AIO QA Comprehensive Flashcards

1
Q

Your organization has just been served with an eDiscovery order. Because the organization has moved to a cloud environment, what is the biggest challenge when it comes to full compliance with an eDiscovery order?

A. Virtualization
B. Data discovery
C. Multitenancy
D. Resource pooling

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 344). McGraw Hill LLC. Kindle Edition.

A

B. Data discovery

Explanation:
Data discovery in a cloud environment encounters significant challenges due to the distributed nature of cloud computing. A primary concern with eDiscovery is determining all of the applicable data and locating it for collection and preservation. Within a cloud environment, locating the data and ensuring that all locations have been found can be a difficult process and will require the cooperation of both the cloud provider and the cloud customer, with procedures outlined in the contract and SLAs. A is incorrect because while virtualization forms the backbone of a cloud environment, the actual use of virtual machines does not increase the difficulty of data discovery, even if it does mean that assistance may be needed from the cloud provider for the actual data collection. With physical hardware, it is very easy to fully isolate and gather information because support staff will have full control of and access to the systems at all levels. C is incorrect because multitenancy involves hosting different systems and applications, from different organizations, within the same cloud environment and sharing resources between them. Although this can pose an additional challenge, depending on the scope of the eDiscovery order and the data it pertains to, data discovery as a broad topic is the more appropriate answer. D is incorrect because resource pooling is the sharing of resources between many different customers and systems, allowing for the aggregation of resources and the sharing of load across them. This will not have any impact on data-discovery processes.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 344). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DHCP is heavily used within cloud environments to maintain network configurations in a centralized manner. Which of the following is not a network configuration that plays a role with DHCP?

A. IP address
B. Host name
C. MAC address
D. Gateway

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 344). McGraw Hill LLC. Kindle Edition.

A

B. Host name

Explanation:
Host name resolution is provided via the domain name service (DNS) and not provided as part of the network configuration for a specific server. A is incorrect because the IP address is one of the core network configuration items provided via DHCP to a server. C is incorrect because the MAC address is what the DHCP servers use to track and maintain network configuration settings for a host. D is incorrect because a gateway address would be assigned by a DHCP server as part of the network configuration given to the host.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 345). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your organization is considering a move to a cloud environment and is looking for certifications or audit reports from cloud providers to ensure adequate security controls and processes. Which of the following is not a security certification or audit report that would be pertinent?

A. FedRAMP
B. PCI DSS
C. FIPS 140-2
D. SOC Type 2

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 345). McGraw Hill LLC. Kindle Edition.

A

C. FIPS 140-2

Explanation:
C. FIPS 140-2 is a security standard from the United States federal government that pertains to the accreditation of cryptographic modules. While this is important to security processes and controls, it is not a certification or audit report that is responsive to overall security controls, policies, or operations. A is incorrect because the Federal Risk and Authorization Management Program (FedRAMP) is a program under the U.S. government for ensuring adequate security policies, practices, and configurations when using cloud-based resources and services. It offers certifications at different classification levels for federal agencies to use in their security monitoring and auditing and ensures they comply with specific, established security standards. B is incorrect because the Payment Card Industry Data Security Standard (PCI DSS) is an industry security standard for organizations that process and handle credit card transactions from the major credit card vendors and platforms. PCI DSS certification can be obtained, or required, by complying with and verifying security standards and policies. D is incorrect because the Service Organization Control (SOC) Type 2 reports focus on the nonfinancial aspects of an organization’s systems, specifically related to security, privacy, availability, processing integrity, and confidentiality. They are produced after thorough audits and reviews, and they can be used to assure clients of security controls and policies meeting specific standards and requirements.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 345). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.You are tasked with creating a system for ensuring that new systems meet security standards and policies as they are brought online. What is your best option to accomplish this?

A. Images
B. Baselines
C. Patching
D. Virtualization

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 346). McGraw Hill LLC. Kindle Edition.

A

B. Baselines

Explanation:
Baselines are a set of standards and settings that are applied to systems when they are first built. They are essentially templates and images that are built to security policies and are applied to any systems based on their purpose. A is incorrect because images can be used for consistency within an environment, but, ultimately, when they are first built, it will be the reliance on baselines that ensures they are built to security and policy standards. C is incorrect because patching will serve to maintain security updates going forward, but it will not be useful for ensuring newly built systems conform to policies. D is incorrect because virtualization will be a powerful tool for the use of images that have baselines applied, but overall it is not something that will automatically apply security controls and policies.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 346). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are developing a new process for data discovery for your organization and are charged with ensuring that all applicable data is included. Which of the following is not one of the three methods of data discovery?

A. Metadata
B. Content analysis
C. Labels
D. Classification

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 346). McGraw Hill LLC. Kindle Edition.

