Módulo 10 - Protocol, App and Cloud Security Flashcards

(145 cards)

1
Q

List:
Components of virtualization

A
  1. Physical machine (host OS)
  2. Virtual machine (guest OS)
  3. Virtual hard disk (VHD)
  4. Hypervisor
  5. Containerization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List:
Advantages of virtualization

A
  1. Flexibility
  2. Security
  3. Testing
  4. Server consolidation
  5. Isolation (sandboxing)
  6. Application virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List:
Disadvantages of virtualization

A
  1. Security issues
  2. Bottleneck
  3. Complexity
  4. Server sprawl
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List:
Load balancing methods in virtualization

A
  1. Resource pooling
  2. Workload balancing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define:
Virtualization

A

The process of installing and running multiple operating systems concurrently on a single physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define:
Virtual machine (VM)

A

A software implementation of a computer that executes programs like a physical machine, also known as a guest operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define:
Hypervisor

A

A thin layer of software allowing virtual machines to interact with hardware without using the host OS. Types include Type I (bare-metal) and Type II (hosted).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define:
Containerization

A

A virtualization method enforcing resource separation at the OS level by creating isolated containers for applications or OS distributions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define:
VM escape

A

A vulnerability where an attacker breaks out of a VM’s isolated environment and gains access to the host system or other VMs on the same host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define:
Resource pooling (in virtualization)

A

Creating shared logical pools of CPU and memory resources from multiple physical machines within the hypervisor to allocate resources to VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:
Sandboxing

A

Isolating a virtual machine from the network to test applications, updates, or malware without risking production environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define:
Load balancing

A

A technique that distributes workloads across multiple resources to improve performance, ensure high availability, and provide fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define:
Server sprawl

A

A condition where managing a large number of virtual machines delays patching and security updates, increasing administrative complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Acronym:
VHD

A

Virtual Hard Disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List:
Important facts about virtual networks

A
  1. Virtual machines support unlimited virtual networks.
  2. Multiple virtual networks can share a single physical network adapter.
  3. Network configuration depends on host OS and physical hardware.
  4. Resources are partitioned into virtual devices with defined capacities.
  5. Bandwidth is split into independently secured channels.
  6. Virtual DHCP server assigns IPs to virtual machines.
  7. OS on virtual machines must be network-configured.
  8. Internal network virtualization uses software to emulate a network.
  9. External network virtualization combines or segments LANs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List:
Network virtualization service providers

A
  1. VMware
  2. Microsoft
  3. Citrix
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List:
Virtual networking terms

A
  1. Virtual local area network (VLAN)
  2. Virtual area network (VAN)
  3. Virtual private network (VPN)
  4. Virtual machine (VM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List:
Virtual networking devices

A
  1. Virtual switch (vSwitch)
  2. Virtual router (vRouter)
  3. Virtual firewall appliance (VFA)
  4. Virtual machine monitor/hypervisor (VMM/hypervisor)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define:
Virtual network

A

A network comprising virtual and physical devices, enabling efficient deployment and management of network services and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define:
Virtual switch (vSwitch)

A

Software that facilitates communication between virtual machines by checking data packets before forwarding them to a destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define:
Virtual router (vRouter)

A

A software-based function replicating a physical router, providing flexibility to move routing functions within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define:
Virtual firewall appliance (VFA)

A

Software acting as a network firewall, providing packet filtering and monitoring for virtual environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define:
Virtual local area network (VLAN)

A

A logical partitioning of a physical LAN, enabling several physical LANs to function as a single network or vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define:
Virtual area network (VAN)

A

A virtual LAN running on a physical LAN, enabling communication between guest virtual machines on separate physical hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Define: Virtual private network (VPN)
A secure tunnel over another network, connecting multiple remote endpoints, with multipoint VPNs connecting more than two endpoints.
26
Define: Hypervisor
Software, firmware, or hardware creating and running virtual machines by managing the virtual platform and guest OS execution.
27
Define: Internal network virtualization
The use of software containers or pseudo-interfaces to emulate a physical network, improving efficiency by isolating applications.
28
Define: External network virtualization
The combination or segmentation of LANs to create virtual networks, improving efficiency and flexibility across large networks.
29
Acronym: VLAN
Virtual Local Area Network
30
Acronym: VAN
Virtual Area Network
31
Acronym: VPN
Virtual Private Network
32
Acronym: VMM
Virtual Machine Monitor
33
List: Characteristics of cloud computing
1. Delivery of common business applications via web services 2. Connection over the internet or a LAN 3. No end-user knowledge of physical infrastructure needed
34
List: Types of clouds
1. Public cloud 2. Private cloud 3. Community cloud 4. Hybrid cloud
35
List: Cloud computing service models
1. Infrastructure as a Service (IaaS) 2. Platform as a Service (PaaS) 3. Software as a Service (SaaS) 4. Security as a Service (SECaaS)
36
List: Cloud security risk reduction actions
1. Zero Trust 2. Cloud Access Security Broker (CASB) 3. Segregate centrally stored data 4. Patches Mamagemnt 5. Service management 6. Security monitoring 7. Encryption 8. Penetration testing 9. Comply with regulatory measures
37
List: Advantages of Virtual Desktop Infrastructure (VDI)
1. Workstation hardware costs 2. Centralized data protection and backup 3. Remote access 4. Fast snapshots deploy 5. No lost devices
38
Define: Cloud computing
The provision of software, data access, computation, and storage services via the internet without requiring end-user knowledge of physical infrastructure.
39
Define: Public cloud
A cloud accessible by anyone, with resources made available by a service provider, often for free or with a fee.
40
Define: Private cloud
A cloud restricted to a single organization, hosted internally or by a third party, with secure, exclusive access to resources.
41
Define: Hybrid cloud
A combination of public, private, and community cloud resources, integrating their functionalities.
42
Define: Security as a Service (SECaaS)
A cloud model providing security services such as authentication, anti-virus, intrusion detection, and penetration testing, integrated into a corporate infrastructure.
43
Define: Cloud Access Security Broker (CASB)
A tool or service ensuring communication and access to cloud services comply with organizational security policies and procedures.
44
Define: Attack surface
All points at which a malicious threat actor could attempt to exploit vulnerabilities in a system.
45
Define: Supply chain attack
An attack where a threat actor infiltrates a target indirectly through vulnerabilities in its supply chain, such as cloud service providers or hardware vendors.
46
Define: Virtual Desktop Infrastructure (VDI)
A virtualization method hosting user desktops on data center hardware, allowing access via thin clients with enhanced security and flexibility.
47
Acronym: IaaS
Infrastructure as a Service
48
Acronym: PaaS
Platform as a Service
49
Acronym: SaaS
Software as a Service
50
Acronym: SECaaS
Security as a Service
51
Acronym: CASB
Cloud Access Security Broker
52
List: Measures for securing cloud storage
1. Implement security controls like in physical datacenters 2. Use data classification policies 3. Assign information to storage, handling, and access categories 4. Assign security classifications based on sensitivity and criticality 5. Use tools to securely dispose of data when no longer needed
53
List: Advantages of cloud storage
1. Pay only for storage used 2. Cuts energy consumption by up to 70% 3. Offers off-premises, on-premises, or hybrid storage options 4. Provides intrinsic storage availability and data protection 5. Shifts storage maintenance tasks to the provider 6. Allows VM image transfer between cloud and on-premises locations 7. Serves as a natural disaster backup with globally distributed servers
54
Define: Cloud storage
A data storage model provided by a third party as a service, utilizing distributed resources to offer redundancy, durability, and scalability.
55
Define: Cloud Access Security Broker (CASB)
A gatekeeper that enforces security policies on cloud storage, focusing on visibility, compliance, access control, encryption, and loss prevention.
56
Define: Federated storage cloud architecture
A cloud storage design where distributed resources act as one unified system for redundancy and fault tolerance.
57
Define: Object storage architecture
A cloud storage system with intrinsic availability and data protection, ideal for reducing costs and effort in managing availability and recovery.
58
List: Mobile device connection types
1. Cellular 2. WiFi 3. Bluetooth 4. NFC 5. ANT 6. Infrared 7. USB 8. SATCOM (satellite)
59
List: Mobile device security considerations
1. Device content management 2. Remote wipe 3. Geofencing 4. Geolocation management 5. Screen lock with passwords 6. Push notification management 7. Password storage and management 8. Biometrics 9. Full device encryption
60
List: Application management considerations
