Test 2 Smaller Flashcards

1
Q

What are the five basic steps in a vulnerability assessment?

A

Asset Identification, Threat Identification, Vulnerability Appraisal, Risk Assessment, Risk Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of an attack tree in threat modeling?

A

Visually displays possible attacks, their goals, and the techniques used, structured as an inverted tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three possible states of a network port?

A

Open, Closed, Blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name three tools used in protocol analysis.

A

Wireshark, Microsoft Message Analyzer, tcpdump.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a honeypot?

A

A decoy system used to lure attackers and study their methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the ping command do in network security?

A

Tests the reachability of a device by sending ICMP packets and measuring response time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is tracert used for?

A

Displays the path packets take to a destination, identifying each router along the route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a port scanner help assess network security?

A

Identifies which ports are open, closed, or blocked to determine service vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of a vulnerability scanner?

A

Checks for known vulnerabilities in systems like unpatched software or open ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a protocol analyzer like Wireshark do?

A

Captures and analyzes network traffic for performance or security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the difference between a honeypot and a real server?

A

A honeypot is fake and lures attackers, while a real server hosts production services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is banner grabbing?

A

Collecting information from services like version and type, often via connection banners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 3 password cracking tools.

A

John the Ripper, Cain and Abel, THC Hydra.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the key difference in schema between SQL and NoSQL?

A

SQL requires a predefined schema; NoSQL is schema-less and flexible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are typical use cases for NoSQL?

A

Social apps, ads, BI, massive user growth, horizontally scaled systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain vertical vs horizontal scaling.

A

Vertical: upgrade single machine; Horizontal: add more machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is denormalization used in NoSQL?

A

Improves read speed by duplicating data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Can NoSQL support transactions?

A

Only within a single document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is vertical scaling in SQL databases?

A

Improving performance by upgrading the CPU/RAM of a single server.

20
Q

Why is horizontal scaling important in NoSQL?

A

Allows growth by adding more servers, essential for high-traffic apps.

21
Q

What does it mean that SQL is ‘schema-first’?

A

Requires table structures and types to be defined before use.

22
Q

How does NoSQL handle data integrity compared to SQL?

A

It lacks constraints, so integrity checks must be handled by the app.

23
Q

What is a JOIN in SQL and why is it useful?

A

Combines rows from different tables using a related column.

24
Q

What are the 4 main components of Hadoop?

A

Hadoop Common, HDFS, MapReduce, YARN.

25
Q

Describe the MapReduce approach.

A

Map functions process data in parallel; reduce functions combine results.

26
Q

What does the NameNode do?

A

Tracks metadata and block locations in HDFS.

27
Q

What is the FsImage in Hadoop?

A

Snapshot of the file system state.

28
Q

What is Hadoop’s default replication factor?

A

3 (each file is stored on 3 nodes).

29
Q

What does HDFS do in Hadoop?

A

Stores large files across many nodes with redundancy.

30
Q

Why is replication important in Hadoop?

A

Ensures fault tolerance by storing multiple copies of data.

31
Q

What’s the difference between Docker containers and VMs?

A

Containers share the OS kernel; VMs simulate entire hardware.

32
Q

What are Linux namespaces and cgroups?

A

Namespaces isolate resources; cgroups limit resource usage.

33
Q

Name the 3 components of Docker.

A

Docker daemon, Docker objects (containers/images), Docker registries.

34
Q

What’s the purpose of Docker Compose?

A

Manages multi-container apps using a YAML config file.

35
Q

What is Docker Swarm?

A

Clusters multiple Docker engines into one virtual engine.

36
Q

What is the purpose of Linux namespaces in containers?

A

To isolate file systems, users, and network environments per container.

37
Q

What does the Docker Engine do?

A

Manages container lifecycles, networking, and storage.

38
Q

What is the difference between Docker Hub and Docker Cloud?

A

Hub is a public registry; Cloud offered CI/CD features (now deprecated).

39
Q

What are the 3 cloud service models?

A

IaaS, PaaS, SaaS.

40
Q

What’s AaaS (Analytics as a Service)?

A

Cloud-based analytics platform offering prebuilt models and dashboards.

41
Q

What is a distributed ledger?

A

A decentralized database shared across multiple locations without a central authority.

42
Q

What are the four requirements for adding a block to a blockchain?

A
  1. Transaction, 2. Verified, 3. Stored in block, 4. Block is hashed.
43
Q

List blockchain alternatives.

A

Tangle, Hashgraph.

44
Q

How does IaaS differ from SaaS?

A

IaaS provides infrastructure; SaaS provides complete software apps.

45
Q

What is the purpose of a hash in blockchain?

A

Ensures block integrity and links it to previous blocks.

46
Q

How is consensus achieved in a blockchain?

A

Majority of nodes validate transactions using algorithms like PoW or PoS.

47
Q

What is Analytics as a Service (AaaS)?

A

SaaS-based platform for performing analytics without managing infrastructure.