Missed Test Questions Dion Training Test 3 Flashcards

1
Q

What is the focal point of Infrastructure as a Service?

A

IaaS, or infrastructure as a service, is on-demand access to cloud-hosted physical and virtual servers, storage and networking - the backend IT infrastructure for running applications and workloads in the cloud.

Purchasing a server in the cloud and installing an OS and software on it is considered infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the focal point of Platform as a Service?

A

PaaS, or platform as a service, is on-demand access to a complete, ready-to-use, cloud-hosted platform for developing, running, maintaining and managing applications.

PaaS (Platform as a Service): PaaS products allow businesses and developers to host, build, and deploy consumer-facing apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Software as a Service?

A

SaaS, or software as a service, is on-demand access to ready-to-use, cloud-hosted application software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is SAML? How does it work?

A

Security Assertion Markup Language

  • XML Based framework
  • Uses SP (service provider) and IdP (identity provider) to provide authentication.
  • Often paired with SOAP
  • Provides SSO (single sign on) and federated identity management
  • User Agent (typically a browser) requests resource from SP. SP forwards to IdP. IdP verifies user, and then sends them to requested resource
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data Minimization?

A

Data minimization means to only collect exactly what information is required to fulfill a specific purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Data Masking?

A

Data masking can mean that all or part of a field’s contents are redacted, by substituting all character strings with x, for example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Tokenization?

A

Tokenization means that all or part of data in a field is replaced with a randomly generated token.

The token is stored with the original value on a token server or token vault.

If necessary, tokenization is a reversible technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Data Anonymization?

A

Data anonymization is the process of removing personally identifiable information from data sets so that the people whom the data describe remain anonymous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Sensitive Personal Information (SPI)?

A

According to the GDPR, information about an individual’s race or ethnic origin is classified as SPI.

SPI is information about a subject’s opinions, beliefs, and nature afforded specially protected status by privacy legislation.

It cannot be used to identify somebody or make any relevant assertions about health uniquely, it is neither PII nor PHI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What containment technique is the strongest possible response to an incident?

A

Isolating the affected systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is enumeration?

A

Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Desktop as a Service?

A

Desktop as a Service (DaaS) provides a full virtualized desktop environment from within a cloud-based service. This is also known as VDI (Virtualized Desktop Infrastructure) and is coming in large enterprise businesses focused on increasing their security and minimizing their operational expenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Rogue Anti-Virus?

A

Malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer).

It’s scareware that manipulates users through fear and a form of ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is SMS encrypted?

Is it possible to encrypt SMS?

A

No

Yes, with a 3rd party application that supports it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If a security scan finds a protocol running on an insecure port instead of its secure version, what should you do?

A

Change all devices that support the secure version to run on the secure port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a hybrid cloud?

A

A cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between these platforms.

This typically involves a connection from an on-premises data center to a public cloud.`

17
Q

What type of password attack focuses on one or two passwords, but attempts those passwords for many, many different user names?

A

Password Spraying Attack

18
Q

What type of password attack focuses on trying to use multiple passwords for a single user?

A

Brute Force

19
Q

What is credential stuffing?

A

Mass stolen username password testing. These are usually obtained on the dark web and tested en mass on many websites using bots.

20
Q

Which data employee focuses on how the Personally identifiable information (PII)?

A

The data protection officer