click below
click below
Normal Size Small Size show me how
Sec+ Domain 3
Questions and definitions from the Sec+ Security Archtecture section
| Question | Answer |
|---|---|
| What is the shared responsibility model in cloud security? | Defines security responsibilities between the cloud provider and the customer. |
| What are hybrid cloud considerations? | Security challenges in environments combining on-premises and cloud infrastructure. |
| What are the risks associated with third-party cloud vendors? | Data security, compliance, vendor lock-in, lack of direct control. |
| What is Infrastructure as Code (IaC)? | Automating infrastructure deployment using scripts/configuration files instead of manual configuration. |
| What is serverless computing? | A cloud model where the provider manages infrastructure, and developers only focus on code execution. |
| What is a microservices architecture? | An application model where services are small, independent, and communicate via APIs. |
| What is an air-gapped network? | A network physically isolated from external connections for security purposes. |
| What is software-defined networking (SDN)? | A network approach that decouples control from hardware to improve flexibility and security. |
| What is the difference between centralized and decentralized networks? | Centralized: Managed from one point; Decentralized: Control distributed across multiple nodes. |
| What is containerization? | A virtualization method where applications run in isolated environments (e.g., Docker, Kubernetes). |
| What is the primary security concern for IoT devices? | Lack of security updates, weak credentials, and exposure to cyber threats. |
| What is a Real-Time Operating System (RTOS)? | A system designed for real-time applications, often used in embedded devices. |
| Q: What is high availability? | Ensuring systems remain operational through redundancy and failover mechanisms. |
| What is an attack surface? | The total sum of vulnerabilities in a system that an attacker can exploit. |
| What is fail-open vs. fail-closed? | Fail-open: Security control allows access upon failure; Fail-closed: Security control blocks access when failing. |
| What is a jump server? | A hardened intermediary system used for secure remote management. |
| What is the difference between IDS and IPS? | IDS detects intrusions; IPS prevents them by blocking malicious traffic. |
| What does a load balancer do? | Distributes network traffic across multiple servers to prevent overload. |
| What is 802.1X? | A network access control protocol ensuring only authenticated devices can connect. |
| What is a Web Application Firewall (WAF)? | A firewall designed to protect web applications from attacks like SQL injection and cross-site scripting. |
| What is the purpose of a VPN? | To create an encrypted connection over the internet for secure remote access. |
| What is Transport Layer Security (TLS)? | A protocol that encrypts data in transit to prevent interception. |
| What is Secure Access Service Edge (SASE)? | A security model that integrates SD-WAN and cloud security services. |
| What are regulated data types? | Data subject to compliance requirements (e.g., GDPR, HIPAA). |
| What is intellectual property (IP)? | Legally protected information such as patents, copyrights, and trade secrets. |
| What is the difference between data at rest, data in transit, and data in use? | Data at rest: Stored data; Data in transit: Data moving over networks; Data in use: Actively processed data. |
| What is data sovereignty? | Laws governing data based on where it is physically stored. |
| What is encryption? | The process of converting data into a secure format to prevent unauthorized access. |
| What is hashing? | A one-way function that converts data into a fixed-length string to verify integrity. |
| What is data masking? | Hiding sensitive data using placeholders to protect it from unauthorized access. |
| What is tokenization? | Replacing sensitive data with unique identification symbols. |
| What is obfuscation? | The process of making data or code harder to read for security purposes. |
| What is segmentation in security? | Dividing networks into isolated sections to limit access and prevent lateral movement. |
| What is the difference between load balancing and clustering? | Load balancing distributes traffic; clustering combines multiple servers to act as one system. |
| What is a hot site? | A fully functional backup location that can take over operations immediately in case of failure. |
| What is a cold site? | A backup site with infrastructure but no active systems, requiring setup before use. |
| What is a warm site? | A backup site with partially configured systems that require some setup before activation. |
| What is platform diversity in security? | Using different operating systems and hardware to reduce vulnerability to specific attacks. |
| What is multi-cloud security? | Implementing security controls across multiple cloud providers to reduce risk. |
| What is continuity of operations planning? | A strategy ensuring business operations can continue during and after a disruption. |
| What is capacity planning? | Assessing resource requirements to ensure system performance during peak demand or failures. |
| What is the purpose of security testing? | To identify vulnerabilities and assess the effectiveness of security controls. |
| What is a tabletop exercise? | A discussion-based simulation of a security incident response plan. |
| What is failover testing? | Switching from a primary system to a backup system to ensure resilience. |
| What is a backup? | A copy of data stored separately to allow recovery after data loss. |
| What is the difference between onsite and offsite backups? | Onsite: Stored locally; Offsite: Stored in a separate physical or cloud location. |
| What is data replication? | The process of copying data to multiple locations for redundancy. |
| What is journaling in data backup? | A method of keeping a log of transactions to recover from a system crash. |
| What is an uninterruptible power supply (UPS)? | A battery backup that provides temporary power during outages. |
| What is the purpose of a generator in security architecture? | Provides emergency power in case of an extended outage. |