Security Architecture and Engineering Flashcards

1
Q

Conceptual model that ensures no matter what activity is taking place within a system, it is always trustworthy

A

State Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security model that addresses the interaction between subjects and objects

A

Relationship Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ability of a system to automatically accommodate larger loads by adding resources

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ability to fit the resources needed to cope with loads dynamically

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scalability by Making hardware stronger

A

scaling up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scalability by Adding additional nodes

A

scaling out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deployment of data-handling activities and operations at or close to the source without having to go through centralized network segments

A

Edge computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ability to process data and perform complex calculations at high speeds

A

High Performance Computing (HPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Devices equipped with features for capturing data and processing

A

Smart edge devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is of the following is not an industrial control system?
1. Distributed control systems
2. Program logic controllers
3. Supervisory control and data acquisition
4. Distributed network protocol 3

A
  1. Distributed network protocol 3
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of analyzing data with tools that look for trends and correlations:
1. Data warehousing
2. Data mining
3. Aggregation
4. Inference

A
  1. Data mining
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Community cloud

A

Cloud provisioned for well-defined group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Public cloud

A

Cloud provisioned for public use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Private cloud

A

Cloud provisioned for single organization exclusive use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Term that describes the use of IT solutions that are managed outside of and without the knowledge of the IT department:
1. SecaaS
2. CASB
3. Outsourcing
4. Shadow IT

A
  1. Shadow IT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which component is not considered to be part of a closed loop embedded system?
1. RTOS
2. Device specific application
3. SoC
4. Wi-Fi controller

A
  1. Wi-Fi controller
17
Q

VM terms: dividing systems resources

A

Portioning

18
Q

VM terms: Fault and security boundaries

A

Isolation

19
Q

VM terms: Fail-over capability

A

High availability

20
Q

VM terms: Virtual machine file

A

Encapsulation

21
Q

This situation occurs when the number of virtual machines is out of control

A

Virtualization sprawl

22
Q

The ability to fit the resources needed to cope with loads dynamically by provisioning and deprovisioning resources

A

Elasticity