organizational changes.

25
Q

Capacity Planning

A

Capacity planning is a strategic process that organizations use to ensure they have the right resources (including personnel, technology, and infrastructure) to meet current and future demands effectively and efficiently.

26
Q

table top excerise

A

A tabletop exercise is a valuable tool for testing your disaster recovery plan in a controlled, hypothetical setting. During this exercise, key stakeholders gather around a table to discuss and strategize how they would respond to a disaster scenario.

27
Q

Failover

A

r: Failover mechanisms are a testament to resilience in action. They enable the seamless transfer of operations to backup systems or data centers in the event of a system failure or disruption

28
Q

Simulations

A

Simulations introduce an element of competitiveness and urgency into disaster recovery exercises. The exercise typically involves a white team overseeing and assessing responses based on a predefined disaster scenario from the recovery plan. These drills simulate real-world cyberattacks, enabling organizations to test their incident response plans in a controlled environment.

29
Q

Snapshots

A

Snapshots are copies of virtual machines frozen at a specific point in time.

30
Q

Journaling

A

journaling meticulously records when files are created, edited, or removed, along with the specifics of these changes.

31
Q

Generators

A

Generators serve as the dependable backup, ensuring that essential systems remain operational, even when the primary power source fails. Generators are safety nets that prevent organizations from plunging into darkness during power outages or disruption

32
Q

Off site back ups

A

If we are backing up media, we should keep a copy off-site in case of a natural disaster such as a fire or flood.

33
Q

Uninterruptible Power Supply (UPS)

A

A UPS is an electrical device used to provide backup power to connected equipment or devices during power outages or fluctuations in the electrical supply.

34
Q

Power Distribution Units

A

PDUs serve as a frontline defense, effectively mitigating power spikes, blackouts, and brownouts to safeguard your critical equipment and data

35
Q

Parallel processes

A

Concurrent task execution for optimized performance

36
Q

business partnership agreement (BPA)

A

A BPA is used between two companies who want to participate in a business venture to make a profit. It sets out how much each partner should contribute, their rights and responsibilities, the rules for the day-to-day running of the business, who makes the decisions, and how the profits are shared. It also establishes rules for termination of the partnership, either at a given point in time or if one of the partners dies or is otherwise unable or unwilling to continue their partnership.

37
Q

IPsec packet portions

A

An IPSec packet is formed of two different portions:
Authenticated Header (AH): This feature consists of either SHA-1 or MD5 hashing algorithms, which provide data integrity to ensure the packet has not been tampered with in transit.
Encapsulated Security Payload (ESP): ESP is the part of the IPSec packet in which the data is stored and encrypted using symmetric encryption via DES, 3DES, or AES. It comprises several key elements

38
Q

SSH

A

This is a remote access protocol that replaces Telnet, running commands far more securely than its predecessor. It is commonly used when you want remote access to network devices and can also be used as a command-line tool or in a Graphical User Interface (GUI), though it is not browser-based; in Linux, rather than use a password, SSH keys can be used to establish secure SSH key-based authentication.

39
Q

ESP header

A

ESP adds an additional header to the IP packet. The header contains information necessary for the proper processing of the packet during transmission and reception.

40
Q

Payload Data

A

This is the actual data that is being transmitted and can be any type of network traffic, such as email, web browsing, or file transfers.

41
Q

ESP security Payload

A

ESP is the part of the IPSec packet in which the data is stored and encrypted using symmetric encryption via DES, 3DES, or AES

42
Q

ESP trailer

A

ESP trailer (optional): This is an optional component that may be added to the end of the payload data for padding or integrity checks.

43
Q

VPNS

A

A VPN server resides within a company’s network, and the client employs specific software to facilitate the connection, all of which takes place over the internet, reducing costs. This VPN setup allows for stringent control over incoming sessions, ensuring that only authorized users can gain access to the network.