Security+ 3.0 Architecture and Design Flashcards

1
Q

Ad Hoc

A

Ad Hoc - zone is created when two or more wireless devices connect to one another creating an on-demand network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intranet

A

Intranet- is a private company zone established to allow employees the ability to share content and communicate more effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

extranet

A

extranet is a zone created to allow authorized users access to company assets, separate from the intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VLAN

A

Virtual Local Area Network (VLAN) is a logical group of network devices on the same LAN, despite their geographical distribution. It can divide the devices logically on the data link layer, and group users according to departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Aggregation switches

A

Aggregation switches – a network device that combines multiple ports into a single link in order to enhance redundancy and increase bandwidth

can connect multiple subnets to reduce the number of active ports. When aggregating subnets, the subnets are connected to the switch versus the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Air gap

A

Air gap -a type of network isolation that physically separates a network from all other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Containers

A

Application Containers - a virtualization method where applications run in isolated containers on the host operating system instead of in separate VMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Containers

A

Containers use the kernel as a host but do not host an operating system. A container isolates and protects applications from other parts of the system. They require fewer resources than a Type II hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deprovisioning

A

Deprovisioning- is the act of removing or disabling access to a resource. Since the application has been replaced, the application should be deprovisioned to preserve resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provisioning

A

Provisioning is the process of procuring, configuring and making available an application or system on certain services. Provisioning an application allows it to run on its intended platform. Since the new version has already been released in this scenario, this step has already taken place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DMZ-

A

DMZ- a small section of a private network that tis located behind one firewall or between 2 firewalls and made available for public use.

is between the two firewalls providing a layer of protection for the internet facing servers. It is an area of a network that is designed for public and company use. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS

A

DNS- - Domain Name System- the service that maps names of IP addresses on most TCP/IP networks, including the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Elasticity-

A

Elasticity- the property by which a computing environment can instantly react to both increasing and decreasing demands in a workload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EMI

A

EMI- electromagnetic interference- a disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EMP

A

EMP- electromagnetic pulse- a short burst of electrical interference caused by an abrupt and rapid acceleration of charged particles, which can short circuit and damage electronic components

are radio frequencies emitted by external sources, such as power lines and lights that disturb data signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Extranet

A

Extranet- a private network that provides some access to outside parties, particularly vendors, partners and select customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fault Tolerance

A

Fault Tolerance- the ability of a computing environment to withstand a foreseeable component failure and continue to provide an acceptable level of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Distributive allocation

A

Distributive allocation provides that multiple nodes are configured to work together on complex problems. A central processor divides the task into smaller pieces and coordinates tasking the nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SED

A

A self-encrypting drive (SED) includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. SED requires credentials to be entered for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FDE

A

FED-Full disk encryption- a storage technology that encrypts an entire storage drive at the hardware level.

Full device encryption (FDE) provides encryption for a whole disk and protects the confidentiality of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Firewalls

A

Firewalls- a software or hardware device that protects a system or network by blocking unwanted network traffic.

Firewalls allow the network administrator to divide the network into different network segments known as zones. A firewall filters traffic. It can be used for a single host or between networks. It regulates both inbound and outbound traffic, providing a layer of security inbound and out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Wireless

A

The wireless topology is used to extend a wired local area network through the use of an antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Guest Network

A

Guest Network- a wireless network used to provide non-employees or guests with internet access. This access is limited to certain functions, such as internet surfing and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hardware root of Trust

