Lesson 7: Explain Resiliency and Site Security Concepts Flashcards

1
Q

What are common asset inventory methods?

A

Manual inventory.

Network scanning tools (e.g., Nmap).

Asset management software (e.g., Lansweeper).

Mobile Device Management (MDM) solutions.

Cloud Asset Discovery tools (e.g., AWS Config).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Asset Protection Concepts?

A

Standard naming conventions aid tracking and management.

Configuration Management Baselines define required settings.

Techniques such as RFID tags help with physical tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of data backups?

A

Regular backups safeguard data integrity and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are key features of enterprise backups?

A

Support for physical, virtual, and cloud environments.

Data deduplication to optimize storage.

Granular restore and ransomware protection.

Validation testing to ensure recovery reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is replication and journaling used for?

A

Replication: Creates consistent data copies across locations.

Journaling: Logs data changes for precise rollback and recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are snapshots, and how are they used?

A

VM Snapshots: Restore virtual machine states.

Filesystem Snapshots: Revert file systems.

SAN Snapshots: Protect large datasets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is backup encryption and secure data destruction achieved?

A

Encryption ensures backup confidentiality.

Secure sanitization techniques include overwriting and degaussing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of COOP (Continuity of Operations)?

A

Focuses on maintaining critical business functions during a crisis.

Tied to broader Business Continuity (BC) plans that address overall organizational resilience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What methods are used in capacity planning, and what does this address?

A

Trend analysis, simulation modeling, and benchmarking.

Addresses both underutilization (cost inefficiency) and overutilization (performance risks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What risks are associated with underutilization and overutilization in capacity planning?

A

Underutilization leads to cost inefficiency.

Overutilization causes performance risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does High Availability (HA) do, and how is it measured?

A

Ensures uptime with fault-tolerant hardware and clustered systems.

Measured as availability percentages (“nines”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between scale-up and scale-out in scalability?

A

Scale-up: Add resources to existing infrastructure.

Scale-out: Add parallel resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What resiliency testing methods are used, and what is the purpose?

A

Tabletop exercises, failover tests, simulations, and parallel processing.

Strengthens incident response effectiveness and highlights vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do clustering and virtual IPs differ between Active/Passive and Active/Active setups?

A

Active/Passive (A/P): Standby node remains idle until needed.

Active/Active (A/A): All nodes work simultaneously, sharing workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What principles guide physical security controls?

A

Authentication, Authorization, and Accounting (AAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does site layout and design enhance physical security?

A

By using fencing, lighting, and bollards to deter unauthorized entry, and channeling movement with secure entry/exit points.

17
Q

What types of locks are commonly used for physical security?

A

Physical, electronic (PIN/keyless), and biometric locks.

18
Q

What is an access control vestibule (mantrap)?

A

A physical security control that allows entry to one individual at a time.

19
Q

What are the functions of access badges?

A

Serve as identification, access keys, and log events for auditing.

20
Q

How do surveillance systems enhance physical security?

A

Human Guards: Visible deterrence with clearance and screening.

Cameras: Smart systems use AI for motion recognition and object detection.

Drones: Provide wide-area surveillance.

21
Q

What types of alarms and sensors are used for physical security?

A

Circuit-based alarms.

Motion detection alarms.

Noise detection alarms.

Duress alarms.

Sensors like infrared, pressure, microwave, and ultrasonic.