Section 3: Security Architecture Flashcards
Describes the structure, components, connections, and layout of security controls within an organization’s IT infrastructure
Security architecture
The practice of layering defenses to provide added protection
Defense in depth
A well-defined boundary between the organization and the outside world
Perimeter
Security model that emphasizes placing controls at the network and system levels to protect the information stored within
Network- or system-centric
Security model that emphasizes the protection of data regardless of its location
Data-centric
Perimeter that ensures secure access to the Internet for enterprise employees and guest users residing at all locations, including those included in telecommuting or remote work
Internet perimeter
True or false: VPN traffic is first filtered at the ingress point to the specific IP addresses and protocols that are part of the VPN service.
False: VPN traffic is first filtered at the egress point to the specific IP addresses and protocols that are part of the VPN service.
True or false: Modern IT architectures are usually decentralized and deperimeterized.
True
True or false: In distributed and decentralized architectures, the inherent risk is likely to increase, often as a function of moving critical applications, platforms, and infrastructure elements into the cloud.
False: In distributed and decentralized architectures, the THIRD-PARTY RISK is likely to increase, often as a function of moving critical applications, platforms, and infrastructure elements into the cloud.
Security architecture approach that develops a matrix showing columns that represent aspects of the enterprise that can be described or modeled and rows representing various viewpoints from which those aspects can be considered
Sherwood Applied Business Security Architecture (SABSA) Matrix
Security architecture approach that addresses security as an essential component of the overall enterprise design
The Open Group Architecture Framework (TOGAF)
Arrange the following layers of the OSI model from the bottom to the top layer:
\_\_ Data Link \_\_ Application \_\_ Session \_\_ Physical \_\_ Network \_\_ Presentation \_\_ Transport
Layer 1. Physical Layer 2. Data Link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer 7. Application
Please Do Not Tell Secret Password 2 All
All People Seem To Need Data Protection
OSI layer that manages signals among network systems
Physical Layer
OSI layer that divides data into frames that can be transmitted by the physical layer
Data Link Layer
OSI layer that translates network addresses and routes data from sender to receiver
Network Layer
OSI layer that ensures data are transferred reliably in the correct sequence
Transport Layer
OSI layer that coordinates and manages user connections
Session Layer
OSI layer that formats, encrypts, and compresses data
Presentation Layer
OSI layer that mediates between software applications and other layers of network services
Application Layer
Which of the following protocols reside at the application layer of the OSI model? Select all that apply.
a. HTTP
b. FTP
c. SMTP
d. NetBIOS
e. ARP
a. HTTP
b. FTP
c. SMTP
In the OSI model, physical addressing takes place in:
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
b. Layer 2 - Data Link Layer
Which of the following reside at the Physical layer of the OSI model? Select all that apply.
a. Router
b. Hub
c. Switch
d. Network cabling
e. Bridge
b. Hub
d. Network cabling
In the OSI model, data compression takes place in:
a. Layer 1
b. Layer 4
c. Layer 6
d. Layer 5
c. Layer 6 - Presentation Layer
Which OSI layer assumes responsibility for managing network connections between applications?
a. Layer 1
b. Layer 4
c. Layer 6
d. Layer 5
d. Layer 5 - Session Layer