Bash, the Crucial Exams Chat Bot
AI Bot

Cloud, IoT, and Secure Architecture Principles (CCST) Flashcards

Cisco CCST Cybersecurity 100-160 Flashcards

Study our Cloud, IoT, and Secure Architecture Principles (CCST) flashcards for the Cisco CCST Cybersecurity 100-160 exam with 52+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Cisco CCST Cybersecurity 100-160 Course Header Image
FrontBack
Define DDoS mitigation optionsRate limiting CDN WAF autoscaling and specialized DDoS services
Define IAM principleManage identities and access policies to enforce who can do what on resources
Define serverless security concernUser controls code not the runtime ensure least privilege and secure dependencies
Define shared responsibility modelProvider secures cloud infrastructure Customer secures data apps and configurations
Define zero trust architectureNever trust always verify enforce least privilege and continuous authentication
Describe device identity conceptAssign unique cryptographic identity to each device for authentication and authorization
Describe hybrid cloud segmentation goalEnsure consistent policies across on prem and cloud to protect hybrid workloads
Describe OT vs IT security prioritiesOT prioritizes safety and availability IT prioritizes confidentiality and integrity
Explain firmware signing benefitsPrevents unauthorized firmware and ensures vendor authenticity
Explain key rotation benefitLimits exposure if a key is compromised by replacing it periodically
Explain network segmentationPurposefully divide networks to limit lateral movement and reduce attack surface
How does MFA improve securityAdds an additional authentication factor reducing risk from stolen credentials
How to secure APIs in cloudUse authentication authorization rate limiting input validation and logging
How to secure CI CD pipelinesProtect credentials enforce code review use signed artifacts and run vulnerability scans
How to segment OT networksIsolate control networks use one way gateways and strict access controls
List IaaS PaaS and SaaS with responsibility shiftIaaS customer manages OS middleware apps PaaS customer manages apps SaaS provider manages stack
Name common IoT protocols with risk examplesMQTT CoAP HTTP note lack of auth encryption in some implementations
Name typical IoT lifecycle risksManufacturing backdoors insecure provisioning lack of updates and poor disposal practices
State difference between security groups and NACLsSecurity groups are stateful host level NACLs are stateless subnet level
What is a CASBCloud access security broker enforces security policies for cloud service usage
What is a hardware root of trustTrusted hardware component like TPM that anchors device cryptographic operations
What is a KMSKey Management Service for generating storing and managing encryption keys
What is a VPCVirtual private cloud isolated network in a public cloud provider
What is a WAFWeb application firewall that filters and blocks malicious HTTP traffic
What is ABACAttribute based access control grants access based on attributes of subject object and environment
What is an air gap and its limitationPhysically isolated networks reduce remote attack risk but vulnerable via removable media and supply chain
What is an HSMHardware security module for secure generation and storage of cryptographic keys
What is anomaly detection for IoTUse baselines and ML to spot unusual device behavior that may indicate compromise
What is defense in depthLayered security controls so multiple defenses protect assets
What is IaC security riskConfiguration drift and misconfigurations in templates lead to large scale issues if not managed
What is identity federationAllow external identity providers to authenticate users for cloud services
What is immutable infrastructureDeploy resources that are replaced rather than modified to ensure consistency and recoverability
What is least privilegeGrant minimum rights needed for tasks and nothing more
What is microsegmentationFine grained segmentation often at workload or host level for isolation
What is principle of secure defaultsShip systems with least functionality and strongest safe settings enabled by default
What is RBACRole based access control grants permissions based on assigned roles
What is runtime protection for containersMonitor and block malicious behavior in running container workloads
What is secrets managementSecurely store and distribute credentials tokens and API keys
What is secure bootVerify firmware and bootloader signatures before executing to prevent tampering
What is secure device provisioningProcess to enroll device identity keys and certificates securely at manufacture or deploy
What is SIEMSecurity information and event management that aggregates and analyzes logs
What is supply chain integrity signingUse cryptographic signing for binaries and images to verify origin and integrity
What is supply chain risk for devicesCompromise or tampering of components or firmware before deployment
Why audit logs are criticalProvide traceability for actions support incident response and compliance
Why backup and DR for cloud differCloud offers rapid recovery options but requires tested backup strategies and permissions management
Why encrypt data at restProtect stored data from theft and unauthorized access
Why encrypt data in transitProtect data moving across networks from interception and tampering
Why log telemetry from IoT devicesDetect anomalies perform forensics and measure device health
Why OTA updates must be signedEnsure authenticity and integrity of firmware being installed on devices
Why perform threat modelingIdentify assets threats and mitigations early to design secure architectures
Why scan container imagesDetect vulnerabilities and insecure configurations before runtime
Why use TLS for cloud servicesProvides encrypted authenticated communication between clients and services

About the Flashcards

Prepare for your certification with our comprehensive flashcards for the Cisco CCST Cybersecurity exam. This deck is designed to help you master crucial terminology and foundational concepts across a wide range of security domains. By reviewing these cards, you can reinforce your understanding of key principles and be better prepared for the questions you'll face. The topics range from core cloud security principles like the shared responsibility model and zero trust architecture to specific technical controls. You'll study network segmentation, data encryption, and identity and access management (IAM), along with modern security challenges in DevSecOps, container security, and securing Internet of Things (IoT) systems.

Topics covered in this flashcard deck:

  • Cloud Security Fundamentals
  • Network and Infrastructure Security
  • Data Protection and Cryptography
  • Identity and Access Management (IAM)
  • DevSecOps and Application Security
  • IoT and OT Security Principles
Share on...
Follow us on...