Security Architecture: Quiz Revision Flashcards
Order the six phases of the software development life cycle from first to the last phase.
Maintain
Design
Deploy
Test
Implement
Plan
The Software Development Life Cycle (SDLC) is a framework that outlines the steps involved in the development of software at each phase during the process. It encompasses a detailed plan for building, deploying, and maintaining the software during its lifetime. The six phases of the software development life cycle are ordered as follows:
Plan
Design
Implement
Test
Deploy
Maintain
In security architecture testing, which testing activities aid in the assessment of system resilience and performance when a failure might occur, or when the workload increases? (Choose two.)
A)Penetration testing
B)Vulnerability scanning
C)Parallel processing
D)Failover testing
Failover testing and parallel processing would help in assessing system resilience and performance during a failure.
In failover testing, you would deliberately trigger a failure in a system component to evaluate the effectiveness of the failover mechanism. This method assesses the system’s ability to switch to backup components or systems seamlessly in the event of a failure, ensuring continuity and minimal disruption to operations. An example would be shutting off the power to a facility to test the backup generator.
In parallel processing, you would test the ability to handle increased workloads by simultaneously executing multiple tasks or processes to assess the system’s ability to cope. This method is particularly useful for evaluating performance under heavy loads and determining whether the system can efficiently distribute and process tasks in parallel. Parallel processing also ensures redundancy is built in to the system by duplicating components and workloads.
What is vulnerability testing?
In vulnerability scanning, you would identify and assess security vulnerabilities in a system. While this test is important for security, it does not test the architecture for capacity.
What is Penetration testing?
Penetration testing would simulate cyberattacks to identify and exploit vulnerabilities in a system. This provides critically valuable information, but penetration testing does not evaluate capacity planning.
You are examining security architecture models. Which consideration describes the ability to withstand cyberattacks and system failures, and to recover from them?
A)Resilience
B)Reponsiveness
C)Scalability
D)Cost
Resilience is closely related to fault tolerance and redundancy. Resilience is the ability of a system to recover from a failure with the least amount of down time. A redundant array of independent drives (RAID) system at RAID1, RAID5, or RAID10 will tolerate a failed drive and allow the system to remain operational during repairs. A similar concept exists with network interface cards (NICs), called teaming. Multiple NICs are joined via software, so that if any one of the cards in the team fails, the other cards absorb the load.
Why is scalability important in a security architecture model?
Scalability is a significant architecture consideration. You might save on some initial costs if you use a fixed design that is not scalable in either direction. You want a system that can scale up when demand increases and scale down when demand decreases. Scalability is typically much easier to accomplish in a cloud environment than with physical servers.
Why is Cost important in a security architecture model?
Cost is a big factor when considering fault tolerance, resilience, and redundancy. The costs increase as the amount of down time you can tolerate decreases. Resilience also deals with site redundancy. A hot site is going to be much more resilient than a cold site, but also much more expensive to operate. The cost to maintain an uptime level is directly related to the resiliency required. For example, 99.999% uptime means you must add multiple redundancies in an attempt to eliminate every single point of failure. 99.999% up time means that your system can only be down for 5 minutes and 15 seconds per year. To accomplish that, you will need a lot of redundant equipment, and that is expensive.
Responsiveness in a security Architecture general refers to?
Responsiveness generally refers to how fast and reliably a cloud solution can react and perform the tasks required. This can be negotiated in a Service Level Agreement (SLA) where items like acceptable throughput and response times are specified.
Analysis of a recent breach shows that the breach was caused when the firewall allowed an unconfirmed packet to pass through to the internal network. Which failure mode should you implement to prevent unconfirmed packets from passing through?
A)Active
B)Passive
C)Fail-closed
D)Fail-open
You should implement a fail-closed strategy. A fail-closed system will shut the drive or system down when a designated failure condition is detected. In the case of the example above, the firewall would be configured to shut down when it examines a packet that the firewall cannot determine if it should be allowed. In a fail-closed system, security is the most important factor.
A fail-open system remains operational (open) when a failure condition occurs. This strategy is implemented when it is determined that the criticality of access to the system outweighs the need to authenticate. As an example, if an insurance verification system in a hospital fails, the hospital may have a fail-open policy that allows patient treatment now and figuring out the insurance issues later.
Active is not a failure mode, but rather a term used with an Intrusion Prevention System (IPS). An IPS is in-line with the traffic it monitors, so it is considered active.
Passive is not a failure mode, but rather a term used with an Intrusion Detection System (IDS). An IDS performs out-of-band monitoring, so it is considered passive.
