10. Cloud and Virtualization Security Flashcards

1
Q

What domain covers threats, vulnerabilities, and mitigations in the CompTIA Security+ exam?

A

Domain 2.0

This domain includes various types of vulnerabilities and their implications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two types of vulnerabilities mentioned in Domain 2.3?

A

Virtualization (VM escape, Resource reuse) and Cloud-specific

These vulnerabilities present unique challenges in security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What domain focuses on security architecture in the CompTIA Security+ exam?

A

Domain 3.0

This domain includes concepts related to different architecture models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two architecture concepts compared in Domain 3.1.

A
  • Cloud
  • Infrastructure as code (IaC)

Other concepts may include Serverless, Microservices, and Containerization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a key general data consideration mentioned in Domain 3.3?

A

Data sovereignty

This pertains to the legal and regulatory considerations surrounding data storage and processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What domain addresses security operations in the CompTIA Security+ exam?

A

Domain 4.0

This domain includes applying common security techniques to computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is meant by hardening targets in Domain 4.1?

A

Cloud infrastructure

This involves implementing security measures to protect cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What advantages does cloud computing offer organizations?

A
  • Agility
  • Flexibility
  • Cost-effectiveness
  • Scalability

These advantages have led to widespread adoption across industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What approach do new businesses often take regarding cloud computing?

A

Born in the cloud

This approach allows businesses to operate without managing physical servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main concerns for security professionals regarding cloud computing?

A

Common cloud security concerns and security controls

These are essential for ensuring the confidentiality, integrity, and availability of cloud operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: The chapter discusses aspects of cloud computing most important for _______.

A

security professionals

This is crucial for those preparing for the Security+ exam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cloud computing?

A

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the key characteristics of cloud computing?

A
  • Ubiquitous access
  • On-demand self-service
  • Rapid provisioning and releasing
  • Minimal management effort
  • Shared pool of resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does multitenancy mean in cloud computing?

A

A cloud infrastructure where multiple users share the same physical hardware without knowledge of each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between scalability and elasticity?

A
  • Scalability: Rapidly increasing capacity
  • Elasticity: Expanding and contracting capacity as needs change
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is measured service in cloud computing?

A

Cloud providers track resource usage, allowing customers to pay only for what they use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the five key roles in cloud computing?

A
  • Cloud service providers
  • Cloud consumers
  • Cloud partners (brokers)
  • Cloud auditors
  • Cloud carriers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three major cloud service models?

A
  • Infrastructure as a Service (IaaS)
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Infrastructure as a Service (IaaS)?

A

A model allowing customers to purchase and manage basic computing resources like storage and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Software as a Service (SaaS)?

A

A model providing fully managed applications running in the cloud accessible via a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Platform as a Service (PaaS)?

A

A model that offers a platform for customers to run their own applications, including execution environments and tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of Managed Service Providers (MSPs)?

A

Organizations that provide IT services, potentially across both cloud and on-premises deployments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What defines a public cloud?

A

Infrastructure accessible to any customers under a multitenant model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a private cloud?

A

Cloud infrastructure provisioned for use by a single customer, either managed by them or a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a community cloud?

A

A multitenant cloud service shared among members of a specific community with shared missions or compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does hybrid cloud refer to?

A

Cloud deployments that blend public, private, and/or community cloud services together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Fill in the blank: In cloud computing, _______ allows customers to quickly increase or decrease their resource capacity.

A

[elasticity]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

True or False: Cloud consumers are the organizations that provide cloud services.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the primary advantage of cloud computing regarding resource provisioning?

A

On-demand self-service computing enables resources to be available when and where needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

List two major players in the IaaS market.

A
  • Amazon Web Services (AWS)
  • Microsoft Azure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

True or False: SaaS applications typically require significant user management of the underlying infrastructure.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is an example of Function as a Service (FaaS)?

A

AWS Lambda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the HathiTrust digital library an example of?

A

Community cloud

HathiTrust is a consortium of academic research libraries providing access to their collections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define hybrid cloud.

A

A blend of public, private, and/or community cloud services unified into a single platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is public cloud bursting?

A

Using public cloud capacity when demand exceeds private cloud capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the primary reason for adopting hybrid cloud environments?

A

To reduce single points of failure by decentralizing technology components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are AWS Outposts?

