Stuff from Exams I don't know #5 Flashcards
SDN
Software Defined Network
SofG
GEO/LEO networks?
Geo-stationary, Low-earth Orbit.
Both are satellite internet options, but LEO is faster with lower latency.
GDPR Privacy Shield, and relationship to Safe Harbor
NONE - Safe Harbor is deprecated, used prior to GDPR.
Decentralized vs centralized access controls - benefits and drawbacks
A decentralized access-control system keeps user IDs, rights, and permissions in different locations on the network. These locations are often spread out across different subnets by placing them on servers connected to networks contiguous to the user requesting access and utilizing linked or associated databases.
- More redundancy
- harder to scale
- harder to administer
A Centralized Access Control system keeps user IDs, rights, and permissions in a database on a central server.
-single point of failure
- easier to scale
- easier to administer
Major driver of Zero Trust
Proliferation of endpoint devices
PIDAS
PIDAS stands for perimeter intrusion detection and assessment system.
In DRP - is “Cloud Site” a term?
YES
Technology Convergence
Technological convergence is the tendency for technologies that were originally unrelated to become more closely integrated and even unified as they develop and advance.
RADIUS - TCP or UDP?
UDP
SMP, MPP Related to distributed computing?
SMP: Symmetric parallel processing
Mpp: Technology used to create systems that house hundreds or even thousands of processors, each of which has its own operating system and memory/bus resources.
SCA - security controls assessment?
NIST 800-53
The testing and/or evaluation of the management, operational, and technical security controls in an information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
DoD Model?
4 layers, analogous to TCP/IP system
Characteristics of Microservices
Derived from service-oriented-architecture:
A singular element, feature, capability, or funcion of a web app that can be called upon by other web apps.
NIST 800-53
Sec and Privacy controls for Federal Info Systems
Supervised learning vs unsupervised learning - machine learning
Supervised learning uses labeled training data, and unsupervised learning does not.
Slack Space
The unused space in a group of disk sectors. Or, the difference in empty bytes of the space that is allocated in clusters minus the actual size of the data files.
Expert Systems
A system that seeks to embody the accumulated knowledge of humankind on a particular subject and apply it in a consistent fashion to future decisions. The application of computer based artificial intelligence in areas of specialized knowledge.
Coverage Analysis
Test coverage analysis, or simply “coverage analysis,” refers to the relationship between the amount of source code in a given application and the percentage of code that has been covered by the completed tests.
Remember - RADIUS is not encrypted
SOAP - WS-Security
Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services.
PCoIP
Type of remote access
bit-level image vs whole-disk copy
I don’t think whole-disk copy is technically a term.
TPI - Two person integrity?
form of M of N Control??
Can iSCSI run on ethernet?
YES - doesn’t typically use fiber
VPN - what is the Trailer used for?
Integrity check, trailer contains the hash of the payload.
A Remote Authentication Dial-In User Service (RADIUS) server uses ______ for authentication.
Symmetric Keys
IPSec - which mode provides true end to end encryption?
IPSec tunnel mode offers true end to end encryption. IPSec in transport mode offers point to point encryption. Neither HTML nor HTTP offers encryption.