You are evaluating cloud architecture and infrastructure concepts. Which factors are MOST important for enhancing separation and minimizing attack surfaces? (Choose two.)
A)Cloud orchestration
B)Microservices
C)Physical isolation
D)Logical segmentation
Physical isolation and logical segmentation contribute the most to minimizing attack surfaces.
Physical isolation means that one network is unable to communicate with another network. A similar term is air-gapped. When you have networks that are responsible for different types of traffic, it might be a good idea to physically isolate them so that one network cannot be used to communicate with a device on the other network. As an example, a supervisory control and data access (SCADA) system that controls HVAC in a hospital should be held separate from the patient data network.
Logical segmentation is subdividing a larger network into several smaller networks. This can be accomplished through virtual local area networks (VLANs) and subnetting. These methods allow the administrator to group computers logically rather than by their physical locations.
What is a micro services?
Microservices are small snippets of code that are designed to perform a single specialized task on demand. A microservice would receive input(s), perform whatever computations, and provide output(s). A simple example would be a Fahrenheit to Celsius converter. The microservice F_to_C would receive Fahrenheit degrees (32 for example), perform the calculation C=(F-32) x 5/9 and output the result of 0. In ecommerce, a microservice might be used to accept a tracking number, identify the shopping carrier by the first two digits of the tracking number, go to the shipper’s website to retrieve the tracking info and then display the tracking info. Other names for microservices are modules, functions, and stored procedures
What is cloud orchestration involve?
Cloud orchestration involves automating the deployment, management, and scaling of cloud infrastructure. Cloud orchestration focuses on operational efficiency rather than security separation.
Data may be subject to the laws and regulations of the nation in which it is collected, not necessarily where it is stored. Which principle is being described?
A) Chain of custody
B) Incident response plan
C) Data sovereignty
D) Legal hold
The only correct answer in this situation would be data sovereignty. Data sovereignty refers to government or enterprise efforts to prevent their citizens’ or customer data from falling into the wrong hands via measures that restrict how personal information can be transferred beyond their country’s borders.
You are incorporating a perimeter network into a network redesign and are adding several new devices to enhance security. Which of these would NOT be best placed in the new perimeter network?
A) DDoS mitigation
B) Proxies
C) VPN concentrators
D) Aggregation switches
Aggregation switches are not best placed in a perimeter network because they are best used to connect other switches together. They can be placed anywhere they are needed. Aggregation switches create a single bandwidth stream from multiple sources. A DDoS mitigator should be placed in the perimeter network so that it can detect and mitigate a DDoS attack.
Where are proxies best placed at in the network topology>?
Proxies are best suited for placement in the perimeter network.
While performing a penetration test, you encounter several issues that you plan to document in the final report. However, you need to ensure that management is immediately notified of any IoCs documented in the communication escalation path.
Which of the following is MOST likely to result in the need for immediate communication to management?
A) A finding was discovered regarding an out-of-scope system.
B) Unpatched applications exist on a system marked for retirement.
C) A network compromise has previously occurred about which management knows nothing.
D) Encrypted personally identifiable information (PII) was discovered on several systems.
Of the situations given, only the network compromise that has previously occurred about which management knows nothing should be immediately reported to management.
None of the other findings are critical, nor are they indicators of compromise (IoCs). Critical findings and IoCs are the only discoveries that should trigger immediate communication to management, unless otherwise noted in the communication escalation directions.
Issues with out-of-scope systems should be noted in the final report. However, out-of-scope systems should not be thoroughly tested. Often you may accidentally discover an issue with an out-of-scope system, but these should only be reported and not investigated further unless priorities change.
Encrypted PII will often exist on multiple systems. However, it is usually considered protected (unless a compromised encryption algorithm is being used). This issue would be included in the final report and only considered critical if 1) the PII should not be on the system on which it was discovered, or 2) the encryption algorithm being used to protect the PII has been compromised or is no longer considered secure.
Unpatched applications may exist on systems marked for retirement. However, this is usually not a critical issue because systems marked for retirement are often not updated regularly. The tester should note the discovery in the final report and instruct the organization that the soon-to-be retired system should be updated if retirement does not take place in the near future (next three months or so).
Communication triggers should include critical findings, stages, and indicators of prior compromise. All other discoveries should simply be included in the final report.
Where are VPN Concentrators best placed at in the network topology?
VPN concentrators should be placed in the perimeter network near the gateway. Other security devices and technologies that are sensitive to their placement include sensors, collectors, correlation engines, Load balancers, VPN concentrators, SSL accelerators, taps, and SDN. Sensors, collectors, and correlation engines should be placed closest to the devices being monitored to improve performance. Load balancers are usually placed in the same networks as devices that receive a high load. VPN concentrators should be placed on the VPN perimeter. SSL accelerators should be placed close to or on the devices using SSL. Taps should be placed closest to the devices they are monitoring. SDN can be used anywhere, but the SDN controller should be centrally located to provide the best performance for all devices that communicate via the SDN.
