Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Sec+ Domain 3

Questions and definitions from the Sec+ Security Archtecture section

QuestionAnswer
What is the shared responsibility model in cloud security? Defines security responsibilities between the cloud provider and the customer.
What are hybrid cloud considerations? Security challenges in environments combining on-premises and cloud infrastructure.
What are the risks associated with third-party cloud vendors? Data security, compliance, vendor lock-in, lack of direct control.
What is Infrastructure as Code (IaC)? Automating infrastructure deployment using scripts/configuration files instead of manual configuration.
What is serverless computing? A cloud model where the provider manages infrastructure, and developers only focus on code execution.
What is a microservices architecture? An application model where services are small, independent, and communicate via APIs.
What is an air-gapped network? A network physically isolated from external connections for security purposes.
What is software-defined networking (SDN)? A network approach that decouples control from hardware to improve flexibility and security.
What is the difference between centralized and decentralized networks? Centralized: Managed from one point; Decentralized: Control distributed across multiple nodes.
What is containerization? A virtualization method where applications run in isolated environments (e.g., Docker, Kubernetes).
What is the primary security concern for IoT devices? Lack of security updates, weak credentials, and exposure to cyber threats.
What is a Real-Time Operating System (RTOS)? A system designed for real-time applications, often used in embedded devices.
Q: What is high availability? Ensuring systems remain operational through redundancy and failover mechanisms.
What is an attack surface? The total sum of vulnerabilities in a system that an attacker can exploit.
What is fail-open vs. fail-closed? Fail-open: Security control allows access upon failure; Fail-closed: Security control blocks access when failing.
What is a jump server? A hardened intermediary system used for secure remote management.
What is the difference between IDS and IPS? IDS detects intrusions; IPS prevents them by blocking malicious traffic.
What does a load balancer do? Distributes network traffic across multiple servers to prevent overload.
What is 802.1X? A network access control protocol ensuring only authenticated devices can connect.
What is a Web Application Firewall (WAF)? A firewall designed to protect web applications from attacks like SQL injection and cross-site scripting.
What is the purpose of a VPN? To create an encrypted connection over the internet for secure remote access.
What is Transport Layer Security (TLS)? A protocol that encrypts data in transit to prevent interception.
What is Secure Access Service Edge (SASE)? A security model that integrates SD-WAN and cloud security services.
What are regulated data types? Data subject to compliance requirements (e.g., GDPR, HIPAA).
What is intellectual property (IP)? Legally protected information such as patents, copyrights, and trade secrets.
What is the difference between data at rest, data in transit, and data in use? Data at rest: Stored data; Data in transit: Data moving over networks; Data in use: Actively processed data.
What is data sovereignty? Laws governing data based on where it is physically stored.
What is encryption? The process of converting data into a secure format to prevent unauthorized access.
What is hashing? A one-way function that converts data into a fixed-length string to verify integrity.
What is data masking? Hiding sensitive data using placeholders to protect it from unauthorized access.
What is tokenization? Replacing sensitive data with unique identification symbols.
What is obfuscation? The process of making data or code harder to read for security purposes.
What is segmentation in security? Dividing networks into isolated sections to limit access and prevent lateral movement.
What is the difference between load balancing and clustering? Load balancing distributes traffic; clustering combines multiple servers to act as one system.
What is a hot site? A fully functional backup location that can take over operations immediately in case of failure.
What is a cold site? A backup site with infrastructure but no active systems, requiring setup before use.
What is a warm site? A backup site with partially configured systems that require some setup before activation.
What is platform diversity in security? Using different operating systems and hardware to reduce vulnerability to specific attacks.
What is multi-cloud security? Implementing security controls across multiple cloud providers to reduce risk.
What is continuity of operations planning? A strategy ensuring business operations can continue during and after a disruption.
What is capacity planning? Assessing resource requirements to ensure system performance during peak demand or failures.
What is the purpose of security testing? To identify vulnerabilities and assess the effectiveness of security controls.
What is a tabletop exercise? A discussion-based simulation of a security incident response plan.
What is failover testing? Switching from a primary system to a backup system to ensure resilience.
What is a backup? A copy of data stored separately to allow recovery after data loss.
What is the difference between onsite and offsite backups? Onsite: Stored locally; Offsite: Stored in a separate physical or cloud location.
What is data replication? The process of copying data to multiple locations for redundancy.
What is journaling in data backup? A method of keeping a log of transactions to recover from a system crash.
What is an uninterruptible power supply (UPS)? A battery backup that provides temporary power during outages.
What is the purpose of a generator in security architecture? Provides emergency power in case of an extended outage.
Created by: anapaulaseidel
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards