Sec + 5 Flashcards

(35 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Responsibility matrix

A

Outline of shared responsibility between clients and cloud provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IaC benefits

A

Efficiency
Consistency and reproducibility
Easy version control
Many providers and tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is BaaS?

A

Backend as a service. Server less computing where backend services such as databases, authentication, and file storage are provided by CSP as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Microservices benefits.

A

Agility
Scalability
Faster development
Easy maintenance
Improved fault tolerance
Decomposition
Independence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 7 essential security devices

A

WAF (web application firewall)
NIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 4 essential security device

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 3 essential security devices

A

Router/subnets
Layer 3 switch for vlans and subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 2 essential security device

A

Switch/LAN
WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are virtual networks created?

A

Software on a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a thin client?

A

Device where only mouse clicks and keyboard inputs are exchanged with VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SCADA?

A

Supervisory control and data acquisition. Sophisticated industrial control system (ICS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a RTOS?

A

Real-time operating system. OS where exact timing is essential like navigation systems or light control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Infrastructure considerations.

A

Availability
Resilience
Cost
Responsiveness
Scalability
Ease of deployment
Risk transference
Ease of recovery
Patch availability
Power
Compute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a sensor?

A

It detects and analyzes unusual network behavior. Used by IDSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SASE?

A

Security access Service edge. Cloud based it model that consolidates networking and security functions into a single service.

17
Q

What type of data is a NDA?

A

Trade secret.

18
Q

What is a failover?

A

Seamless switch to the backup

19
Q

What is puppet forge?

A

Versitle agnostic platform of pre-built modules and configs to set up a secure baseline across a range of systems

20
Q

What is tethering?

A

Basically hot spots

21
Q

What is a shared secret?

A

Shared kerberos password used by RADIUS

22
Q

What is WPA2 CCMP used for?

23
Q

What is secure erase?

A

Issued to storage media. Triggers process of permanent data removal

24
Q

What is CVE?

A

Common vulnerabilities and exposures list

25
What is the CISA?
Cybersrcurity and infrastructure security agency. Threat feeds from govt.
26
What is structured threat information expression (STIX)?
Standard language and format for representing threat info. By MITRE
27
What is TAXII?
Companion to STIX to automatically exchange threat info
28
What is TTP'S?
Tactics, techniques, and procedures
29
What is SNMP?
Simple network monitoring protocol. Monitors network devices Uses agents to monitor Managers to control agents Traps to send info on threats Uses MI, management information base, databases for SNMP
30
What is anomaly/heuristic detection?
Look at behaviors and deviations and not only signatures
31
Os hardening
Updates User access control UAC Minimize attack surfaces Strong authentication Principal of least privilege Firewall Encryption Logs Patches Educate users Back ups Disaster recovery plan
32
What should go on port 22?
Ssh Scp-secured copy protocol to unix/linux Sftp-secure file transfer protocol
33
What should go on port 53?
Dns
34
What should go on port 162?
Simple network management protocol 3.
35
What should go on port 443?
Https