Domain 2 Flashcards

(66 cards)

1
Q

What is the MTD metric

A

Maximum tolerable downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is scalability

A

Capacity to increase resources to meet demand within similar cost ratios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two types of scalability

A

Scale out to add more resources in parallel
Scale up to increase power of existing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does elasticity refer to

A

The ability to handle scalability changes in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A power distribution unit is like what?

A

Like a surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Raid 0

A

Striping performance gain no redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Raid 1

A

1 disk failure redundancy in 2 disk setup
Con is low storage efficiency 50%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Raid 5

A

Min 3 disks
Striping with parity
One disk can fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Raid 6

A

Min 4 disk
Double parity
Min 4 disks
Can have 2 disks fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Raid 10 nested

A

Striped set of mirrored subgroups
Faster speeds
Each subgroup can have one failure disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Raid 50

A

Min 6 drives
Striped set of parity subgroups
Each subgroup can lose one disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multipath provides what that raid doesn’t

A

Raid deals with drive failures
Multipath deals with storage path such as bus controllers and multiple network paths to storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Geographical dispersal

A

Data replicating hot and warm sites physically distant from each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 2 1 backup rules

A

3 copies 2 different media 1 offline and 1 off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a master image

A

Copy that has os up to date, all patches, and software installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is automated build from template?

A

Build instructions for an instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does layered security provide

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What port does ldaps and ldap use?

A

Ldaps Port 636
Ldap port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is snmp v1 and v2c not secure

A

Sends community string in plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What security benefit does snmp v3 provide

A

Supports encryption and strong user based authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does tls 1.3 remove which makes it now more secure

A

Ability to downgrade to lower SSL levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In Tpm can endorsement key be changed?

A

No it cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is difference between measured boot and boot attestation

A

Measured boot measures boot process to report on any potential malware
Boot attestation sends a log signed by Tpm to report any issues like unsigned drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a cookie what does the httponly attribute do?

A

Prevents dom based attacks and client side scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In a cookie what does the same site attribute do
Control from where cookie may be sent protecting against request forgery attacks
26
What does hsts do in web browsers?
Prevents downgrading to http and sslstripping
27
What does content security policy csp do?
Mitigates click jacking, script injection, and other client side attacks
28
Why might you use cache control in a web app
Prevent caching attacks, make sure sensitive data isn't stored
29
What are the forms of execution control
Allow and block list
30
What are the two available execution control options in Linux
Apparmor and selinux through Linux security modules
31
What is a bastion host
In a dmz running minimal services to reduce attack service
32
What is north south traffic
Refers to traffic coming in and out of data center
33
What is east west
Traffic between devices in network like servers
34
What does affinity and persistence do in load balancing
Keep connections connected to a specific web server Affinity is layer 4 based on ip port Persistence is based on cookie layer 7
35
What is latency
Time it takes transmission to reach recipient measured in ms
36
What is jitter
Variation in delay or inconsistent rate of packet delivery
37
What is a forward proxy?
Provides for protocol specific outbound traffic
38
Non transparent proxy
Client must be configured with proxy info to use
39
Transparent proxy and where is it usually setup ?
Intercepts client traffic without client configuration. Usually setup on router, switch, or some other inline device
40
Reverse proxy server
Protects servers from direct contact with client requests
41
What is static dynamic source nat
1 to 1 translation public to private ip
42
What is overloaded nat/napt/pat
Lots of private ips mapped to single public ip
43
What is one of the core features of a hids?
Fim file integrity monitoring
44
What does IPsec provide ?
Confidentiality by encrypting packets and integrity antireplay by signing each packet
45
Why isn't IPsec ah used that often ?
Doesn't provide confidentiality since payload isn't encrypted, also fails in nat environments due to ip header fields in icv
46
What are features of IPsec esp
Provides confidentiality and integrity. Can be used to encrypt packet
47
What two modes can IPsec be used in and what do they do?
Transport mode used to secure communications between hosts esp doesn't encrypt ip header but ah can be used to do that Tunnel mode used for communications between vpn gateways esp can encrypt whole packet
48
What does ike do in ipsec
Handles authentication and key exchange referred to as security associations
49
What is big difference between ike v1 and v2
Version 1 for clients you still had to use something like l2tp but version 2 has added features where you can just use it to gain access to internal network resources
50
Each wap is identified by it's Mac address which is also called what ?
Basic service set identifier
51
What technology has replaced wps in wifi
Easy connect using keys and qr codes
52
Eap defines framework for negotiating what
Authentication methods like smart cards
53
What security feature does a docker namespace provide
Prevent one container from reading or writing processes in another container
54
What security feature does a docker control group provide
Ensures one container can't overwhelm others in an attack such as dos
55
In the cloud what does a resource policy do?
Acts as ACL for an object
56
What is a transit gateway in cloud computing ?
Allows vpc subnets and vpn gateways to talk to each other
57
Which 3 ways can casbs be implemented ?
Forward proxy Reverse proxy API
58
The comman name in certificate was replaced with what
San subject alternative name
59
What are the two different types of validations for certificate requests
Domain and extended validation
60
Extended validation doesn't allow you to get what kind of certificate
Wildcard cert
61
What is escrow key storage in pki
Third party storing those keys
62
What is m of n control in pki
Means only m of the total n authorized users should be present to access the key
63
What is ocsp stapling
Web server caches ocsp response and provides it to clients
64
What is certificate pinning
A way for clients to bypass ca hierarchy and chain of trust to minimize mitm attacks when inspecting certificate
65
What is a pkcs 12 file
Allows export of private key with cert. Can be protected with password and in a binary format like pfx
66
What is the pkb 7 format in pki. Where is it usually used in?
Uses pkcs #7 allows to combine multiple certificate in a file such as chain. Usually used in s/mime to encrypt emails