Description |
Answer |
A boundary layer between the LAN and the WAN. |
DMZ |
Taking a list of applications on a laptop 2 months apart. |
Baseline |
Prevents a SQL injection attack. |
Stored procedure |
A control that helps you rekey an ID badge. |
Administrative |
Testing an application with real data prior to going into production. |
Staging |
Attack a virtual host from a guest virtual machine. |
VM escape |
Type of switch that connects multiple switches together. |
Aggregation |
Used to isolate applications for patching, isolation, or testing. |
Sandboxing |
Wireless network for visitors or employees at lunchtime. |
Guest |
The attack vector for visitors or employees. |
Network interface |
A life support machine is an example of this. |
SoC |
Leasing a software package on the cloud. |
SaaS |
A control that mitigates risk. |
Technical |
Putting an unmanaged VM onto a virtual network. |
VM sprawl |
To prevent an attack on a home IoT device, turn off the… |
Internet connection |
Allows you to filter off traffic for analysis. |
Tap or port mirror |
A cloud model that gives you more control. |
Private cloud |
A contained environment that's used to secure contractors' desktops. |
VDI |
Isolation of a machine from the local network. |
Air gap |
Deploying your application into the cloud. |
PaaS |
Cloud model where companies share the cost of resources. |
Community cloud |
A configuration that you can roll back. |
Non-persistent |
A cloud service that gives you more control. |
IaaS |
A web server located in the DMZ. |
Extranet |
Regulates temperature using hot and cold aisles. |
HVAC |