Domain 3: (Security Architecture and Engineering) Flashcards
What treats user identity as the control plane and assumes compromise/breach in verifying every request?
Zero Trust Security
What represents a default config reflects a restrictive and conservative enforcement of security policy?
Secure Defaults
What indicates that components should fail in a state that denies rather than grants access?
Fail Securely
What are the secure design principles?
Secure Defaults
Fail Securely
Zero Trust Security
Keep it Simple
What was created by the IAPP and represents making privacy an integral part of every system, technology, policy, and design process?
Privacy by Design
What are the seven principles of privacy by design by IAPP?
Proactive
Privacy as the default setting
Privacy must be embedded in the design
Privacy should be a positive-sum approach
End to end full lifecycle data protection
Visibility and transparency
Keep privacy user-centric
What represents a cloud provider concept in which security is provided to an org through or by an online entity?
Security-as-a-Service
What represents a class of devices connected to the internet in order to provide automation, remote control, or AI processing in a home or business setting?
Internet of Things
What represents mobile devices that offer customization options, typically through installing apps and may use on-device or in-the-cloud AI processing?
Smart Devices
What represents a system that collects data from other sources on the network, provides real-time monitoring, traffic analysis & notification of potential attacks?
SIEM
Security Information and Event Management
What represents a centralized alert and response automation with threat-specific playbooks?
SOAR
Security Orchestration Automation, & Response
What is the creation of discrete services that may be accessed by users in a black box fashion?
SOA
Service Oriented Archietchture
What are fine-grained services with a discrete function and is a modern adaption of SOA to cloud computing?
Microservices
What should be identified early in the development lifecycle?
Code-level vulnerabilities
What techniques should be incorporated early in the CI/CD process to identify deficiencies before release?
Static code analysis
Dynamic testing
What represents a lightweight, granular, and portable way to package apps for multiple platforms and doesn’t have their own operating system?
Containerization
What reduces overhead of server virtualization by enabling containerized apps to run on a shared OS kernel?
Containerization
What is a set of exposed interfaces that allow programmatic interaction between services?
APIs
What uses the HTTPS protocol for web communications to offer API end points?
REST
What must be done prior to storing, distributing, and transmitting access keys?
Encryption
What is an embedded system?
The technology component of an IOT device
A full computer system embedded inside of another larger system
What are examples of embedded systems?
Printers, GPS, drones, semi-autonomous vehicles
What must you consider when dealing with embedded devices to ensure they meet security best practices?
Authentication practices
What represents an alternative to client-server computing model for computer-intensive operations w/ large data sets?
HPC
High Performance Computing
For problems that require the use of extremely large data sets and large-scale parallel processing what type of system should you use?
High Performance Computing system
What employs a centralized controller that makes computing assignments to grid members?
Grid Computing
What do you use when you need to process data locally and far from the cloud?
Edge Computing
What is common in various internet-of-things scenarios, like agricultural, science/space, and military?
Edge Computing
What places gateway devices in the field to collect and correlate data centrally at the edge?
Fog Computing
What are some key considerations when dealing with large network-connected device counts in various locations?
Data Encryption
Spoofing Protection
Authentication
What cloud service provides the building blocks of support for networking, storage, compute, and datacenters?
IaaS
Infrastructure as a service
What cloud service is where the customer is responsible for deployment and management of apps, while the cloud service provider manages provisioning, config, hardware, and OS?
PaaS
Platform as a service
What cloud service is where the customer only configures features while the cloud service provider supports everything else?
SaaS
Software as a service
What cloud service model allows scalability, agility, pay as you go, no maintenance, and low skills?
Public cloud
What cloud service model is managed by the organization and allows for legacy support, control, and compliance?
Private cloud
What cloud service model supports public and private clouds and run apps in the right location and allows for flexibility in legacy support, compliance, and scalability scenarios?
Hybrid cloud
What is a security policy enforcement solution that may be installed on premises or in the cloud?
CASB
Cloud access security broker
What key algorithm is quantum resistant, and enables better resistance against quantum computing attacks?
Lattice
What encrypts each plaintext digit one at a time with the corresponding digit of the keystream?
Symmetric stream cipher
What method encrypts a block of data rather than one bit at a time?
Block cipher
What uses the encryption algorithm to replace each character or bit of the plaintext message with a different character?
Substitution cipher/ Caesar cipher
What uses an encryption algorithm to rearrage the letters of a plaintext message?
Transposition cipher
What is a random bit string that is XORed with the message and is normally the same length as the block size of the cipher?
Initialization vector IV
Which cipher uses a key length of one?
Caesar
Which cipher uses a longer key usually a word or sentence?
Vigenere
Which cipher uses a key that is as long as the message itself?
One-time pad
What criteria must be met for a one-time pad to be successful?
Generated randomly
Protected against physical disclosure
Used only one time
What enables someone to prove knowledge of a fact to another individual without revealing the fact itself?
Zero-knowledge proof
What describes the means that the information or privilege required to perform an operation is divided among multiple users?
Split knowledge
What is a way to measure the strength of a cryptography system by measuring the effort in terms of cost and/or time to decrypt messages?
Work function or Work factor
What relies on the use of a shared secret key, lacks support for scalability, easy key distribution, nonrepudiation, and is faster.
Symmetric Key
What uses public-private key pairs for communication between parties, support scalability, easy key distribution, nonrepudiation, and is stronger?
Asymmetric Key
What is the least secure mode that processes 64-bit blocks, and produces the same encrypted block if it encounters the same block multiple times?
ECB
Electronic Codebook Mode
What XORed each block of unencrypted text with block of the ciphertext immediately preceding and the decryption process decrypts the ciphertext and reverses the XOR operation.
CBC
Cipher Block Chaining
What is the streaming version of CBC and works on data in real time, using memory buffers of the same block size, and uses chaining so errors propagate?
CFB
Cipher Feedback
What operates similar to CFB, but XORs the plain text with a seed value. No chaining function, so errors do not propagate.
OFB
Output Feedback
What uses an incrementing counter instead of a seed and errors do not propagate?
CTR
Counter
What is a weakness in cryptography where a plain text message generates identical ciphertext messages using the same algorithm but using different keys?
Key Clustering
When you encrypt a message what asymmetric key do you use?
The recipient’s public key
When decrypting a message what asymmetric key do you use?
Your private key
When signing a message what asymmetric key do you use?
Your private key
When validating a signature, what asymmetric key do you use?
The sender’s public key
What are the five requirements for good hash functions?
Allow input of any length
Provide fixed-length output
Easy to computer the hash function for any input
Provide one-way functionality
Collision free