Pluralsight CCSP Domain 3 Flashcards

1
Q
  • Reservations
  • Limits
  • Shares
A
  • Reservations - minimum guarantee CSP gives resources to consumer
  • Limits - maximum given to consumer
  • Shares - if resources are scarce due to attack, CSP will prioritize which consumer receives resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q
  • Reservations
  • Limits
  • Shares
A
  • Reservations - minimum guarantee CSP gives resources to consumer
  • Limits - maximum given to consumer
  • Shares - if resources are scarce due to attack, CSP will prioritize which consumer receives resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two elements of computing

A
  • # of CPUs - HERTZ
  • Amount of memory - BYTES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define each step in zero trust

A

step 1 of zero trust is defining protect surface
* data
* applications
* assets
* services

step 2 of zero trust is mapping transaction flows - determine the critical path of DAAS

step 3 of zero trust is architect zero trust network
* reference architecture (recommended structures)
* granular layer 7 protect surface (application layer)
* application user and content ID management

step 4 - zero trust policy
* defining who, what when, where, why, and how (who is accessing, what is accessed, when is it, where is it access, etc)

step 5 - monitor and maintain
* analyze and evaluate logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI Model

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logical design precedes…

A

physical design to avoid functionless lock-in of physical state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Portability vs interoperability

A

portability is moving from CSP to CSP and interoperability is transferring data from CSP to CSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO 22237 - four classes of protection

A

about data center infrastructure

class 1 - general office space
class 2 - personnel entry docking bay storage
class 3 - telecom electrical mechanical testing
class 4 - control room datacenter main distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • ASHRAE Standards
  • Two types of Cooling
A
  • 18-27 C / 68 - 77 F
  • 5-15 C DP / 40-60% (DewPoint/Humidity)
  1. Latent Cooling - removes moistures
  2. Sensible Cooling - removes heat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hot Aisle Containment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cold Aisle Containment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO 12237 - Availability Classes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data center Site Infrastructure Tier Standard

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tier 1 - Data Center Infrastructure Tier Standard

A

Class 1 - single path, no resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tier 2 - Data Center Infrastructure Tier Standard

A

Class 2 - single path, resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tier 3 - Data Center Infrastructure Tier Standard

A

Class 3 - multi path, redundancy

16
Q

Tier 4 - Data Center Infrastructure Tier Standard

A

Class 4 - multi path, fault tolerant

17
Q

Define BIA and the 3 important metrics

A

MTD - timer
RTO - goal / stopwatch

18
Q

On-premises, cloud as BCDR

A
  • Primary site is data center
  • Back up to cloud
  • If primary site is down, recovery from cloud to alternate data center
19
Q

Cloud consumer, Primary Provider BCDR

A
  • Primarily consuming from CSP
  • Replicated Availability Zones within one cloud so if one zone goes out, you can use the other zone to work; load balancing will elminate the user knowing there was an outage
20
Q

Cloud Consumer, alternate provider BCDR

A

If customer loses service in primary cloud, can go to alternate cloud.

21
Q

Two Primary BCDR Activities

A
  1. Recovery - bringing alternate site systems up
    * Prevention, Detection, Response, Recovery, Improvement
  2. Restoration - bringing primary site systems up
    * Original Location, new normal, reverse order (fix least to most critical to ensure no conflict with recovery location), in concert with recovery, contain costs/risks
22
Q

BCDR Steps

A
  1. Requirements Gathering and Context
    * Identify Critical Business Functions
    * Identify Threats
  2. Plan Risk Assessment
  3. Plan Design, Creation, and Implementation
  4. DR Plan Tests
23
Q

Types of DR Plan Tests

A
  1. Desktop Review - walkthrough
  2. Recovery Simulation - component failure recovery; or service recovery in non-production environment
  3. Operational test - FULL TEST; simulates most realistic; use ALT site
  4. CHAOS Engineering - the ultimate test;
24
Q

CHAOS Engineering Test

A
  1. Chaos Monkey - impose VM failure; Clusters are good
  2. Chaos Gorilla - impose availability zone failure; shutting down data center;
  3. Chaos Kong - similuated region failure;
25
Q

Verification vs Validation

A

Verification - ensure the application works
Validation - ensure this application solves business requirement

26
Q

Type of Secutiy Application Tests

A
27
Q

ISO 15408 - Common Criteria

A
  • Tests security in system components
  • tests functionalty in relation to rigor of the test
  • 11 Security Functional Requirements
  • 1-7 Evaluation Assurance Levels
28
Q

Vuln Assessment vs pen test

A

vuln assess looks for weaknesses while pen test exploits that weakness

29
Q

Proprietary Software

A
  • Difficult to do in-depth testing
  • can do black box DAST
  • cannot check code; no white box SAST
  • ensure signed patches and patchign is done
  • source code in escrow
30
Q

ISO 27034

A
  • Standard for Application Security
  • ONF - Organizational Normative Framework - library of security controls
  • ANF - Application Normative Framework - subset of ONF - library of securtiy controls for application
    *
31
Q

Content Distribution Networks

A

connecting users to local servers rather then transmitting all data all over the world

32
Q

Sandboxing

A