3.0 Security Architecture Flashcards

(41 cards)

1
Q

Q: What is a responsibility matrix in cloud computing?

A

It defines who is responsible for securing different components in a cloud environment (provider vs client).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are hybrid clouds?

A

A combination of private and public clouds used together by an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Infrastructure as Code (IaC)?

A

The practice of managing and provisioning computing infrastructure through machine-readable definition files rather than physical hardware configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is serverless computing?

A

Running applications without managing dedicated servers; the provider handles infrastructure management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a microservices architecture?

A

An architectural style where an application is developed as a collection of small services that communicate over APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does network segmentation improve security?

A

It limits lateral movement within a network by isolating traffic into different segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an air-gapped network?

A

A network that is physically isolated from external networks for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Software-defined Networking (SDN)?

A

A networking approach that uses software-based controllers to manage network traffic instead of relying on hardware devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are containers in computing?

A

Lightweight virtualized environments that share the host OS kernel but isolate applications and their dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is virtualization?

A

Running multiple virtual machines on a single physical server with each VM operating independently with its own OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are IoT devices often targeted by attackers?

A

They often lack robust security features such as strong passwords or encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Industrial Control Systems (ICS)?

A

Systems used in industrial settings like power plants or manufacturing facilities to control processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is high availability in IT systems?

A

Ensuring that systems remain operational with minimal downtime through redundancy and failover mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does logical segmentation differ from physical isolation?

A

Logical segmentation divides traffic through software configurations like VLANs, while physical isolation separates systems physically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is risk transference in IT architecture?

A

Shifting risk from one party to another, often seen when using third-party vendors or cloud services instead of managing everything in-house

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why might patch availability be a concern in embedded systems?

A

Embedded systems often have limited update mechanisms, making it difficult to apply patches quickly or at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does “compute” refer to in architecture considerations?

A

The processing power required by systems or applications within an architecture model

18
Q

What is meant by decentralized architecture?

A

A decentralized architecture distributes data processing across multiple locations or devices rather than relying on a single centralized system

19
Q

Why is scalability important in modern architectures?

A

Scalability allows systems to handle increased workloads without compromising performance and ensures that they can grow as demand increases

20
Q

What are some common challenges with hybrid cloud environments?

A

Hybrid clouds require consistent security policies across both private and public clouds and careful management of data transfer between them

21
Q

How does SDN improve flexibility in networking?

A

SDN allows centralized control over network traffic through software rather than relying on physical hardware configurations, enabling more dynamic management of resources

22
Q

What is the purpose of a DMZ in network architecture?

A

To isolate public-facing services from internal networks for added security

23
Q

What is an attack surface?

A

The total number of vulnerabilities or entry points an attacker can exploit

24
Q

Describe fail-open vs fail-close scenarios.

A

Fail-open allows access during failure; fail-close denies access during failure

25
What is the role of an IPS?
To monitor and block suspicious activity in real-time.
26
What does SD-WAN stand for?
Software-defined Wide Area Network.
27
What does 802.1X provide?
Network access control through device authentication before granting access
28
How does a WAF protect web applications?
By filtering HTTP requests to prevent attacks like SQL injection
29
What is the difference between active and passive devices?
Active devices manage traffic; passive devices monitor without affecting it
30
What does TLS stand for?
Transport Layer Security
31
What is SASE?
Secure Access Service Edge—a cloud-based framework combining networking and security functions.
32
Why is reducing the attack surface important?
It minimizes potential vulnerabilities attackers can exploit.
33
What type of firewall operates at both Layer 4 and Layer 7?
Next-generation firewalls (NGFW).
34
What is a jump server used for?
To securely manage devices across different security zones.
35
How does port security enhance network protection?
By restricting which devices can connect based on authentication protocols like 802.1X
36
What is IPSec used for?
Securing IP communications through encryption and authentication.
37
Name one benefit of using SD-WAN.
It improves performance while maintaining secure connections through encryption.
38
How does a proxy server enhance privacy?
By intermediating requests between clients and servers, hiding client details from servers
39
What is the main function of a load balancer?
To distribute network traffic across multiple servers ensuring availability
40
Why might an organization choose fail-close over fail-open?
To prioritize security by blocking access during system failures
41