Domain 4 Flashcards
What connects all devices behind the firewall in a small business network?
Switch
Which of the following tools can be used to both identify and prevent threats?
Anti-malware/antivirus
Intrusion Protection System (IPS)
Firewalls
What is the function of transfer switches or transformers in a redundant power system?
Enable seamless transition between power sources
In a scenario requiring full redundancy, what should devices have in terms of power supplies?
Two power supplies connected to diverse sources
What term describes a portion of the organization’s network that interfaces directly with the outside world and typically has more security controls and restrictions compared to the rest of the internal IT environment?
Demilitarized Zones (DMZ) are a portion of the network which interfaces directly with the outside world and has more security controls and restrictions than its wider IT environment.
What is a potential alternative to expensive dedicated point-to-point connections?
Gateway-to-gateway VPNs
What is network monitoring or sniffing?
Monitoring traffic patterns to obtain information about a network
What is the purpose of the three-way handshake in networking?
Synchronizing and acknowledging requests
What is resource pooling in the context of cloud computing?
Sharing physical servers with other organizations
What is a cloud arrangement in which the provider owns and manages the hardware, operating system, and applications in the cloud, while the customer retains ownership of the data?
SaaS
What is one of the services offered by many MSPs, where they monitor firewalls and other security tools to provide expertise in triaging events?
Managed Detection and Response (MDR) Service
Which cloud computing model allows an enterprise to scale up new software or data-based services/solutions quickly without massive hardware installation?
The NIST definition of cloud computing enjoys widespread global adoption. It outlines a model designed to facilitate pervasive, user-friendly access to a dynamically scalable pool of configurable computing resources, including networks, servers, storage, applications, and services.
These resources can be swiftly provisioned and released with minimal involvement from service providers, representing a significant advancement in ease of management and user interaction, as outlined in NIST Special Publication 800-145.
What is the main purpose of an SLA?
To document specific parameters and minimum service levels
Application programming interface (API)
A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.
Cloud computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST 800-145
Community cloud
A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premises. NIST 800-145
De-encapsulation
The opposite process of encapsulation, in which bundles of data are unpacked or revealed.
Why is an abnormal system shutdown in a data center a concern?
It may result in the loss or corruption of data
Which of the following tools can be used to grant remote users access to the internal IT environment?
VPN (virtual private network)
What might a user typically need to acknowledge before being allowed to access the internet in a hotel network?
Acceptable use policy
What distinguishes Memoranda of Understanding (MOU) or Memoranda of Agreement (MOA) from Service Level Agreements (SLA)?
MOUs/MOAs are more directly related to what can be done with a system or information, while SLAs specify more intricate aspects of services
How are VLANs used in Network Access Control (NAC) systems?
VLANs control whether devices connect to the corporate network or a guest network