Your company has recently started adopting formal security policies to comply with several state regulations. One of the security policies states that certain hardware is vital to the organization. As part of this security policy, you must ensure that you have the required number of components plus one extra to plug into any system in case of failure. Which strategy is this policy demonstrating?
A)server redundancy
B)clustering
C)cold site
D)fault tolerance
Fault tolerance ensures that you have the required number of components plus one extra to plug into any system in case of failure.
What does clustering do>?
Clustering is the process of providing failover capabilities for servers by using multiple servers together. A cluster consists of several servers providing the same services. If one server in the cluster fails, the other servers will continue to operate.
What does cold site offer?
A cold site for disaster recovery includes a basic room with raised flooring, electrical wiring, air conditioning, and telecommunications lines. To properly test disaster recovery procedures at the cold site, alternate telecommunications and computer equipment would need to be set up and configured.
What considerations would you need to consider in a disaster recovery plan?
As part of any disaster recovery plan, security professionals should ensure that the organization covers the following geographic considerations:
Off-site backups – This ensures that copies of backups are stored off-site in case the primary site is affected by a disaster.
Distance – This ensures that the off-site storage or restoration location is far enough away from the primary site that it is not affected by the same disaster as the primary site.
Location selection – This ensures that a location is assessed to ensure that it is the best location for a backup site. For example, you would want to ensure that the appropriate physical controls are in place to ensure that your backups are protected.
Legal implications – This ensures that any legal implications regarding the off-site storage of data are considered. An organization may be under regulations that prevent certain sites or geographic locations from being used.
Data sovereignty – This ensures that the data is subject to the laws of the location where it is stored. For some organizations, compliance with multiple data sovereignty laws may be necessary.
Smart devices and Internet of Things (IoT) are growing rapidly. Which of these include embedded systems that are security risks? (Choose all that apply.)
A)Printers
B)Home automation devices
C)Medical devices
D)Wearable technology
Embedded systems are included in medical devices, wearable technology, home automation, and printers. All of these IoT devices have security risks.
Medical devices can be manipulated to report false data, resulting in harm to the patient, or to collect the patient’s protected medical data. They can also be tampered with to change parameters, such as changing the beat rate on a pacemaker. Finally, they can be tampered with to cause the battery life to diminish at a faster than normal rate.
Wearable technology devices usually transmit via Wi-Fi or Bluetooth to a host device, and as such are subject to attack. In addition to being subject to attack, wearable devices such as voice recorders, video recorders, and hidden cameras can also be used to gain information. Printers or multi-function devices (MFDs), particularly those with networking capability, have the same security concerns as any other device that can be remotely managed. For example, the printer may allow users to connect through Telnet or SSH. If those protocols are not used, turn them off.
Automotive vehicles with embedded systems are susceptible to attacks. As an example, an air pressure sensor on a tire can be manipulated to show a low-pressure alert. When the consumer fills the tire sufficiently so that the alert stops, the tire is now overinflated. This can cause the tire to explode at highway speeds. In rare cases, hackers have found a way to hack into “smart” automobiles and drive them remotely.
Home automation devices, such as smart thermostats, lighting systems, and refrigerators, are susceptible to security issues. The security concerns are the same as for industrial controls, just at the home level. One must ensure that security patches and firmware upgrades are applied, proper authentication controls are in place, devices are separated from the home network and Internet, and the device has a means to encrypt its data.
Which of the following has Firewall as a Service (FWaaS) as a component?
A) Secure Access Service Edge
B) Network segmentation
C) On-premises
D) Software-defined networking
Secure Access Service Edge (SASE) has Firewall as a Service (FWaaS) as one of its components. Other components include secure web gateways (SWG), a cloud access security broker (CASB), and zero trust network access (ZTNA). SASE is used to ensure security in a software-defined wide area network (SD-WAN) environment, particularly in a cloud environment. SASE is often associated with the zero-trust model.
On-premises network architecture allows an organization to maintain control of its architecture and resources by hosting it on-site. With on-premises hardware, the organization can even host its own private cloud.
Network segmentation involves dividing the network into either Layer 2 or Layer 3 to create desirable security barriers between devices in the network. It cannot route traffic from a device being flooded to a location where the traffic can be studied.
Software-defined networking (SDN) allows for dynamic reconfiguration of a network as a reaction to changes in volume, types of traffic, and security incidents.