A. The correct answer is Symmetric encryption is faster to run.
Symmetric cryptography is faster to run (in terms of both encryption and decryption) because the keys used are much shorter than they are in asymmetric cryptography. Additionally, the fact that only one key gets used (versus two for asymmetric cryptography) also makes the entire process faster.
C. The correct answer is SaaS. Software as a service (SaaS) is a
cloud-based software delivery model in which the cloud provider develops and maintains cloud application software, provides automatic software updates, and makes software available to its customers via the internet on a pay-as-you-go basis.
D. The correct answer is Fake telemetry. Telemetry is the
automated communication processes from multiple data sources. Telemetry data is used to improve customer experiences, monitor security, application health, quality, and performance. When monitoring an application to ensure acceptable uptime and performance for your users, you need to start with the components. This includes the physical servers themselves and, to start, their overall availability
A. The correct answer is Hot aisle and cold aisle. Hot / cold aisle is a layout design for server racks in a data center. The goal of it is to increase the effectiveness of the cooling system by managing air flow in the data center.
In the simplest form, this design involves lining up server racks in different rows with cold air facing one way and hot exhausts facing the other. Typically, cold aisles, which are usually composed of rack fronts, face AC output, and hot aisles face return ducts
D. The correct answer is Stored procedures. A stored procedure provides an important layer of security between the user interface and the database. It supports security through data access controls because end users may enter or change data, but do not write procedures. A stored procedure preserves data integrity because information is entered in a consistent manner. It improves productivity because statements in a stored procedure only must be written once.
A. The correct answer is Thin client. A thin client is a simple
computer that has been optimized for establishing a remote
connection with a server-based computing environment. The server does most of the work, which can include launching software programs, performing calculations, and storing data.
B. The correct answer is OAuth. OAuth (Open Authorization) is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
B. The correct answer is Zigbee. Code reuse attacks are attacks
repurposing existing components. In particular, they repurpose existing code to perform arbitrary computations. It is commonly used in control-flow hijacking vulnerabilities, which are memory corruption bugs that allow an attacker to take over a code pointer.
A. The correct answer is Tape. Tape backup is the practice of
periodically copying data from a primary storage device to a tape cartridge so the data can be recovered if there is a hard disk crash or failure. Tape backups can be done manually or be programmed to happen automatically with appropriate software. An off-site cold backup usually operates on Tape backup technology.
D. The correct answer is NIC offers fault tolerance and greater
throughput. NIC teaming is the process of combining multiple
network cards together for performance, load balancing, and
redundancy reasons.
A. The correct answer is RAID 6. In RAID 6, two disk drives can fail without total data loss occurring. This means better security than RAID 5, but it also means even slower write speeds since one additional checksum must be created.
A. The correct answer is Symmetric encryption. Symmetric
cryptography is faster to run (in terms of both encryption and
decryption) because the keys used are much shorter than they are in asymmetric cryptography. Additionally, the fact that only one key gets used (versus two for asymmetric cryptography) also makes the entire process faster.
D. The correct answer is USB data blocker. A USB data blocker is a device that plugs into the charging port on your phone, acting as a shield between the public charging station’s cord and your phone. USB data blockers, also known as USB condoms, restrict hackers from accessing your phone’s data.
A. The correct answer is to apply elliptic curve cryptography. Elliptic curve cryptography is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography to provide equivalent security.
C. The correct answer is Edge computing. Edge computing is a
distributed computing paradigm that brings computation and data storage closer to the sources of data. This is expected to improve response times and save bandwidth
B. The correct answer is Tokenization. Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value. The token is a reference that maps back to the sensitive data through a tokenization system.
C. The correct answer is RFID. RFID systems enable a card and a card reader to communicate without the need for one to physically touch or contact the other–hence the term contactless. The card need only be placed in close proximity to the reader for communication to occur–hence the term proximity
D. The correct answer is Encryption. Encryption is the process of converting information or data into a code, especially to prevent unauthorized access.
C. The correct answer is Air gap. An air gap, air wall, air gapping or disconnected network is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.
A. The correct answer is Masking. Data masking is a way to create a fake, but a realistic version of your organizational data. The goal is to protect sensitive data, while providing a functional alternative when real data is not needed—for example, in user training, sales demos, or software testing.
B. The correct answer is The salt is reused. You should never reuse a salt, and you should especially not hardcode it for your entire application! A salt has several purposes (defeating rainbow table attacks and others based on pre-computation).
However, a salt also prevents an attacker from trying to break
multiple users’ passwords at once. If you use a salt that is not
unique, an attacker could trivially build a rainbow table for your application, or attack a batch of users. This is almost as bad as having no salt!
B. The correct answer is Fog computing. Fog computing or fog
networking, also known as fogging, is an architecture that uses
edge devices to carry out a substantial amount of computation, storage, and communication locally and routed over the Internet backbone
C. The correct answer is East-west traffic. East-west traffic, in a
networking context, is the transfer of data packets from server to server within a data center. The term east-west for this type of traffic comes from network diagram drawings that usually depict local area network (LAN) traffic horizontally.
In contrast, north-south traffic describes client-to-server traffic that moves between the data center and a location outside of the data center network. North-south traffic is typically depicted vertically to illustrate traffic that flows above or below the data center
C. The correct answer is VoIP. Voice over Internet Protocol, also
called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet.