Chapter 3: Architecture and Design Flashcards

(30 cards)

1
Q

Question: What is a key security implication of “Cloud” architecture, particularly regarding data management?
A) Full control over infrastructure
B) Reduced reliance on third-party services
C) Shared responsibility, with user data management typically being the user’s responsibility
D) Increased physical isolation

A

Answer: C) Shared responsibility, with user data management typically being the user’s responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question: True or False: Infrastructure as Code (IaC) automation can speed deployment, but can also propagate errors or vulnerabilities quickly.

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question: What is the security implication of “Serverless” architecture?

A

Answer: Reduced infrastructure overhead but increased reliance on third-party services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question: What is the security implication of “Microservices” architecture regarding breach scope?

A

Answer: Isolation of services can limit breach scope, but increased inter-service communication can introduce new vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question: Which network infrastructure design involves no external network connections, reducing external threats?
A) Logical Segmentation
B) Software-defined Networking (SDN)
C) Physical Isolation (Air-gapped)
D) High Availability

A

Answer: C) Physical Isolation (Air-gapped)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question: In the context of architecture models, what is the security implication of “On-premises” infrastructure?

A

Answer: Full control over infrastructure but also full responsibility for all aspects of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question: What is the security implication of “IoT” (Internet of Things) devices?

A

Answer: Expanded attack surface with many devices, often with limited security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question: Which consideration when evaluating architecture models refers to whether the system can recover from attacks or failures?
A) Availability
B) Cost
C) Resilience
D) Scalability

A

Answer: C) Resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question: When securing enterprise infrastructure, what is the purpose of creating “Security Zones” like DMZs?

A

Answer: To isolate public-facing services and segregate them from internal networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question: In the context of device placement and attack surface, what should be minimised to reduce potential entry points for attackers?
A) Necessary services
B) Unnecessary services, ports, and software
C) Secure connections
D) Critical devices

A

Answer: B) Unnecessary services, ports, and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question: Which “Failure Mode” defaults to allowing traffic when a security device fails, and is used where availability is crucial?
A) Fail-closed
B) Fail-open
C) Active
D) Passive

A

Answer: B) Fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question: True or False: An “Inline” network appliance observes traffic without direct interaction, while a “Tap/Monitor” device is part of the traffic flow and can block malicious activity.

A

Answer: False (Inline devices are part of the traffic flow and can block; Tap/Monitor devices observe without direct interaction.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question: Which network appliance filters and monitors web requests?
A) Jump Server
B) IPS/IDS
C) Load Balancer
D) Proxy Server

A

Answer: D) Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question: Which port security protocol is a network access control using EAP over Ethernet?
A) EAP
B) 802.1X
C) TLS
D) IPSec

A

Answer: B) 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question: Which firewall type protects web applications by inspecting HTTP/HTTPS traffic?
A) UTM
B) NGFW
C) WAF
D) Layer 4 Firewall

A

Answer: C) WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question: What is the purpose of a “Jump Server” in securing enterprise infrastructure?

A

Answer: A secure, intermediate host that manages access to another host in a network.

17
Q

Question: Which data type is subject to specific laws and regulations, such as personal data under GDPR or health data under HIPAA?
A) Trade Secret
B) Intellectual Property
C) Regulated Data
D) Financial Information

A

Answer: C) Regulated Data

18
Q

Question: True or False: “Public” data has no confidentiality requirements and is available to everyone.

19
Q

Question: What is “Data at rest”?

A

Answer: Stored data, such as files on a hard drive.

20
Q

Question: Which data state refers to data being actively processed or accessed?
A) Data at rest
B) Data in transit
C) Data in use
D) Data sovereignty

A

Answer: C) Data in use

21
Q

Question: What does “Data Sovereignty” refer to?

A

Answer: Digital data being subject to the laws of the country in which it’s located.

22
Q

Question: Which method to secure data involves replacing sensitive data with non-sensitive placeholders?
A) Encryption
B) Hashing
C) Masking
D) Tokenisation

A

Answer: D) Tokenisation

23
Q

Question: What is the purpose of “Obfuscation” as a data security method?

A

Answer: Deliberate act of creating source or machine code that’s difficult for humans to understand.

24
Q

Question: What is the difference between “Load balancing” and “Clustering” in ensuring high availability?

A

Answer: Load balancing distributes incoming network traffic across multiple servers to prevent overload, while clustering links multiple servers so if one fails, others take over its workload.

25
Question: Which type of backup site is fully equipped and constantly mirrored, ready to take over in case of primary site failure? A) Cold site B) Warm site C) Hot site D) Geographic dispersion
Answer: C) Hot site
26
Question: What is the benefit of "Platform Diversity" in security architecture?
Answer: Using different platforms or technologies reduces the risk of a single vulnerability or issue compromising the entire system.
27
Question: True or False: Using multiple cloud providers for redundancy is known as Multi-cloud Systems.
Answer: True
28
Question: What is a "Tabletop exercise" in the context of testing resilience and recovery strategies?
Answer: A discussion-based session where team members meet and discuss their roles during an incident and make decisions in response to a hypothetical scenario.
29
Question: What does "Recovery Time Objective (RTO)" refer to in business impact analysis?
Answer: The time within which a business process must be restored after an incident.
30
Question: Which power solution provides immediate power during short-term outages or until generators can take over? A) Generators B) Uninterruptible Power Supply (UPS) C) Power Distribution Unit (PDU) D) Mean Time to Repair (MTTR)
Answer: B) Uninterruptible Power Supply (UPS)