1. Rooting/jailbreaking/sideloading 2. Flashing custom firmware 3. Carrier unlocking 4. OTA firmware and app updates 5. Camera usage and geolocation in pictures 6. SMS/MMS protocols 7. Connection to external media 8. USB OTG 9. Microphone usage for recording 10. Tethering
61
List: Security mechanisms for iOS apps
1. Sandboxed apps 2. Digital signatures from Apple or certified third parties 3. Encryption APIs for app data (AES, RC4, 3DES)
62
List: Security mechanisms for Windows RT apps
1. Modules must be digitally signed by Microsoft 2. Anti-buffer-overflow memory restrictions 3. Data Execution Prevention (DEP) 4. Address Space Layout Randomization (ASLR) 5. SafeSEH and sacrificial canary values
63
List: Best practices for mobile app security
1. Use apps only from reputable sources 2. Avoid jailbreaking or sideloading apps 3. Use app whitelisting via MDM solutions
64
Define: Geofencing
Restricting a mobile device to a particular geographical area.
65
Define: Credential managemen
The ability to store usernames and passwords for various resources, enabling automatic login to network resources or websites.
66
Define: App whitelisting
The process of defining specific apps that are allowed on a device, often enforced using mobile device management (MDM) solutions.
67
Define: Geo-tagging
The embedding of GPS coordinates within files, such as images or videos, which can pose privacy and security risks.
68
Define: Sideloading
The process of installing apps from third-party app stores or websites instead of official app stores.
69
Acronym: NFC
Near Field Communication
70
Acronym: ANT
Adaptive Network Topology
71
Acronym: MDM
Mobile Device Management
72
Acronym: OTA
Over-the-Air
73
List: Mobile device security settings options
1. Manually configure security settings on each device 2. Distribute security settings via configuration profiles for iOS 3. Use an MDM solution to push security policies over a network
74
List: Operating systems supported by Windows Intune
1. Apple iOS 8.0 and later 2. Mac OS X 10.9 and later 3. Windows > 8.1 4. Google Android 4.0
75
List: Windows Intune configurations
1. Intune Standalone (cloud-only) 2. Hybrid MDM with Configuration Manager
76
List: Windows Intune management portals
1. Account Portal 2. Admin Portal 3. Company Portal
77
List: Tasks for configuring Windows Intune
1. Add Intune users 2. Define Intune policies 3. Manage users and groups 4. Enroll computers 5. Enroll mobile devices
78
Define: Windows Intune
A cloud-based MDM solution from Microsoft that enables remote management and security for mobile devices and Windows systems.
79
Define: Intune Standalone
A cloud-only deployment of Windows Intune managed via a web console accessible over the internet.
80
Define: Hybrid MDM with Configuration Manager
A deployment combining Windows Intune's MDM capabilities with Configuration Manager for content and device administration.
81
Define: Apple Push Notification Service (APNs)
A service required for managing iOS devices through MDM solutions, enabling notifications and enrollment actions.
82
Acronym: MDM
Mobile Device Management
83
Acronym: APNs
Apple Push Notification Service
84
Acronym: EMS
Enterprise Management + Security
85
List: Functions of Mobile Device Management (MDM)
1. Track the device 2. Push apps and updates 3. Manage security settings (e.g., lock screens, passwords) 4. Remotely wipe the device
86
List: Functions of Mobile Application Management (MAM)
1. Install and uninstall apps remotely 2. Update apps as needed 3. Limit app functionality as needed
87
List: Device types managed by Unified Endpoint Management (UEM)
1. Workstations 2. Printers 3. Mobile devices 4. IoT devices 5. Wearable devices
88
List: Phases in the Intune Application Life Cycle
1. Add 2. Deploy 3. Configure 4. Protect 5. Retire
89
List: App deployment and update methods
1. App catalog 2. Self-service portal 3. Remote management
90
Define: Mobile Device Management (MDM)
A solution that allows IT administrators to remotely manage and enforce policies on mobile devices, focusing on the device itself.
91
Define: Mobile Application Management (MAM)
A solution that manages applications on mobile devices, enabling control over app installation, updates, and functionality.
92
Define: Enterprise Mobility Management (EMM)
A solution combining MDM and MAM to manage both device hardware and applications, addressing challenges of diverse device ecosystems.
93
Define: Unified Endpoint Management (UEM)
A comprehensive solution that combines traditional device management and enterprise mobility management to manage all endpoint types in a single system.
94
Define: App catalog
A method that defines the apps users can and cannot use, assigning apps to users or devices via groups for streamlined management.
95
Define: MAM-WE
A Mobile Application Management configuration allowing app and data protection on devices enrolled with third-party EMM providers.
96
Define: Conditional access (in Intune)
Access control based on app protection policies, restricting user actions like copying data or installing apps on rooted devices.
97
Acronym: MAM
Mobile Application Management
98
Acronym: EMM
Enterprise Mobility Management
99
Acronym: UEM
Unified Endpoint Management
100
Acronym: MAM-WE
Mobile Application Management Without Enrollment
101
List: BYOD security issues
1. Malware propagation 2. Loss of sensitive data control 3. Malicious insider attacks 4. Device management 5. Support responsibilities
102
List: Deployment model alternatives to BYOD
1. Corporate-owned device 2. Corporate-owned, personally enabled (COPE) 3. Choose your own device (CYOD) 4. Virtual desktop infrastructure (VDI)
103
