100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP EXAM- SECURITY ARCHITECTURE AND ENGINEERING QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
17-08-2024
Written in
2024/2025

CISSP EXAM- SECURITY ARCHITECTURE AND ENGINEERING QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Institution
CISSP
Course
CISSP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP
Course
CISSP

Document information

Uploaded on
August 17, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISSP EXAM- SECURITY
ARCHITECTURE AND ENGINEERING
QUESTIONS AND ANSWERS WITH
SOLUTIONS 2024
What is a Cache? - ANSWER is a local store of information that a system uses to operate. Caches store
frequently used records to save clients the time of performing repeated looks us and reduce the burden
on servers.



Define client-server model - ANSWER Client-server model is a distributed application structure that
partitions tasks or workloads between the providers of a resource or service, called servers, and service
requesters, called clients. ... A server host runs one or more server programs, which share their
resources with clients.



Define "client" - ANSWER A client is a computer or a program that, as part of its operation, relies on
sending a request to another program or a computer hardware or software that accesses a service made
available by a server (which may or may not be located on another computer).

-a client can be a machine (desktop, smartphone, laptop)

-a client program -allows user to make requests such as (web, )



Define "servers" - ANSWER A server is a computer program not a device. Servers provide functionality
and serve other programs called clients.

-A single server multiple clients at the same time

-We can run multiple servers on one single machine (virtual servers)

-There are several types of servers

-A server can contain web resources, host web applications, stores user and program data etc. used to
serve hundreds or thousands of clients



Evolution of cloud computing - ANSWER mainframe servers --> client/server model--> virtualization-->
cloud computing

, Virtualization overview of meaning to servers and why it's why most data centers utilize this today. Give
two examples - ANSWER virtualization technology allows many servers to make use of the same
underlying hardware = shred hardware

-By utilizing virtualization (same underlying hardware platform) it makes it easier to shift memory,
storage and processing power to wherever it's needed at the time.

-Virtualization platforms like VM and Microsoft HyperV makes this possible.



Explain at a high level of how Virtualization works on a server - ANSWER -Involve host machines that run
on physical hardware

-That hardware (host machine) then provides services to several virtualized guest machines that run
operating systems of their own

-The host machine runs special software known as a hypervisor to manage the guest virtual machines.
The Hypervisor basically tricks each guest into thinking it is running on dedicated hardware when in
reality the guest is running on the shared hardware of the host machine.

-The operating system on each guest machine has no idea it is virtualized. So software on that machine
would operate same as if it were on a physical server.



Type 1 Hypervisor - ANSWER (also know as Bare Metal Hypervisor) - most common found in data centers

-Hypervisor runs directly on top of the hardware then hosts guest software on top of tha7



Type 2 Hypervisor - (difference from type 1. commonly used where) - ANSWER Type 2 Hypervisor- The
physical machine actually runs an operating system of it's own and the hypervisor runs as a program on
top of that system

-Commonly used on personal computers

-Common hypervisors in this scenario are virtual box and parallels



What security design element is the most critical with virtualization? - ANSWER Virtual machine isolation



VM escape attack - ANSWER In a virtualized environment this may not be the case if the attacker is able
to break out virtualized guest operating system. This type of attack is known as a VM Escape Attack.

-VM Escape attacks attempt to break of the guest environment

-Each server must have access to only is own memory and storage

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Performance Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
314
Member since
1 year
Number of followers
36
Documents
15133
Last sold
10 hours ago

Welcome To my Store My Goal is to help you achieve your desired grades by providing credible study materials I'm happy to help you with quality documents On this page you will find quality study guides, Exams assignments, Research papers and Test Banks all verified correct . you'll find past and recent revised and verified study materials . Stay here and You'll find everything you need to pass !!! . I always ensure my documents are of high standards Be assured to get good grades and always leave a review after a purchase Refer a friend SUCCESS!!!

Read more Read less
4.4

216 reviews

5
128
4
60
3
19
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions