Security Architecture Flashcards

1
Q

Identity and Access Management (IAM)

A

Frameworks and processes to control and manage user identities and access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Endpoint Detection and Response (EDR)

A

A solution to monitor and respond to threats on endpoint devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network Access Control (NAC)

A

A solution to enforce security policies on devices trying to access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Access Security Broker (CASB)

A

A tool for monitoring and enforcing security policies for cloud-based applications and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shared Responsibility Model

A

A framework where cloud providers and customers share security responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Container Security

A

Protecting containerized applications and their environments from vulnerabilities and threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identity Federation

A

Linking a user’s identity across multiple systems, often used in cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Serverless Security

A

Securing applications that run on serverless computing platforms by addressing unique risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Incident and Event Management (SIEM)

A

A tool for aggregating and analyzing security event data in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blockchain Security

A

Protecting data integrity and transactions within a blockchain network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.1X

A

A network access control protocol used for port-based authentication on wired and wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS Security Extensions (DNSSEC)

A

A protocol to secure DNS by adding digital signatures to DNS records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy Servers

A

Devices that act as intermediaries for requests between clients and servers to enhance security and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Perfect Forward Secrecy (PFS)

A

A feature ensuring that a session key cannot be compromised even if the private key is exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cipher Suite

A

A set of cryptographic algorithms used to secure network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HMAC (Hash-based Message Authentication Code)

A

A cryptographic algorithm for verifying data integrity and authenticity

17
Q

Ephemeral Keys

A

Temporary encryption keys used for a single session to enhance security

18
Q

Threat Avoidance

A

Anticipating and addressing potential security issues during the design phase of a system

19
Q

Software Defined Perimeter (SDP)

A

A security approach that creates dynamic and user-specific perimeters for network access

20
Q

Federated Identity

A

A single identity across multiple systems or organizations, allowing seamless access

21
Q

Trusted Platform Module (TPM)

A

Provides hardware-based cryptographic functions for secure key storage and system integrity

22
Q

Secure Enclave

A

A trusted execution environment for isolating sensitive processes and data

23
Q

Software-Defined Networking (SDN)

A

Centralized control of network traffic allows for dynamic security policies.

24
Q

Privileged Access Management (PAM)

A

Securely manages and audits privileged user accounts

25
Q
A