Explain Important System and Network Architecture Concepts Flashcards

1
Q

System Hardening

A

A process of making a host or app configuration secure by reducing its attack surface, through running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Containers

A

An operating system virtualization deployment containing everything required to run a service, application, or microservice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Microservices

A

A software architecture where components of the solution are conceived as highly decoupled services not dependent on a single platform type or technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application Virtualization

A

A software delivery model where the code runs a server and is streamed to a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Serverless

A

A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual Private Cloud(VPC)

A

A private network segment made available to a single cloud consumer on a public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software-Defined Networking(SDN)

A

APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Access Service Edge(SASE)

A

A networking and security architecture that provides secure access to cloud applications and services while reducing complexity. It combines security services like firewalls, identity and access management, and secure web gateway with networking services such as SD-WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Out-of-Band Mechanisms

A

Use of a communication channel that is different than the one currently being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In-band Authentication

A

Use of a communication channel that is the same as the one currently being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Single Sign-On(SSO)

A

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privileged Access Management(PAM)

A

Policies, procedures, and support software for managing accounts and credentials with administrative permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Federation

A

A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OpenID

A

An identity federation method that enables users to be authenticated on cooperating websites by a third-party authentication service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Assertion Markup Language(SAML)

A

An XML-based data format used to exchange authentication information between a client and a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Simple Object Access Protocol(SOAP)

A

An XML-based web services protocol that is used to exchange messages.

17
Q

Cloud Access Security Broker(CASB)

A

Enterprise management software designed to mediate access to cloud services by users across all types of devices.

18
Q

Forward Proxy

A

A server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.

19
Q

Reverse Proxy

A

A type of proxy server that protects servers from direct contact with client requests.

20
Q

Data Loss Prevention(DLP)

A

A software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks.

21
Q

Personally Identifiable Information(PII)

A

Data that can be used to identify or contact an individual (or, in the case of identity theft, to impersonate them).

22
Q

Protected Health Information(PHI)

A

Data that can be used to identify an individual and includes information about past, present, or future health, as well as related payments and data used in the operation of a healthcare business.

23
Q

Personal Identifiable Financial Information(PIFI)

A

Personal information about a consumer provided to a financial institution that can include account number, credit/debit card number, name, social security number and other information.

24
Q

Cardholder Data(CHD)

A

Any type of personally identifiable information (PII) associated with a person who has a payment card, such as a credit or debit card.

25
Q

Intellectual Property(IP)

A

Data that is of commercial value and can be granted rights of ownership, such as copyrights, patents, and trademarks.

26
Q

Public Key Infrastructure(PKI)

A

Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

27
Q

Secure Socket Layer(SSL)

A

The original, obsolete version of the security protocol now developed as TLS.

28
Q
A