Domain 3

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 20

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

21 Terms

1

What are the four cloud service models mentioned in Chapter 1?

SaaS, PaaS, IaaS, and On-Prem.

New cards
2

What does Infrastructure as Code (IaC) allow users to do?

It defines servers, networks, and applications as code, allowing for modification and versioning.

New cards
3

What is Function as a Service (FaaS)?

A serverless architecture where applications are split into individual functions.

New cards
4

What is the difference between centralized and decentralized network infrastructures?

Centralized systems concentrate operations in one location, while decentralized systems distribute them across various locations.

New cards
5

What is the purpose of a Load Balancer?

It distributes incoming traffic evenly across multiple servers.

New cards
6

What is an Active Monitoring system?

A system that is connected inline and uses Intrusion Prevention Systems (IPS) for real-time monitoring.

New cards
7

What does the acronym SIEM stand for?

Security Information and Event Management.

New cards
8

What are the two types of failures in failure modes?

Fail open and fail close.

New cards
9

What is the role of a Proxy Server?

It sits in the middle of a conversation, making requests and validating responses to ensure they are not malicious.

New cards
10

What is Network Level Encryption?

Encryption methods that include IPsec tunnels and VPN connections.

New cards
11

What is an Air-Gapped network?

A network that is physically isolated, preventing any wireless or wired connections for data theft.

New cards
12

What does the Extensible Authentication Protocol (EAP) manage?

Authentication processes on networks with wireless access points like 802.1x.

New cards
13

What are Microservices?

An architectural style that breaks an application into a collection of small, independent services.

New cards
14

What are the three separate planes in Software Defined Networking (SDN)?

Data plane, control plane, and management plane.

New cards
15

What is the function of an Intrusion Prevention System (IPS)?

To stop malicious traffic before it enters the network.

New cards
16

What is meant by 'Network based firewall'?

A firewall that filters traffic based on port number or application at layer 4 of the OSI model.

New cards
17

What is the key benefit of using Infrastructure as Code (IaC)?

It allows for efficiency, consistency, and version control through machine-readable definitions.

New cards
18

What enables the Cloud Service Provider (CSP) to manage resources in Serverless computing?

The CSP dynamically manages the allocation of resources without user provision.

New cards
19

What is the key purpose of Industrial Control Systems (ICS) or SCADA?

To monitor, manage, and control industrial processes.

New cards
20

What does 'Mean Time to Repair (MTTR)' refer to?

The amount of time it takes to replace unavailable resources with available ones.

New cards
21

What is Containerization in computing?

The encapsulation of an application along with its dependencies in a container that can run in any environment.

New cards
robot