Domain 3 virtualization&architecture Flashcards
s2.20 What is DCE? Verus what is this system? Why use DCEs?
Distributed computing environment. Not a centeralized system. It gives us horizaotnal scaling. modualr grwoth ,fault tolerance, coste effectiveness, low laency.
s2.20 Grid vs HPC system. Edge vs CDN?
Grid is different. it uses what ever resoruce is available. Edge is closest to where it is needed. Not all edge is cdn. all cdns are edge.
s2.22 What is emanation? What is steganography? what is cover timing channel?
2ndary information given. Unintentional signals. Steg: it is midden message within another media. Covert timing is manipulating the timing of events to covertly transmit information.
s2.23 exam tip on malware
You will not a get definition of a malware. it will ask how to protect by words like embedded, alter signature.
s2.24 What are rootkits?
Malware. Replace some of the OS/Kernel with a malicious payload. User rootkits work on ring 3 and kernel rootkits on ring 0
s2.24 What are packers?
programs to compress *.exe files, which can be used to hid malware in a executable neutral technology. Trojan file. Changes the hash
s2.24 what can help with server side atacks? Can firewalls help with client side attacks?
defense in depth can mitigate some of these. Firewalls do not help. they only monitor inbound traffic.
s2.25 8min great exam tip
s2.26 What is polyinstantiation? What is aggregation?
alternative facts. two or more instance of the same file depending on who accesses it. Aggregation is collection of data for the purpose of statistical analysis.
s2.28 What is SCADA Supervisory Conrol and Data Acquistion?
Control system architecture that uses comptuers, networked data communications and GUI for high level process supervisory management. It uses the DNP3 Distributed Network Protocal .
s2.29 What is difference between Cryptology and crypotgraphy? What is cipher?
Crptology is the science of securing communication. Crypotography is the study of creing messages where the meaning is hidden. Cipher is a cyptographi algorithm.
s2.31 What is spartan scytale?
Message written lengthwise on a long thin pieceof parchment wrapped in a stick. By itself it is no sense but if rewrapped around a stick of hte same diameter it would be decipherable.
s2.31 What is caesar cipher?
done by switching letters by a certain number of spots in the alphabet.
s2.31Vigenere cipher?
16th century. alphabet is repeated 26 times to form a matrix.
s2.31 What is cipher disk?
2 concertric disk with alphabets on them.