Architecture and Design Flashcards
You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?
Create an additional copy of the backups in an off-site datacenter
Attempt to restore to a test server from one of the backup files to verify them
Set up scripts to automatically reattempt any failed backup jobs
Frequently restore the server from backup files to test them
Attempt to restore to a test server from one of the backup files to verify them
When conducting forensic analysis of a hard drive, what tool would BEST prevent changing the hard drive contents during your analysis?
Forensic drive duplicator
Software write blocker
Degausser
Hardware write blocker
Hardware write blocker
Taylor needs to sanitize hard drives from some leased workstations before returning them to a supplier at the end of the lease period. The workstations’ hard drives contained sensitive corporate data. Which is the most appropriate choice to ensure that data exposure doesn’t occur during this process?
Clear, validate, and document the sanitization of the drives
Purge, validate, and document the sanitization of the drives
Clear the drives
The drives must be destroyed to ensure no data loss
Purge, validate, and document the sanitization of the drives
You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first?
Require all employees to wear security badges when entering the building
Install a mantrap at the entrance
Install a RFID badge reader at the entrance
Install CCTV to monitor the entrance
Install a mantrap at the entrance
During a security audit, you discovered that customer service employees have been sending unencrypted confidential information to their personal email accounts via email. What technology could you employ to detect these occurrences in the future and send an automated alert to the security team?
UTM
SSL
MDM
DLP
DLP
Which of the following hashing algorithms results in a 160-bit fixed output?
NTLM
SHA-2
RIPEMD
MD-5
RIPEMD
RIPEMD creates a 160-bit fixed output. SHA-2 creates a 256-bit fixed output. NTLM creates a 128-bit fixed output. MD-5 creates a 128-bit fixed output.
A financial services company wants to donate some old hard drives from their servers to a local charity. The hard drives used in the servers are self-encrypting drives. Still, they are concerned about the possibility of residual data being left on the drives. Which of the following secure disposal methods would you recommend the company use?
Overwrite
Zero-fill
Secure erase
Cryptographic erase
Cryptographic erase
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company’s owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donate them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
Shredding
Degaussing
Wiping
Destroying
Wiping
Which of the following vulnerabilities involves leveraging access from a single virtual machine to other machines on a hypervisor?
VM migration
VM data remnant
VM sprawl
VM escape
VM escape
Select four security features that you should use with a workstation or laptop within your organization?
Network Sniffer
Cellular Data
MDM
Location Tracking
Cable Lock
Host Based Firewall
CAT 5e STP
Remote Wipe
Host based firewall, network sniffer, cable lock, CAT5e STP
What is the lowest layer (bottom layer) of a bare-metal virtualization environment?
Host operating system
Physical hardware
Guest operating system
Hypervisor
Physical hardware
Which of the following describes the overall accuracy of a biometric authentication system?
Crossover error rate
False positive rate
False rejection rate
False acceptance rate
Crossover error rate
Which cloud computing concept is BEST described as focusing on replacing the hardware and software required when creating and testing new applications and programs from a customer’s environment with cloud-based resources?
IaaS
PaaS
SECaaS
SaaS
PaaS
Platform as a Service (PaaS) provides the end-user with a development environment without all the hassle of configuring and installing it themselves
Which of the following is the most important feature to consider when designing a system on a chip?
Ability to interface with industrial control systems
Type of real-time operating system in use
Space and power savings
Ability to be reconfigured after manufacture
Space and power savings
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the owner of the company if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donate them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
Purging
Degaussing
Wiping
Shredding
Wiping
Sarah is working at a startup that is focused on making secure banking apps for smartphones. Her company needs to select an asymmetric encryption algorithm to encrypt the data being used by the app. Due to the need for high security of the banking data, the company needs to ensure that whatever encryption they use is considered strong, but also need to minimize the processing power required since it will be running on a mobile device with lower computing power. Which algorithm should Sarah choose in order to provide the same level of high encryption strength with a lower overall key length?
Diffie-Hellman
ECC
RSA
Twofish
ECC
Which of the following vulnerabilities involves leveraging access from a single virtual machine to other machines on a hypervisor?
VM sprawl
VM data remnant
VM migration
VM escape
VM escape
Which of the following hashing algorithms results in a 160-bit fixed output?
NTLM
SHA-2
SHA-1
MD-5
SHA-1
SHA-1 creates a 160-bit fixed output. SHA-2 creates a 256-bit fixed output. NTLM creates a 128-bit fixed output. MD-5 creates a 128-bit fixed output.
Which of the following cryptographic algorithms is classified as stream cipher?
AES
DES
RC4
Blowfish
RC4
Frank and John have started a secret club together. They want to ensure that when they send messages to each other, they are truly unbreakable. What encryption key would provide the STRONGEST and MOST secure encryption?
ECC with a 256-bit key
DES with a 56-bit key
AES with a 256-bit key
Randomized one-time use pad
Randomized one-time use pad
Which of the following authentication mechanisms involves receiving a one-time use shared secret password, usually through a token-based key fob or smartphone app, that does not expire?
EAP
HOTP
Smart card
TOTP
HOTP (HMAC-based One-time Password Algorithm)
Which of the following would a virtual private cloud infrastructure be classified as?
Infrastructure as a Service
Function as a Service
Software as a Service
Platform as a Service
Infrastructure as a Service
Which of the following is NOT considered part of the Internet of Things?
Laptop
ICS
SCADA
Smart television
Laptop
You have just completed identifying, analyzing, and containing an incident. You have verified that the company uses older unencrypted SSDs as part of their default configuration and the manufacturer does not provide a SE utility for the devices. The storage devices contained top-secret data that would bankrupt the company if it fell into a competitor’s hands. After safely extracting the data from the device and saving it to a new self-encrypting drive, you have been asked to securely dispose of the SSDs. Which of the following methods should you use?
Use a secure erase (SE) utility on the storage devices
Physically destroy the storage devices
Conduct zero-fill on the storage devices
Perform a cryptographic erase (CE) on the storage devices
Physically destroy the storage devices