A

Hardware root of trust- is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Root of trust
Root of Trust- technology that enforces hardware platforms trusted computing architecture through encryption mechanisms designed to keep data confidential and to prevent tampering
26
High availability
High availability – the property that defines how closely systems approach the goal of providing data availability 100 percent of the time while maintaining a high level of system performance. High availability refers to a service that needs to remain operational with minimum downtime. A group of servers are referred to as a node. If one node fails, another can take over to reduce or eliminate downtime. Failover cluster High availability refers to a service that needs to remain operational with minimum downtime. A group of servers are referred to as a node. If one node fails, another can take over to reduce or eliminate downtime.
27
Distributive allocation
Distributive allocation provides that multiple nodes are configured to work together on complex problems. A central processor divides the task into smaller pieces and coordinates tasking the nodes.
28
Honeynet
Honeynet- an entire dummy network used to lure attackers.
29
HSM
HSM- hardware security module- a physical device that provides root of trust capabilities A Hardware Security Module (HSM) is a device used to generate, maintain and store cryptographic keys. It is an external device and can easily be added to a system as needed.
30
IAAS
IAAS- Infrastructure as a service- a computing method that uses the cloud to provide any or all infrastructure needs. provides companies the ability to “rent” hardware and services in a cloud environment. The service provider owns, maintains and manages the equipment while the company pays per use.
31
Immutable systems
Immutable systems – a system that is not upgraded in place, but is programmatically destroyed and then recreated from scratch every time the configuration changes.
32
Infrastructure as code
Infrastructure as code – an information technology strategy that asserts that the organizations infrastructure can be quickly configured and deployed as desired through programming scripts and other code files rather than through standard software tools.
33
Integrity-
Integrity- the fundamental security goal of keeping organizational information accurate, free of errors and without unauthorized modifications
34
Intranet
Intranet- a private network that is only accessible by the organizations own personnel
35
Load balancers-
Load balancers-a network device that distributes the network traffic or computing workload among multiple devices in a network. Load balancers can equalize the traffic load between servers, eliminating unscheduled downtimes. Load balancing uses multiple servers to support a single service. Load balancing can ensure system availability.
36
Mantrap-
Mantrap- a physical security control system that has a door at each end of a secure chamber.
37
NAT
NAT- Network address translation- a simple form of internet security that conceals internal addressing schemes from public internet by translating between a single public address on the external side of a router and private non-routable addresses internally.
38
Static NAT
Static NAT uses a one-to-one approach for disguising IP’s. NAT on the internet facing firewall protects private computers from outside threats.
39
Dynamic NAT
Dynamic NAT- uses multiple IP addresses to map one private IP to many public IP’s. It chooses which IP to use based on the load presented.
40
Non-persistence
Non-persistence- the property by which a computing environment is discarded once it has finished its assigned task.
41
PAAS
PAAS Platform as a service- a computing method that uses the cloud to provide any platform type services. provides preconfigured services for developing and managing environments. This service provides on-demand computing.
42
Port Mirror
Port mirror - used to monitor network traffic. It forwards a copy of each packet from one switch port to another.
43
Provisioning
Provisioning- Provisioning is the process of procuring, configuring and making available an application or system on certain services. Provisioning an application allows it to run on its intended platform. Since the new version has already been released in this scenario, this step has already taken place.
44
Proxy
Proxy – a device that acts on behalf of one end of a network connection when communicating with the other end of the connection. A proxy server mediates the communications between a client and another server. It can filter communications and provide caching services to improve performance. A proxy server can be a caching intermediary to improve the network performance for users visiting the same websites. This is more applicable for internal use so employees may improve their Internet speeds.
45
RAID-
RAID- Redundant array of independent disks- a set of vendor-independent specifications that support redundancy and fault tolerance for configurations on multiple-device storage systems.
46
RAID-0
RAID-0 offers striping only where data is split across the drives. It does not provide redundancy. RAID-0 has the worst data protection of all of the RAID concepts.
47
RAID-10
RAID-10 combines mirroring and striping in a single system. It provides better write performance than any other RAID level providing data protection.
48
Redundancy
Redundancy – the property by which a computing environment keeps one or more sets of additional resources in addition to the primary sets of resources.
49
RTOS
RTOS- real time operating system- a specialized operating system that uses more consistent processor scheduler than a standard system.
50
SAAS
SAAS- software as a service- a computing method that uses the cloud to provide application services to users. is a full-service product and is pay as you go. It is accessed directly over the internet.
51
Sandboxing
Sandboxing- The sandbox is an isolated environment that is often used for testing. Security, patches, and critical updates can be tested in a sandbox without touching the system before implementation.
52
staging environment
staging environment mimics that of production and allows for an environment to practice deployment. In the event deployment fails in this environment, it can roll back to the test and development environments.
53
production environment
production environment is the final stage of the deployment effort. Testing in this environment would be too late, given it is the operational environment.
54
development environment
development environment is a place for creation. Requirements are turned into reality in this environment. It is not a complete copy of production, but just the beginning of an application.
55
SCADA
SCADA- supervisory control and data acquisitions- a type of industrial control system that monitors and controls industrial processes such as manufacturing and fabrication, infrastructure processes such as power transmission and distribution and facility processes such as energy consumption and HVAC.
56
Scalability
Scalability- the property by which a computing environment is able to gracefully fulfill its ever-increasing resource needs.
57
Attestation
Attestation is the process of checking and validating system files during a boot process.
58
Secure boot
Secure boot- A UIEFI feature that prevents unwanted processes from executing during the boot operation a process that validates system files during the startup process to ensure they have not been modified.
59
Proper input validation
Proper input validation-limiting what a user can input into specific fields
60
Normalization
Normalization- a software development technique that tries to repair invalid input to strip any special encoding and automatically convert the input to a specific format that the application can handle Normalization is used to optimize database performance by removing duplicates, use of primary keys, and related data contained in separate tables. A database is normalized when it meets the first three forms.
61
Stored procedures
Stored procedures – set of pre-compiled database statements that can be used to validate input to a database. Limits kind and format of statements that the user can successfully submit. Stored procedures can deny a user access to the underlying data and force them to work within the procedure itself.
62
Code signing
Code signing – a form of digital signature that guarantees source code and application binaries are authentic and have not been tampered with. Helps users verify the legitimacy of app.
63
Encryption
Encryption – vital in apps that store and transmit sensitive data.
64
Obfuscation
Obfuscation- technique that essentially hides or camouflages code so that it is harder to read by unauthorized users. Attempts to mitigate reverse engineering of software.
65
Compiling code
Compiling code occurs when a compiler is necessary to make the files executable. The compiler checks the code for errors, and if an error is found, it will not allow the code to execute.
66
Runtime
Runtime is when the application is actually running in its normal state. The code has already been executed and errors can be checked.
67
Server side execution and validation
Server side execution and validation- occur on the web server or back-end, and take more time to complete. It ensures the application does not receive invalid data. Server side validation is more secure than client side validation. Server-side validations occur on the web server or back-end and take more time to complete. Validation on the server side is more secure than client-side validation.
68
Client-side execution and validation
Client-side execution and validation- Client-side input validation verifies data is valid upon entry to the system. Proper input validation uses a set of rules to validate entries in fields for proper use. In the event an entry is invalid, the application will reject the entry. Client-side input validation verifies data is valid upon entry to the system. Proper input validation uses a set of rules to validate entries in fields for proper use. In the event an entry is invalid, the application will reject the entry.
69
Memory management-
Memory management- must be aware if the language you’re coding in manages memory automatically or if it needs to be considered in the code.
70
Fuzzing
Fuzzing is a dynamic analysis technique that checks code as it is running. When using fuzzing, the system is attacked with random data to check for code vulnerabilities.
71
static code analyzer
static code analyzer examines code quality and effectiveness without executing the code. An analyzer can be used in conjunction with development for continued code quality checks, or once the code is in its finalization stages.
72
Continuous integration
Continuous integration allows for the merging of code changes into a central repository. The code is built and tested each time it is checked into the environment, providing a more efficient method to code production. Continuous Integration in a Secure DevOps project allows for the merging of code changes into a central repository. The code is built and tested each time it is checked into the environment providing a more efficient method to code production.
73
immutable system
immutable system is the ability to create a secure image and test it in a controlled DevOps environment.
74
