text
stringlengths 0
108
|
---|
repository. Since there are two keys, PGP uses asymmetric key encryption, sometimes |
known as public key encryption. |
Chapter 14: Security Architecture |
and聽Design |
1. B. The Biba security model covers data integrity. While other models cover confidentiality, |
none of them cover availability. |
2. D. An n-tier application, sometimes called a multitier application, can have as many tiers |
as necessary. While you may think there are three, there could be more tiers than that, |
depending on how the application is designed. |
3. C. JavaScript Object Notation (JSON) uses keys and values to store data. While you could |
theoretically represent a relational database in JSON, it wouldn鈥檛 be the most efficient. SQL |
is a language used to query relational databases, and document-based databases may be |
more likely to use other document types to store data. |
4. C. The NIST cybersecurity framework specifies five functions: identify, protect, detect, |
response, recover. |
5. C. The ISO 27001 specification takes a different approach than NIST鈥檚 cybersecurity |
framework. ISO 27001 specifies Plan, Do, Act, Check, which is four steps. |
6. A. The highest level of classification used by the US government is top secret. Confidential |
and restricted are lower levels, and eyes only is not a classification used by the U.S. |
government. |
7. D. Micro Channel architecture is a specification for peripherals to interact with hardware |
systems that was proposed and implemented by IBM in the 1990s. Service-oriented |
architecture is an older concept that has been revived, to a degree, by microservices. The |
other answers are not things that exist. |
8. C. Infrastructure as a service is a cloud-based offering where companies may just acquire |
servers they can use for their infrastructure. Service oriented is a way of potentially |
designing applications. Everything in AWS is virtualized. This leaves serverless. Lambda |
functions don鈥檛 require the provisioning of servers to support them. All processing of the |
function and its data is handled by AWS infrastructure. |
9. C. The Clark-Wilson Integrity Model specifies Constrained Data Items (CDIs) and |
Unconstrained Data Items (UDIs) that are used when identifying and implementing rules. |
The other answers either don鈥檛 exist or refer to things that are not related to information |
security. |
10. D. Emulation is where applications may be run on a processor they were not compiled |
for so the operation codes are emulated. AWS is Amazon Web Services, which can |
offer application virtualization services but is not a type of application virtualization. |
Paravirtualization is partial virtualization. Containers are a way of isolating applications |
without using full virtual machines on a hypervisor. |
11. A. The Five Functions designated by NIST are Identify, Protect, Detect, Respond, and |
Recover. You can鈥檛 do any of the other functions until you have been through Identify, |
which defines business needs and essential assets for the business. |
12. D. Commonly, you will see the following in an n-tier application design as core features: |
browser, application server, database server. There may also be security functions and load |
balancers as well as a web server in front of the application server. When you focus just on |
the core, though, the application server is in the middle of the architecture. |
13. B. MongoDB is a NoSQL server that is not relational. SQL Server is ambiguous but could |
refer to Microsoft SQL Server, which is not open-source. Oracle is a company that owns |
relational database servers, including MySQL, but only MySQL is open-source. |
14. C. The Bell-LaPadula Simple Security Property says a subject cannot read an object at a |
higher level than the subject. None of the other answers are correct. |
15. D. Some of the answers here mingle the five functions from NIST with the phases of the |
ISO 27001 cycle. The only option that has only ISO 27001 phases is D, and those are Plan, |
Do, Check, and Act. |