A

A hybrid cloud service where customers manage on-premises AWS equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the shared responsibility model in cloud computing?

A

A division of cybersecurity responsibilities between service providers and customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In an IaaS environment, what security responsibilities does the customer have?

A

Security for the operating system, applications, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

True or False: In a PaaS solution, the vendor is responsible for the operating system.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the primary responsibility of the provider in a SaaS environment?

A

Most operational tasks, including cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Why is documenting the division of responsibilities important?

A

For compliance with external regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does the Cloud Reference Architecture by NIST provide?

A

A high-level taxonomy for cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What organization developed the Cloud Controls Matrix (CCM)?

A

Cloud Security Alliance (CSA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is edge computing?

A

Processing data close to the sensor to minimize data transferred to the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What does fog computing utilize?

A

IoT gateway devices located near sensors for preprocessing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Fill in the blank: Hybrid cloud requires technology that ______ different cloud offerings.

A

unifies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

List the three types of cloud services mentioned.

A
  • IaaS
  • PaaS
  • SaaS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a significant challenge of traditional cloud models in IoT applications?

A

Poor network connectivity in remote locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

True or False: In the shared responsibility model, cloud providers are responsible for the security of hardware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What technology allows multiple guest systems to share the same underlying hardware?

A

Virtualization

Virtualization is essential for modern datacenters, particularly in cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the special operating system that runs on virtual host hardware?

A

Hypervisor

The hypervisor mediates access to underlying hardware resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What do virtual machines run on top of in a virtualized datacenter?

A

Virtual infrastructure provided by the hypervisor

Virtual machines can run standard operating systems like Windows and Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is the primary responsibility of a hypervisor?

A

Enforcing isolation between virtual machines

This ensures that virtual machines do not interfere with each other’s operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What illusion must the hypervisor present to each virtual machine?

A

A completely separate physical environment

This illusion is crucial for both operational and security aspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are the two primary types of hypervisors?

A

Type I and Type II hypervisors

Each type has different operational mechanisms and efficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a Type I hypervisor also known as?

A

Bare-metal hypervisor

Type I hypervisors operate directly on the underlying hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How do Type II hypervisors operate?

A

As an application on top of an existing operating system

This model introduces inefficiencies compared to Type I hypervisors.

59
Q

Which type of hypervisor is most commonly used in datacenter virtualization?

A

Type I hypervisor

Type I hypervisors are preferred for their efficiency.

60
Q

Fill in the blank: Type II hypervisors are less efficient than _______.

A

Type I hypervisors

This is due to the additional layer of the host operating system.

61
Q

True or False: Virtual machines are aware they are running in a virtualized environment.

A

False

The hypervisor tricks virtual machines into thinking they have normal hardware access.

62
Q

What does IaaS stand for?

A

Infrastructure as a Service

63
Q

What are the primary resources provided by IaaS environments?

A
  • Compute capacity
  • Storage
  • Networking
64
Q

What is the main benefit of dynamic resource allocation in cloud computing?

A

Allows administrators to add and remove resources as needs change

65
Q

What are virtual machines in the context of cloud computing?

A

The basic building block of compute capacity in the cloud

66
Q

How is the cost of a server instance typically calculated?

A

Based on an hourly rate, varying by compute, memory, and storage resources

67
Q

What is the purpose of containerization?

A

Provides application-level virtualization, allowing applications to be portable across systems

68
Q

Name a popular containerization platform.

69
Q

What security considerations should be enforced for containers?

A
  • Isolation between containers
  • Container-specific vulnerability management
  • Segmenting by risk profile
70
Q

What are the two major categories of cloud storage offerings?

A
  • Block storage
  • Object storage
71
Q

What is block storage?

A

Allocates large volumes of storage for use by virtual server instances, formatted as virtual disks

72
Q

How does object storage differ from block storage?

A

Files are treated as independent entities and storage is not preallocated

73
Q

What is a key difference in cost between block storage and object storage?

A

Block storage is significantly more expensive than object storage

74
Q

What are three key security considerations for cloud storage?

A
  • Set permissions properly
  • Consider high availability and durability
  • Use encryption to protect sensitive data
75
Q

What is the role of security groups in cloud networking?

