100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISSP EXAM- SECURITY ARCHITECTURE AND ENGINEERING QUESTIONS AND ANSWERS WITH SOLUTIONS 2024 $15.49   Add to cart

Exam (elaborations)

CISSP EXAM- SECURITY ARCHITECTURE AND ENGINEERING QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

 2 views  0 purchase
  • Course
  • CISSP
  • Institution
  • CISSP

CISSP EXAM- SECURITY ARCHITECTURE AND ENGINEERING QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Preview 2 out of 9  pages

  • August 17, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISSP
  • CISSP
avatar-seller
Performance
CISSP EXAM- SECURITY
ARCHITECTURE AND ENGINEERING
QUESTIONS AND ANSWERS WITH
SOLUTIONS 2024
What is a Cache? - ANSWER is a local store of information that a system uses to operate. Caches store
frequently used records to save clients the time of performing repeated looks us and reduce the burden
on servers.



Define client-server model - ANSWER Client-server model is a distributed application structure that
partitions tasks or workloads between the providers of a resource or service, called servers, and service
requesters, called clients. ... A server host runs one or more server programs, which share their
resources with clients.



Define "client" - ANSWER A client is a computer or a program that, as part of its operation, relies on
sending a request to another program or a computer hardware or software that accesses a service made
available by a server (which may or may not be located on another computer).

-a client can be a machine (desktop, smartphone, laptop)

-a client program -allows user to make requests such as (web, )



Define "servers" - ANSWER A server is a computer program not a device. Servers provide functionality
and serve other programs called clients.

-A single server multiple clients at the same time

-We can run multiple servers on one single machine (virtual servers)

-There are several types of servers

-A server can contain web resources, host web applications, stores user and program data etc. used to
serve hundreds or thousands of clients



Evolution of cloud computing - ANSWER mainframe servers --> client/server model--> virtualization-->
cloud computing

, Virtualization overview of meaning to servers and why it's why most data centers utilize this today. Give
two examples - ANSWER virtualization technology allows many servers to make use of the same
underlying hardware = shred hardware

-By utilizing virtualization (same underlying hardware platform) it makes it easier to shift memory,
storage and processing power to wherever it's needed at the time.

-Virtualization platforms like VM and Microsoft HyperV makes this possible.



Explain at a high level of how Virtualization works on a server - ANSWER -Involve host machines that run
on physical hardware

-That hardware (host machine) then provides services to several virtualized guest machines that run
operating systems of their own

-The host machine runs special software known as a hypervisor to manage the guest virtual machines.
The Hypervisor basically tricks each guest into thinking it is running on dedicated hardware when in
reality the guest is running on the shared hardware of the host machine.

-The operating system on each guest machine has no idea it is virtualized. So software on that machine
would operate same as if it were on a physical server.



Type 1 Hypervisor - ANSWER (also know as Bare Metal Hypervisor) - most common found in data centers

-Hypervisor runs directly on top of the hardware then hosts guest software on top of tha7



Type 2 Hypervisor - (difference from type 1. commonly used where) - ANSWER Type 2 Hypervisor- The
physical machine actually runs an operating system of it's own and the hypervisor runs as a program on
top of that system

-Commonly used on personal computers

-Common hypervisors in this scenario are virtual box and parallels



What security design element is the most critical with virtualization? - ANSWER Virtual machine isolation



VM escape attack - ANSWER In a virtualized environment this may not be the case if the attacker is able
to break out virtualized guest operating system. This type of attack is known as a VM Escape Attack.

-VM Escape attacks attempt to break of the guest environment

-Each server must have access to only is own memory and storage

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Performance. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

74534 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.49
  • (0)
  Add to cart