Test 2 Flashcards

1
Q

What are the five basic steps in a vulnerability assessment?

A

Asset Identification, Threat Identification, Vulnerability Appraisal, Risk Assessment, Risk Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of an attack tree in threat modeling?

A

Visually displays possible attacks, their goals, and the techniques used, structured as an inverted tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three possible states of a network port?

A

Open, Closed, Blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name three tools used in protocol analysis.

A

Wireshark, Microsoft Message Analyzer, tcpdump.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a honeypot?

A

A decoy system used to lure attackers and study their methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the ping command do in network security?

A

Tests the reachability of a device by sending ICMP packets and measuring response time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is tracert used for?

A

Displays the path packets take to a destination, identifying each router along the route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a port scanner help assess network security?

A

Identifies which ports are open, closed, or blocked to determine service vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of a vulnerability scanner?

A

Checks for known vulnerabilities in systems like unpatched software or open ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a protocol analyzer like Wireshark do?

A

Captures and analyzes network traffic for performance or security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the difference between a honeypot and a real server?

A

A honeypot is fake and lures attackers, while a real server hosts production services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is banner grabbing?

A

Collecting information from services like version and type, often via connection banners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 3 password cracking tools.

A

John the Ripper, Cain and Abel, THC Hydra.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the key difference in schema between SQL and NoSQL?

A

SQL requires a predefined schema; NoSQL is schema-less and flexible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are typical use cases for NoSQL?

A

Social apps, ads, BI, massive user growth, horizontally scaled systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain vertical vs horizontal scaling.

A

Vertical: upgrade single machine; Horizontal: add more machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is denormalization used in NoSQL?

A

Improves read speed by duplicating data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Can NoSQL support transactions?

A

Only within a single document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is vertical scaling in SQL databases?

A

Improving performance by upgrading the CPU/RAM of a single server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is horizontal scaling important in NoSQL?

A

Allows growth by adding more servers, essential for high-traffic apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does it mean that SQL is ‘schema-first’?

A

Requires table structures and types to be defined before use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does NoSQL handle data integrity compared to SQL?

A

It lacks constraints, so integrity checks must be handled by the app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a JOIN in SQL and why is it useful?

A

Combines rows from different tables using a related column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the 4 main components of Hadoop?

A

Hadoop Common, HDFS, MapReduce, YARN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Describe the MapReduce approach.

A

Map functions process data in parallel; reduce functions combine results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does the NameNode do?

A

Tracks metadata and block locations in HDFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the FsImage in Hadoop?

A

Snapshot of the file system state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Hadoop’s default replication factor?

A

3 (each file is stored on 3 nodes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does HDFS do in Hadoop?

A

Stores large files across many nodes with redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Why is replication important in Hadoop?

A

Ensures fault tolerance by storing multiple copies of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What’s the difference between Docker containers and VMs?

A

Containers share the OS kernel; VMs simulate entire hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are Linux namespaces and cgroups?

A

Namespaces isolate resources; cgroups limit resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Name the 3 components of Docker.

A

Docker daemon, Docker objects (containers/images), Docker registries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What’s the purpose of Docker Compose?

A

Manages multi-container apps using a YAML config file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Docker Swarm?

A

Clusters multiple Docker engines into one virtual engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the purpose of Linux namespaces in containers?

A

To isolate file systems, users, and network environments per container.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does the Docker Engine do?

A

Manages container lifecycles, networking, and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the difference between Docker Hub and Docker Cloud?

A

Hub is a public registry; Cloud offered CI/CD features (now deprecated).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the 3 cloud service models?

A

IaaS, PaaS, SaaS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What’s AaaS (Analytics as a Service)?

A

Cloud-based analytics platform offering prebuilt models and dashboards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a distributed ledger?

A

A decentralized database shared across multiple locations without a central authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the four requirements for adding a block to a blockchain?

A
  1. Transaction, 2. Verified, 3. Stored in block, 4. Block is hashed.
43
Q

List blockchain alternatives.

A

Tangle, Hashgraph.

44
Q

How does IaaS differ from SaaS?

A

IaaS provides infrastructure; SaaS provides complete software apps.

45
Q

What is the purpose of a hash in blockchain?

A

Ensures block integrity and links it to previous blocks.

46
Q

How is consensus achieved in a blockchain?

A

Majority of nodes validate transactions using algorithms like PoW or PoS.

47
Q

What is Analytics as a Service (AaaS)?

A

SaaS-based platform for performing analytics without managing infrastructure.

49
Q

What is the goal of a vulnerability assessment?

A

To identify, quantify, and prioritize vulnerabilities in a system.

50
Q

What is an asset in risk analysis?

A

Anything of value to the organization that needs protection.

51
Q

Give an example of a threat from technical obsolescence.

A

An older operating system unable to run new security patches.

52
Q

What does a risk assessment calculate?