A

Define permissible network traffic using a set of rules similar to a firewall ruleset

76
Q

What is a Virtual Private Cloud (VPC)?

A

A method to achieve network segmentation in cloud environments by grouping systems into subnets

77
Q

What is the purpose of Infrastructure as Code (IaC)?

A

Automates the provisioning, management, and deprovisioning of infrastructure services through scripted code

78
Q

True or False: Security groups incur additional costs in cloud environments.

79
Q

What is the advantage of integrating APIs in cloud environments?

A

Allows programmatic provisioning, configuration, and management of cloud resources

80
Q

Fill in the blank: Containers provide _______ virtualization.

A

application-level

81
Q

What is the function of AWS CloudFormation?

A

Allows developers to specify infrastructure requirements in formats like JSON and YAML

82
Q

What major disadvantage arises from isolating operations teams from the development process?

A

Inhibits understanding of business requirements

83
Q

What does SDN stand for in cloud networking?

A

Software-Defined Networking

84
Q

What is the main feature of cloud service providers’ firewalls?

A

They do not provide direct access to customers to maintain isolation

85
Q

What is the relationship between microservices and APIs in cloud environments?

A

Microservices communicate with each other through APIs in response to environmental events

86
Q

What does IaaS stand for?

A

Infrastructure as a Service

87
Q

What are the primary resources provided by IaaS environments?

A
  • Compute capacity
  • Storage
  • Networking
88
Q

What is the main benefit of dynamic resource allocation in cloud computing?

A

Allows administrators to add and remove resources as needs change

89
Q

What are virtual machines in the context of cloud computing?

A

The basic building block of compute capacity in the cloud

90
Q

How is the cost of a server instance typically calculated?

A

Based on an hourly rate, varying by compute, memory, and storage resources

91
Q

What is the purpose of containerization?

A

Provides application-level virtualization, allowing applications to be portable across systems

92
Q

Name a popular containerization platform.

93
Q

What security considerations should be enforced for containers?

A
  • Isolation between containers
  • Container-specific vulnerability management
  • Segmenting by risk profile
94
Q

What are the two major categories of cloud storage offerings?

A
  • Block storage
  • Object storage
95
Q

What is block storage?

A

Allocates large volumes of storage for use by virtual server instances, formatted as virtual disks

96
Q

How does object storage differ from block storage?

A

Files are treated as independent entities and storage is not preallocated

97
Q

What is a key difference in cost between block storage and object storage?

A

Block storage is significantly more expensive than object storage

98
Q

What are three key security considerations for cloud storage?

A
  • Set permissions properly
  • Consider high availability and durability
  • Use encryption to protect sensitive data
99
Q

What is the role of security groups in cloud networking?

A

Define permissible network traffic using a set of rules similar to a firewall ruleset

100
Q

What is a Virtual Private Cloud (VPC)?

A

A method to achieve network segmentation in cloud environments by grouping systems into subnets

101
Q

What is the purpose of Infrastructure as Code (IaC)?

A

Automates the provisioning, management, and deprovisioning of infrastructure services through scripted code

102
Q

True or False: Security groups incur additional costs in cloud environments.

103
Q

What is the advantage of integrating APIs in cloud environments?

A

Allows programmatic provisioning, configuration, and management of cloud resources

104
Q

Fill in the blank: Containers provide _______ virtualization.

A

application-level

105
Q

What is the function of AWS CloudFormation?

A

Allows developers to specify infrastructure requirements in formats like JSON and YAML

106
Q

What major disadvantage arises from isolating operations teams from the development process?

A

Inhibits understanding of business requirements

107
Q

What does SDN stand for in cloud networking?

A

Software-Defined Networking

108
Q

What is the main feature of cloud service providers’ firewalls?

A

They do not provide direct access to customers to maintain isolation

109
Q

What is the relationship between microservices and APIs in cloud environments?

A

Microservices communicate with each other through APIs in response to environmental events

110
Q

What are the advantages of cloud computing?

A

Operational and financial advantages

These advantages include scalability, cost efficiency, and flexibility.

111
Q

What is a significant availability issue in cloud environments?

A

High availability is not always guaranteed with base-level cloud services

Organizations often need to purchase or configure high availability services.

112
Q

Define data sovereignty.