Define: Malware propagation (BYOD issue)
The risk of infected user devices spreading malware when connected to the organization's network.
104
Define: Loss of sensitive data control (BYOD issue)
The risk of sensitive organizational data being copied to personal devices and exposed due to weak security, theft, or malware.
105
Define: Malicious insider attacks (BYOD issue)
Threats posed by users intentionally misusing personal devices to steal or capture sensitive information.
106
Define: Device management (BYOD issue)
The challenge of defining responsibility for updates, anti-malware, and overall maintenance of personal devices used on-site.
107
Define: Support (BYOD issue)
The need to address who provides support for personal devices and apps used for organizational purposes.
108
Define: Corporate-owned device model
A strategy where the company provides devices, enabling greater control and monitoring of security while restricting usage to workplace purposes.
109
Define: Corporate-owned, personally enabled (COPE) model
A deployment model allowing employees to use company-owned devices for both corporate and personal purposes while maintaining strong security controls.
110
Define: Choose your own device (CYOD) model
A strategy offering employees a limited selection of corporate-owned devices, balancing user choice with enhanced security measures.
111
Define: Virtual desktop infrastructure (VDI)
A technology enabling mobile devices to connect to a virtualized desktop, enhancing security and data protection by processing data on central servers.
112
Acronym: BYOD
Bring Your Own Device
113
Acronym: COPE
Corporate-Owned, Personally Enabled
114
Acronym: CYOD
Choose Your Own Device
115
Acronym: VDI
Virtual Desktop Infrastructure
116
List: Common smart home appliances
1. Refrigerators 2. Dishwashers 3. Microwaves
117
List: Security steps for embedded devices
1. Regularly update firmware manually (if supported) 2. Segment the network using VLANs 3. Encrypt all network communications
118
Define: SCADA
Supervisory Control and Data Acquisition systems are specialized computers that gather, analyze, and manage industrial automation equipment.
119
Define: Real-time operating system (RTOS)"
An OS designed to serve real-time applications with strict time constraints, often critical to entire system operations.
120
Define: System on a Chip (SoC)
An integrated circuit that includes all typical computer system components, commonly used in hobbyist projects like Raspberry Pi.
121
Define: Multi-function display (MFD)
A configurable screen with buttons used to display and interact with data, commonly found on airplanes, helicopters, and ships.
122
Define: Voice over IP (VoIP)
A protocol optimized for transmitting voice data over packet-switched IP networks, allowing phone calls through the internet.
123
Define: Field Programmable Gate Array (FPGA)
An integrated circuit configured post-manufacture by the customer using a hardware description language (HDL).
124
Define: Unmanned Aerial Vehicle (UAV)
Aircraft that operate without a human pilot onboard, used for military, search and rescue, weather monitoring, and recreation.
125
Define: Arduino
An open-source hardware and software platform for building digital devices and interactive objects, featuring single-board microcontrollers.
126
Acronym: SCADA
Supervisory Control and Data Acquisition
127
Acronym: RTOS
Real-Time Operating System
128
Acronym: SoC
System on a Chip
129
Acronym: MFD
Multi-Function Display
130
Acronym: FPGA
Field Programmable Gate Array
131
Acronym: VoIP
Voice over IP"
132
List: Common email threats
1. Virus 2. Spam 3. Open SMTP relay abuse 4. Phishing
133
List: Best practices for controlling spam
1. Enable spam filters on clients and email servers 2. Enable antivirus scanning for attachments 3. Disable preview screens in email clients 4. Avoid clicking unsubscribe links in unsolicited emails 5. Install server-level anti-spam software 6. Avoid posting full email addresses on the web
134
List: Protocols for mitigating phishing and spam
1. Sender Policy Framework (SPF) 2. DomainKeys Identified Mail (DKIM) 3. Domain-based Message Authentication, Reporting & Conformance (DMARC)
135
List: Functions provided by S/MIME and PGP
1. Authentication 2. Message integrity 3. Non-repudiation through digital signatures 4. Privacy through encryption
136
Define: SPF (Sender Policy Framework)
An email authentication method that verifies the sender's IP address against a list of authorized IPs published in the DNS TXT records of the sender's domain.
137
Define: DKIM (DomainKeys Identified Mail)
A protocol that uses digital signatures to verify the integrity and authenticity of email messages by checking the signature against a DKIM record in the sender's DNS.
138
Define: DMARC (Domain-based Message Authentication, Reporting & Conformance)
A protocol that uses SPF and DKIM checks to define rules for handling emails and provides reporting on unauthorized email activity.
139
Define: S/MIME
Secure/Multipurpose Internet Mail Extensions, a protocol that uses X.509 certificates for email encryption and digital signatures to ensure authentication, integrity, and privacy.
140
Define: PGP
Pretty Good Privacy, a system for email encryption and digital signatures that uses either a web of trust or trust signatures for certificate validation.
141
Acronym: SPF
Sender Policy Framework
142
Acronym: DKIM
DomainKeys Identified Mail
143
Acronym: DMARC
Domain-based Message Authentication, Reporting & Conformance
144
Acronym: S/MIME
Secure/Multipurpose Internet Mail Extensions
145
Acronym: PGP
Pretty Good Privacy