3.3 Given a scenario, implement secure systems design. Flashcards

1
Q

Full Disk Encryption

A

FDE - is encrypting the entire disk, rather than a specific file or folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TPM

A

Trusted platform Module - are dedicated processors that use cryptographic keys to perform a variety of tasks. Typically a chip on the motherboard, needed if you want to use Bitlocker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On the Exam if you fully encrypted the disk, it is most likely done with ______

A

Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HSM

A

Hardware Security Module - External TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Boot

A

is a process whereby the BIOS or UEFI makes a cryptographic hash of the operating system boot loader and any boot drivers and compares that against a stored hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Part of hardening a system

A

Disabling Unnecessary Ports and Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is similar to least privileges, but pertains to a computer.

A

Least Functionality - The system itself should be configured and capable of doing only what it is intended to do and no more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For the test, Solaris, SELinux, and SUSE Linux

A

the only trusted OSs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Peripherals

A

things that attach to your computer - Wireless Keyboards; Mice; Displays; & Wifi-enabled MicroSD Cards, printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of OS is designed for public end-user access and is locked down so that only preauthorized software products and functions are enabled?

A. Kiosk
B. Appliance
C. Workstation
D. Server

A

A. Kiosk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the BEST option in preventing an application or even malware from executing on a workstation?

A. Firewall
B. Antivirus
C. Application Whitelist
D. HIPS

A

C. Application Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is MOST closely associated with BitLocker?

A. ACL
B. DOS
C. DLP
D. TPM

A

D. TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following BEST explains the use of an HSM within the company servers?

A. Thumb drives present a significant threat which is mitigated by HSM.
B. Software encryption can perform multiple functions required by HSM.
C. Data loss by removable media can be prevented with DLP.
D. Hardware encryption is faster than Software encryption.

A

D. Hardware encryption is faster than Software encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly