Security+ 3.0 Architecture and Design Flashcards
Ad Hoc
Ad Hoc - zone is created when two or more wireless devices connect to one another creating an on-demand network.
Intranet
Intranet- is a private company zone established to allow employees the ability to share content and communicate more effectively.
extranet
extranet is a zone created to allow authorized users access to company assets, separate from the intranet.
VLAN
Virtual Local Area Network (VLAN) is a logical group of network devices on the same LAN, despite their geographical distribution. It can divide the devices logically on the data link layer, and group users according to departments.
Aggregation switches
Aggregation switches – a network device that combines multiple ports into a single link in order to enhance redundancy and increase bandwidth
can connect multiple subnets to reduce the number of active ports. When aggregating subnets, the subnets are connected to the switch versus the router.
Air gap
Air gap -a type of network isolation that physically separates a network from all other networks.
Application Containers
Application Containers - a virtualization method where applications run in isolated containers on the host operating system instead of in separate VMS
Containers
Containers use the kernel as a host but do not host an operating system. A container isolates and protects applications from other parts of the system. They require fewer resources than a Type II hypervisor
Deprovisioning
Deprovisioning- is the act of removing or disabling access to a resource. Since the application has been replaced, the application should be deprovisioned to preserve resources.
Provisioning
Provisioning is the process of procuring, configuring and making available an application or system on certain services. Provisioning an application allows it to run on its intended platform. Since the new version has already been released in this scenario, this step has already taken place.
DMZ-
DMZ- a small section of a private network that tis located behind one firewall or between 2 firewalls and made available for public use.
is between the two firewalls providing a layer of protection for the internet facing servers. It is an area of a network that is designed for public and company use. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN.
DNS
DNS- - Domain Name System- the service that maps names of IP addresses on most TCP/IP networks, including the internet.
Elasticity-
Elasticity- the property by which a computing environment can instantly react to both increasing and decreasing demands in a workload.
EMI
EMI- electromagnetic interference- a disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit.
EMP
EMP- electromagnetic pulse- a short burst of electrical interference caused by an abrupt and rapid acceleration of charged particles, which can short circuit and damage electronic components
are radio frequencies emitted by external sources, such as power lines and lights that disturb data signals.
Extranet
Extranet- a private network that provides some access to outside parties, particularly vendors, partners and select customers.
Fault Tolerance
Fault Tolerance- the ability of a computing environment to withstand a foreseeable component failure and continue to provide an acceptable level of service.
Distributive allocation
Distributive allocation provides that multiple nodes are configured to work together on complex problems. A central processor divides the task into smaller pieces and coordinates tasking the nodes.
SED
A self-encrypting drive (SED) includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. SED requires credentials to be entered for decryption.
FDE
FED-Full disk encryption- a storage technology that encrypts an entire storage drive at the hardware level.
Full device encryption (FDE) provides encryption for a whole disk and protects the confidentiality of the data.
Firewalls
Firewalls- a software or hardware device that protects a system or network by blocking unwanted network traffic.
Firewalls allow the network administrator to divide the network into different network segments known as zones. A firewall filters traffic. It can be used for a single host or between networks. It regulates both inbound and outbound traffic, providing a layer of security inbound and out.
Wireless
The wireless topology is used to extend a wired local area network through the use of an antenna.
Guest Network
Guest Network- a wireless network used to provide non-employees or guests with internet access. This access is limited to certain functions, such as internet surfing and email.
Hardware root of Trust
Hardware root of trust- is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.