Test SYS-601 Flashcards

1
Q

Scalability (Scaling out)

A

-Scalability is the capacity to increase resources to meet demand within similar cost ratios. Scaling out adds more resources in parallel to a system. Adding an additional CPU is an example of scaling out.

-Scalability means that if service demand doubles, costs do not more than double. Adding more resources such as RAM is an example of scaling out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scalability (Scaling Up)

A

-Giving important processes higher priority in a system is not scaling out, but more so scaling up. Scaling up is done by increasing existing resources.

-Freeing up CPU resources in a system by eliminating services is not scaling out, but more so scaling up. Scaling up is done by increasing existing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the file
%SystemRoot%\System32\Drivers\etc\hosts
responsible for?

A

the file responsible for mapping IP addresses to domain names in Windows. It does not store passwords. The HOSTS file existed long before Domain Name System (DNS), and while all name resolution now functions through DNS, the HOSTS file is still present, and most operating systems check it before using DNS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

%SystemRoot%\System32\config\SAM

A

is where local users and passwords are stored as part of the Registry (Security Account Manager) on Windows machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

/etc/passwd

A
  • is where user account details and encrypted passwords are stored on Linux (on older systems), but this file is universally accessible.

-Consequently, passwords are moved to /etc/shadow, which is only readable by the root user on Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the ARP cache show

A

The ARP cache shows the MAC address of the interface associated with each IP address the local host has communicated with recently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ipconfig show

A

-Windows ipconfig shows the configuration assigned to network interface(s), including the hardware or media access control (MAC) address, IPv4 and IPv6 addresses.
-ipconfig shows whether the IP address is static or assigned by DHCP. If the address is DHCP-assigned, the output also shows the address of the DHCP server that provided the lease.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Ping used for

A

The admin can use the ping command to probe a host on a particular IP address or host name using the Internet Control Message Protocol (ICMP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does asymmetric encryption proves

A

Asymmetric encryption is ideal for proving identity, but it requires significant computing overhead and is inefficient for bulk encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the drawback’s of asymmetric encryption

A

The drawback of asymmetric encryption is that it involves substantial computing overhead compared to symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric encryption

A

Symmetric encryption is very fast. It is used for bulk encryption of large amounts of data. The main problem is secure key distribution and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stream cipher

A

In a stream cipher, each byte or bit of data in the plaintext is encrypted one at a time. This is suitable for encrypting communications where the total length of the message is not known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Endpoint detection and response (EDR)

A

the product is to provide real-time and historical visibility into the compromise, contain the malware within a single host, and facilitate remediation of the host to its original state.

aims to provide enhanced protection, visibility, and control over endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Next-generation endpoint

A

Next generation endpoint agents use cloud management, rather than reporting to an on-remises server;
Next-generation endpoint detection systems use artificial intelligence (AI) and machine learning to perform user and entity behavior analysis (UEBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Ba seline deviation reporting mean?

A

it means testing the actual configuration of hosts to ensure that their configuration settings match the baseline template.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The 6 steps of incident response in order

A
  1. Preparation
    2.Identification
    3.Containment
    4.Eradication
    5.Recover
    6.Lessons Learned

Page 3. of Emmanuel notes

17
Q

What is the goal of the containment stage

A

The goal of the containment stage is to secure data while limiting the immediate impact on customers and business partners

18
Q

What is the purpose of identification (Incident response)

A

Based on an alert or report, identification determines whether an incident has taken place, how severe it might be (triage), and notifies stakeholders.

19
Q

What happens during Eradication? (Incident response)

A

Once the security admin contains the incident, eradication removes the cause and restores the affected system to a secure state.

20
Q

What does the recovery stage consist of? (Incident response)

A

This recovery phase may involve restoration of data from backup and security testing.

21
Q

How can a company install a virtual machine on a bare metal virtual platform?

A

A bare metal virtual platform means that a type 1 hypervisor is installed directly onto a host machine and manages access to the host hardware directly without going through a host Operating System (OS) like Windows Server.

22
Q

How is VirtualDesktop Infrastructure (VDI) achieved?

A

Virtual Desktop Infrastructure (VDI) is achieved by replacing desktop computers with low specification and low power thin client computers.

23
Q

A rouge access point (AP)

A

A malicious user can set up an unauthorized (rouge) access point with something as basic as a smartphone with tethering capabilities, and non-malicious users could do so by accident.

24
Q

An access point that requires a wireless controller to function is known as a what?

A

a thin WAP

25
Q

SPAN ports?

A

With a SPAN port, the sensor attaches to a specially configured port on the switch that receives copies of frames addressed to nominated access ports (or all the other ports).

26
Q

Spectrum analyzer

A

A spectrum analyzer is a device that can detect the source of jamming (interference) on a wireless network

27
Q

What illustrates effective use of industrial camouflage as a security control?

A

Entry control measures for a secure facility begin inside a main entry point, rather than outside the building

28
Q

Tokenization

A

Tokenization replaces all or part of data in a field with a randomly generated token, which is securely stored with the original value. An authorized query or app can retrieve the original value, so tokenization is a reversible technique.

29
Q

Data masking

A

Data masking redacts all or part of a field’s contents, substituting character strings with “x” for example. Data masking is an irreversible de-identification technique.

30
Q

Data minimization

A

is the principle of only processing and storing data if that is necessary to perform the purpose for which it is collected.

31
Q

Full anonymization

A

Individual subjects can no longer be identified in a fully anonymized data set, even when combined with other data sources. This de-identification method permanently removes identifying information

32
Q

If a large data facility experienced a disaster-level event, what is the process of reconstituting its systems?

A
  • The first step in the process is enabling and testing power delivery systems (grid power, power distribution units (PDUs), UPS, secondary generators, and so on).
  • Secondly, the team should enable and test switch infrastructure, then routing appliances and systems.
  • The third step is to enable and test network security appliances (firewalls, IDS, proxies).
  • The fourth step is enabling and testing critical network servers (DHCP, DNS, NTP, and directory services).
33
Q

If a large data facility experienced a disaster-level event, what is the process of reconstituting its systems?

A
  • The first step in the process is enabling and testing power delivery systems (grid power, power distribution units (PDUs), UPS, secondary generators, and so on).
  • Secondly, the team should enable and test switch infrastructure, then routing appliances and systems.
  • The third step is to enable and test network security appliances (firewalls, IDS, proxies).
  • The fourth step is enabling and testing critical network servers (DHCP, DNS, NTP, and directory services).