2.1 Explain the importance of security concepts in an enterprise environment. Flashcards

1
Q

Hot Site

A

a fully configured alternate network that can be quickly brought online after a disaster. With a hot site, systems and data are usually up-to-date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cold Site

A

an alternate location where a network can be rebuilt after a disaster occurred. A cold site can take some time to implement, as systems and assets (including data) are not readily configured and available for full use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Warm Site

A

a dormant alternate location, or a location that performs noncritical functions under normal conditions but can be rapidly converted to a main operations site with minimal effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Failover

A

refers to system redundancy. With a failover configuration, an additional device is configured to function when the primary configuration fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify the removable device that when added to a system, provides cryptographic key generation, management, and storage.

A

HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HSM

A

A Hardware Security Module (HSM) is a device used to generate, maintain and store cryptographic keys. It can be an external device and can easily be added to a system. The HSM will maintain the integrity of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TPM

A

The Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system and provides secure key storage for full disk encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SoC

A

A system on a chip includes all the functionality of a system in a compact solution. Mobile computing devices typically have this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardware root of trust

A

A hardware root of trust is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DLP

A

A Data Loss Prevention (DLP) system can integrate with a mail gateway server to examine the contents of the email or attachments and determine if it can be sent. This will prevent situations like the one mentioned from occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data at rest

A

Data at rest is when data is in some sort of persistent storage media. Examples include financial information stored in databases, archived audiovisual media, and operational policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what state is data in when It is when data is transmitted over a network.

A

Data in transit and data in motion are the same. Examples include website traffic and remote access traffic, and data being synchronized between cloud repositories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a method of securing sensitive information, such as an account number, into a random string of characters that requires no mathematical process?

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tokenization

A

Tokenization is a database de-identification method where all or part of data in a field is substituted with a randomly generated token. The token is stored with the original value separate to the production database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSL Accelerator

A

A Secure Socket Layer (SSL) Accelerator is a hardware device used to encrypt Transport Layer Security (TLS) traffic and should be placed close to the desired off-loading device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Full Disk Encryption

A

Full Disk Encryption provides encryption for a whole disk and protects the confidentiality of the data.

17
Q

Code Obfuscation

A

Code obfuscation is the method of disguising coding methods by way of renaming variables, replacing strings, and hiding code comments.

18
Q

physical security control designed to control access to secure areas.

A

mantrap,Mantraps provide the capability to lock a single person in an area if needed.

19
Q

a server that is intentionally left open or available, so that an attacker will be drawn to it

A

honeypot

20
Q

A security engineer is using several virtual servers accessible from the company network to lure in potential attackers. What has the security engineer created?

A

Honeynet