A

The likelihood of a vulnerability being exploited and its impact.

53
Q

What are port states used for in port scanning?

A

They help determine which services are accessible and potentially vulnerable.

54
Q

What is the purpose of penetration testing tools?

A

To simulate real-world attacks and identify exploitable vulnerabilities.

55
Q

What is the role of netstat in network analysis?

A

Displays active network connections and listening ports.

56
Q

How can arp help detect ARP poisoning?

A

It shows the ARP cache, which may contain spoofed IP/MAC pairs.

57
Q

What type of scanner sends probes to evaluate responses?

A

An active scanner.

58
Q

What tool can simulate a DoS attack using ICMP packets?

A

ping can be used to flood a network as a stress test.

59
Q

What is a firewall’s role in network security?

A

It controls incoming and outgoing traffic based on predetermined rules.

60
Q

What is protocol filtering in analyzers used for?

A

To focus on specific types of traffic or identify malicious content.

61
Q

What is a banner in banner grabbing?

A

A message from a service that reveals version or software type.

62
Q

What does CRUD stand for?

A

Create, Read, Update, Delete.

63
Q

What is the role of a primary key in SQL?

A

Uniquely identifies each record in a table.

64
Q

Why is JSON used in NoSQL?

A

It provides a flexible and readable format for storing data.

65
Q

What is the main disadvantage of denormalization?

A

Data redundancy and update complexity.

66
Q

What is a document in NoSQL?

A

A self-contained unit of data, typically in JSON format.

67
Q

Why are NoSQL databases considered flexible?

A

They allow changes in data structure without modifying schemas.

68
Q

What is normalization in SQL?

A

The process of organizing data to reduce redundancy.

69
Q

What is one key limitation of SQL databases?

A

They do not scale horizontally by default.

70
Q

How does NoSQL support high availability?

A

By replicating data across multiple nodes.

71
Q

Name a use case where SQL is preferred over NoSQL.

A

Applications requiring strong data integrity and complex queries.

72
Q

What does YARN stand for?

A

Yet Another Resource Negotiator.

73
Q

What does the Secondary NameNode do?

A

Assists the NameNode by merging EditLog and FsImage.

74
Q

What is the EditLog in Hadoop?

A

A log of recent file system changes.

75
Q

How is fault tolerance achieved in Hadoop?

A

Through data replication across multiple nodes.

76
Q

What is a block in HDFS?

A

A fixed-size piece of data stored across the cluster.

77
Q

What is a DataNode?

A

A node that stores actual HDFS data blocks.

78
Q

What happens when a DataNode fails?

A

Hadoop replicates the lost data from another copy.

79
Q

Why is Hadoop cost-effective?

A

It uses commodity hardware and is open source.

80
Q

What is the default block size in HDFS?

81
Q

What is MapReduce ideal for?

A

Batch processing large volumes of data.

82
Q

What is Docker Hub?

A

A public repository of Docker images.

83
Q

What is the Docker CLI?

A

A command-line tool to interact with Docker.

84
Q

What is a container image?

A

A read-only template used to create containers.

85
Q

What is the role of Docker Daemon?

A

Manages Docker containers, images, and networks.

86
Q

What is Docker Desktop?

A

A GUI-based tool to manage Docker on Mac and Windows.

87
Q

What is docker-compose.yml?

A

A YAML file defining multi-container applications.

88
Q

What is container orchestration?

A

Managing, scaling, and scheduling containers automatically.

89
Q

Name a container security tool.

A

Twistlock, Aqua, or StackRox.

90
Q

What is a virtual machine in contrast to a container?

A

A full OS environment running on virtualized hardware.

91
Q

What does docker run do?

A

Creates and starts a new container from an image.

92
Q

What is the primary advantage of cloud computing?

A

On-demand resource availability and scalability.

93
Q

What is SaaS ideal for?

A

Providing complete applications without infrastructure management.

94
Q

What is the hybrid cloud model?

A

Combines public and private cloud resources.

95
Q

What is the role of PaaS?

A

Provides a development platform for building and deploying applications.

96
Q

What is the purpose of a cryptographic signature in blockchain?

A

Verifies the identity and integrity of transactions.

97
Q

What is a permissioned blockchain?

A

A blockchain where access is restricted to approved participants.

98
Q

What is a key benefit of cloud for big data?

A

Easily scalable processing power for analytics.

99
Q

What does blockchain immutability mean?

A

Once added, data in a block cannot be changed without altering all subsequent blocks.

100
Q

What does a snitch do in Cassandra?

A

Defines which nodes belong to which racks and datacenters.

101
Q

What is the replication factor in Cassandra?

A

Number of copies of each piece of data stored across nodes.

102
Q

What is a node in Cassandra?

A

A basic unit where data is stored.

103
Q

What is the purpose of gossip protocol in Cassandra?

A

Allows nodes to share state information about each other.