Hosts, Storage, Networks, Apps in the Enterprise Architecture
Cloud and Virtualization in the Enterprise Architecture
Authentication and Authorization in the Enterprise
Cryptography
Communication and Collaboration Solutions
100

Redundancy and fault tolerance support this part of the CIA triad.

What is Availability?

100

This type of hypervisor runs within a conventional operation system environment and is also known as a Hosted hypervisor.

What is Type 2?

100

This remote access protocol provides centralized authentication and authorization, and was succeeded by DIAMETER.

What is RADIUS?

100

This type of digital certificate is cheap and easy to deploy for a company with multiple domains, but if compromised could result in compromising those domain servers.

What is a wildcard certificate?

100

This social engineering attack targets personnel who are assumed to have access to significant amounts of data, such as C-level executives.

What is Whaling?

200

Of In-house Developed, Commercial, Tailored Commercial, and Open Source, this software type is usually considered to have the most flexibility.

What is Open Source?

200
If a company is migrating from public to private cloud systems and is using both simultaneously as a result, they are using this deployment model.

What is Hybrid cloud?

200

This biometric scan is considered the most intrusive of all physiological systems.

What is a Retina scan?

200

The current government symmetric encryption standard, AES requires this block size.

What is 128?

200

This unsecure email protocol allows clients to download copies of their messages to multiple devices.

What is IMAP4?

300

Running this type of application in a virtual environment is one way to ensure its interoperability with current systems, despite its age.

What is Legacy?

300

This occurs when the attacker breaks out of their VM environment and can affect other VMs or even the physical server.

What is VMEscape?

300

Security questions that ask for information such as mother's maiden name and high school mascot fall into this category of password.

What is a Cognitive Password?

300

Cryptocurrency such as Bitcoin uses this process where data is verified and added to a ledger, providing public proof of transaction.

What is blockchain?

300

If RDP is to be used only inside the corporate LAN, this port number should be blocked on the perimeter firewalls.

What is 3389?

400

When data from multiple sources is aggregated, it can lead to this type of attack where someone can piece together information they should not be able to access.

What is (data) inference?

400

This cloud service model lets customers deploy applications they created or acquired onto the cloud infrastructure.  They do not manage or control the underlying operating system.

What is Platform as a Service (PaaS)?

400

This standard implements centralized SSO via a Key Distribution Center in a corporate network.

What is Kerberos?

400

Alice sends a message to Bob and wants to make sure that Bob can verify it came from her.  Both possess key pairs.  What TWO keys are used in the encryption and decryption processes?

What are Alice's private and public keys?

400

Given the various concerns over cloud-based storage, this is the best way to ensure that data your company sends to the cloud is well-protected and confidential.

What is encrypting the data before uploading to the cloud?

500

This term refers to widely adopted standards that have not been FORMALLY adopted.

What is De Facto?

500

Some devices such as those with Apple's Touch ID have this feature that handles sensitive cryptographic operations, has a separate processor, and boots separately from the rest of the device.

What is a Secure Enclave?

500

This authorization standard is best used when an application accesses another app's API on behalf of the user, but should only have restricted access to that user's data.

What is OAuth?

500

This is an alternative to the typical OCSP scenario where the server provides a time-stamped OCSP response to any visiting clients to prove its identity.

What is stapling (OCSP stapling)?

500

This protocol features encryption and anti-replay capabilities while delivering audio and video over IP networks.

What is Secure Real-Time Protocol (SRTP)?

M
e
n
u