3.0 Security Architecture Flashcards
(48 cards)
What is Serverless Architecture
Function as a Service
Q: What is physical isolation in networking?
A: Using separate hardware to prevent attacker movement between networks.
Q: What is logical segmentation?
A: Using VLANs to segment networks on the same switch.
Q: What is SDN (Software Defined Networking)?
A: Makes the physical network programmable via software.
Q: What are the three planes in SDN?
A: Data Plane (packet forwarding), Control Plane (routing), Management Plane (configuration).
Q: What is virtualization?
A: Running multiple OSes on one hardware using hypervisors.
Q: What is containerization?
A: Isolated app environments using Docker; share host OS.
Q: Difference between containers and VMs?
A: Containers share host OS; VMs use hypervisors and separate OS.
Q: What is SCADA/ICS?
A: Supervisory control systems for industrial devices; not internet-exposed.
Q: What is RTOS?
A: A real-time OS that guarantees task execution within strict timing constraints.
Q: What is an embedded system?
A: A device with hardware and software built for a single purpose (e.g., smartwatches, traffic lights).
Q: What does MTTR stand for?
A: Mean Time to Repair — how long it takes to fix a system after failure.
Q: What is elasticity in cloud computing?
A: The ability to scale resources dynamically in response to workload demand.
Q: What is risk transference?
A: Shifting risk to another party (e.g., using a cloud provider or insurance).
Q: Best practice if infected by malware?
A: Restore from clean backups or use pre-configured corporate images.
Q: Why are embedded systems hard to patch?
A: They may lack interfaces or vendor support, making patching difficult or impossible.
Q: What is a security zone?
A: Logical or physical areas with different trust levels (e.g., DMZ, internal network).
Q: What is the difference between fail-open and fail-closed?
Fail-open: Allows traffic during failure
Fail-closed: Blocks traffic for security
Q: What is passive monitoring?
A: IDS-like system that observes and logs activity without interfering.
Q: What is a jump server?
A: A secure intermediary used to access internal servers via VPN, SSH, or RDP.
Q: What is a forward proxy?
A: Intercepts outbound internet traffic from inside a network.
Q: What is a reverse proxy?
A: Accepts incoming internet traffic and forwards it to internal servers.
Q: What is a load balancer used for?
A: Distributes traffic across multiple servers for high availability and performance.
Q: What is SSL offloading?
A: Delegates encryption/decryption to the load balancer to reduce server load.