A

Data is subject to the legal restrictions of any jurisdiction where it is collected, stored, or processed

113
Q

What must security professionals understand regarding data in cloud services?

A

How their data is stored, processed, and transmitted across jurisdictions

114
Q

What is a virtual machine (VM) escape vulnerability?

A

An attack where an attacker leverages access to a virtual host to intrude upon resources assigned to a different virtual machine

115
Q

What is virtual machine sprawl?

A

When IaaS users create virtual service instances and forget about them, leading to accumulated costs and security issues

116
Q

What is resource reuse in cloud computing?

A

When cloud providers reassign hardware resources originally assigned to one customer to another customer

117
Q

What type of technology should security analysts implement for API-based applications?

A

API inspection technology

118
Q

What is the function of secure web gateways (SWGs)?

A

Monitor web requests made by internal users and evaluate them against the organization’s security policy

119
Q

What role does technology governance play in cloud computing?

A

Guides IT organizations’ work to ensure consistency with organizational strategy and policy

120
Q

What is an important component of cloud governance?

A

Auditability

121
Q

True or False: Cloud computing contracts should guarantee the customer’s right to audit cloud service providers.

122
Q

Fill in the blank: Cloud applications depend heavily on the use of ______ to provide service integration and interoperability.

123
Q

What is the primary purpose of controls offered by cloud service providers?

A

Hardening the cloud infrastructure against attack

These controls help organizations achieve their security objectives in the cloud.

124
Q

What are the advantages of using cloud-native controls?

A

Cost-effective and user-friendly

They integrate directly with the provider’s offerings.

125
Q

What is a disadvantage of third-party solutions for cloud security?

A

More costly

However, they can integrate with a variety of cloud providers.

126
Q

What role do Cloud Access Security Brokers (CASBs) play?

A

Serve as intermediaries between cloud service users and cloud service providers

They monitor user activity and enforce policy requirements.

127
Q

What are the two approaches CASBs operate using?

A
  • Inline CASB solutions
  • API-based CASB solutions
128
Q

How do inline CASB solutions function?

A

Physically or logically reside in the connection path between the user and the service

They can block requests that violate policy.

129
Q

What is a limitation of API-based CASB solutions?

A

Cannot block requests that violate policy

They only monitor user activity and correct policy violations post-factum.

130
Q

What are resource policies in cloud security?

A

Policies that limit the actions users of accounts may take

They help mitigate risks from accidental commands, compromised accounts, or malicious insiders.

131
Q

What is an example of a restriction that a service control policy can impose?

A

Prohibit access to resources outside certain regions

Example regions: US-East and EU-West.

132
Q

What is a Hardware Security Module (HSM)?

A

A special-purpose computing device that manages encryption keys and performs cryptographic operations

HSMs provide high security when configured properly.

133
Q

What is a key benefit of using HSMs for encryption key management?

A

Creates and manages keys without exposing them to humans

This dramatically reduces the risk of key compromise.

134
Q

Do cloud service providers use HSMs for their own operations?

A

Yes

They also offer HSM services to customers for secure key management.

135
Q

Fill in the blank: The purpose of cloud access security brokers is to _______.

A

monitor user activity and enforce policy requirements

136
Q

True or False: Inline CASB solutions require configuration of network devices.

137
Q

True or False: API-based CASBs can block requests that violate policy.

138
Q

What changes does cloud computing bring to the cybersecurity landscape?

A

It requires cooperation between cybersecurity professionals and cloud service providers.

139
Q

What is the shared responsibility model in cloud security?

A

It is a model where cloud customers and providers must understand their responsibilities in meeting security control requirements.

140
Q

What types of security controls may organizations adopt in the cloud?

A

Organizations may implement:
* Cloud-native security controls from providers
* Third-party controls that work across environments
* A mixture of both

141
Q

What is a cloud access security broker (CASB)?

A

A CASB allows consistent enforcement of security policies across diverse cloud platforms.

142
Q

What vulnerabilities may appear in cloud environments?

A

Vulnerabilities include:
* Virtual machine escape
* Resource reuse

143
Q

What data sovereignty concerns may arise when using cloud services in different jurisdictions?

A

Using cloud services in different jurisdictions may introduce data sovereignty concerns.

144
Q

True or False: Cybersecurity professionals are solely responsible for meeting security control requirements in cloud environments.