Automating security testing
Automating security testing in a DevOps environment ensures defects are not introduced in systems. As new code is introduced to an application, security testing is important to check for bugs and vulnerabilities.
75
SECaaS
Security as a service -SECaaS- a computing method that enables clients to take advantage of information, software, infrastructure, and processes provided by a cloud vendor in the specific area of computer security.
76
CASB
A Cloud Access Security Broker (CASB) is a part of security as a service that monitors network traffic between a company’s network and cloud provider, enforcing security policies.
77
Security automation-
Security automation- the ability to easily configure, generate and deploy baselines for computer systems in the organization.
78
Snapshots-
Snapshots- the state of a virtual machine at a specific point in time
79
SSL accelerators
SSL accelerators - A Secure Socket Layer (SSL) Accelerator is designed to offload tasks from servers allowing network load to be distributed. It can provide a seamless service to consumers of network applications while balancing out session requests.
80
SSL decryptor
SSL decryptor provides protection from malicious threats over secure connections and would be placed in the DMZ.
81
SSL/TLS accelerator
SSL/TLS accelerator- a hardware interface that helps offload the resource intensive encryption calculations in SSL/TLS to reduce overhead for a server.
82
Software Defined Network (SDN)
Software Defined Network (SDN) separates data and control planes in a network. It uses virtualization to route traffic to its intended destination, instead of using proprietary hardware.
83
Network Taps
Network Taps – creates a copy of network traffic to forward to a sensor or monitor like an IDS. Often enabled through port mirroring functionality on switches. If you want to monitor any potentially malicious traffic from external sources, place taps outside or alongside the perimeter firewall. Very noisy however. To monitor malicious traffic that may have already made its way into the private network, placed taps alongside switches that provide end-user
84
TPM
TPM- trusted platform module- a specification that includes the use of crypto processors to create a secure computing environment A TPM keeps hard drives locked until proper authentication occurs. is a hardware-based encryption solution that is embedded in the system and provides secure key storage for full disk encryption. TPM supports secure boot processes.
85
TOS
Trusted OS-TOS- The operating system component of the TCB (Trusted computing base) that protects the resources from applications
86
TCB
TCB- the hardware, firmware and software components of a computer system that implement the security policy of a system
87
Tunneling
Tunneling- a data transport technique in which a data packet is encrypted and encapsulated in another data another order to conceal the information of the packet inside.
88
Type 1 hypervisor
Type 1 hypervisor - run directly on the hosts hardware when managing the guest virtual environments. virtualization solutions that run directly on system hardware. They do not require operating system involvement in order to run.
89
Type 2 hypervisor
Type 2 hypervisor – run as an application on top of the host machines OS. Adds another level between the hypervisor and hardware. Typically, slower than type 1 and add an extra layer of complexity to VM are virtualization solutions that run as software and do require a host operating system. Typically slower than type 1 and add an extra layer of complexity to VM
90
BIOS
BIOS- Basic input/ output systems- a firmware interface that initialized hardware for an operating system boot. is a combination of hardware and software used to adjust settings in a computer
91
UEFI
UEFI—Unified extensible firmware interface- a firmware interface that initializes hardware for an operating system boot. is a specification for a software program that connects a computer's firmware to its operating system. UEFI is the replacement for BIOS (Basic Input/output System) and has many advancements to include provisions for secure booting.
92
Virtualization
Virtualization- the process of creating a simulation of a computing environment, where the virtualized system can simulate the hardware, operating system, and applications of a typical computer without being a separate physical computer.
93
VPN-
VPN- virtual private network- a method of extending a private network by tunneling through a public network, such as the internet.
94
Site-to-site VPN
Site-to-site- connects 2 private networks together. A site to site Virtual Private Network (VPN) connects multiple networks versus one. Remote users can access both locations as if they were onsite without noticing the location separation.
95
Split tunnel
Split tunnel is means of encrypting connection on demand for VPN’s. It will only encrypt outbound traffic to private IP addresses.
96
Always on VPNs
Always on VPNs allow for a continued connection between the geographically separated servers and the employee.
97
VPN Concentrators
VPN Concentrators – a single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels
98
VDI
VDI-Virtual desktop infrastructure- uses virtualization to separate the personal computing environment from the users’ physical machine. A desktop OS and applications are run inside the VM that are hosted on servers in the virtualization infrastructure.
99
VDE
VDE- virtual desktop environment- a VM that runs a desktop OS
100
CASB
A Cloud Access Security Broker (CASB) is a part of security as a service that monitors network traffic between a company’s network and cloud provider, enforcing security policies.