A

D. Classification

Explanation:
Classification is the overall process of using certain attributes about data and then applying appropriate security controls to that data. Classification is applied after data discovery has been completed, and it pertains only to the application of security controls, not the actual process of discovering or determining data. A is incorrect because metadata is essentially information about data, such as its type, how it is stored, how it is organized, how it was created, or how it is used. Metadata can also include headers and organizational markings, such as column or field names in a database or a spreadsheet. B is incorrect because content analysis involves looking at the data itself to make decisions based on what it is. This can include a person actually looking at it manually or using tools like checksums, heuristics, or statistical analysis to determine its content and data discovery. C is incorrect because labels are groupings or categorizations that have been applied to data either by personnel or automated means. They are typically done based on the characteristics or content of the data and then matched against criteria to be included under such a label. Unlike metadata, labels are only as good as how standardized they are and how thoroughly they are used throughout an environment. If they are not used in a standardized way or done comprehensively across all data sets, their usefulness to data discovery will be greatly diminished.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 346-347). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6.Management has requested that security testing be done against their live cloud-based applications, with the testers not having internal knowledge of the system. Not attempting to actually breach systems or inject data is also a top requirement. Which of the following would be the appropriate approach to take?

A. Static application security testing
B. Penetration testing
C. Runtime application self-protection
D. Dynamic application security testing

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 347). McGraw Hill LLC. Kindle Edition.

A

D. Dynamic application security testing

Explanation:
Dynamic application security testing is done against a system or application in its actual runtime state, and the testers do not have specific knowledge about the configurations or technologies employed on it. Unlike static application security testing, dynamic testing must discover all interfaces and paths to test, but unlike penetration testing, it does not attempt to actively exploit vulnerabilities that could cause system outages, impact to users, or damage to the system or data. A is incorrect because static application security testing is done against offline systems, and the testers have knowledge ahead of time about the application and its configuration. This can include documentation about system design and the specific technologies used as well as access to the source code and programming libraries that the application was built upon. Because the testing is done against offline systems, it does not have the ability to impact production systems or users while the testing is being completed. B is incorrect because penetration testing is done against an application where the testers do not have any particular knowledge of the system or application. They would not know the specific technologies or toolsets used in the development of the application, and they would not have information about the runtime environment and the technologies it is built upon. Penetration testing is done using the same toolsets and tactics that hackers would use to attack the system in a real situation, and it is intended to determine security vulnerabilities in a proactive manner, allowing for patching or mitigation before hackers are able to discover the same exploits and successfully use them. C is incorrect because runtime application self-protection is the ability of a system or application to detect and respond to security threats and attacks in an automated manner. It is intended for applications to be able to respond to real-world attacks and scenarios in real time and apply mitigation tactics to stop the attacks immediately, allowing administrative or security personnel to review actions taken later when available and to provide further tuning or to investigate further.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 347-348). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following cloud categories would allow for the least amount of customization by the cloud customer?

A. IaaS
B. SaaS
C. PaaS
D. DaaS

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 348). McGraw Hill LLC. Kindle Edition.

A

B. SaaS

Explanation:
B. Software as a Service allows the least amount of customization by the cloud customer. With the entire system and application under control of the cloud provider, the cloud customer will only have minimal options for customization, typically limited to branding or the selection of default options or settings. A is incorrect because Infrastructure as a Service allows the most customization by the cloud customer. While the cloud provider is solely responsible for the physical infrastructure and appliances of a cloud environment, the cloud customer has enormous control over storage, network settings, virtual machines, and identity and access control systems. With this level of control, the cloud customer can choose which technologies and configurations to use, typically without any involvement from the cloud provider. C is incorrect because Platform as a Service, although it does not allow full control at the operating system level like IaaS, allows tremendous control over application environments and configurations, and it allows sole control over the code that is deployed and configured for the applications. PaaS allows the cloud customer to choose the underlying operating system, application frameworks, and programming libraries and interfaces used within the environment. D is incorrect because Desktop as a Service works as a virtual desktop where configurations and installations are stored remotely and accessed over the network. It offers substantial security and recoverability features because the device is no longer the holder of data or software. Although it is centrally maintained, it offers more flexibility for configuration, software packages deployed, and customization than a SaaS solution offers to users.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 348). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What concept that pertains to cloud computing involves the allocation of resources when needed, followed by the immediate destruction of them once that need has been fulfilled?

A. Ephemeral computing
B. Serverless technology
C. Virtualization
D. DevOps

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 348-349). McGraw Hill LLC. Kindle Edition.

A

A. Ephemeral computing

Explanation:
Ephemeral computing is a fancy term that basically encapsulates the main purpose and benefits of cloud computing. Overall, it refers to the paradigm of creating a virtual environment when needed, performing the computing that is required within that environment, and then discarding and destroying the environment once it has served its needs. This directly relates to the concepts of measured service and on-demand self-service, as these environments can be programmatically provisioned at any time, and costs will only be incurred for the period of time during which the environments are being used. B is incorrect because serverless technology refers to the ability to execute code and use compute resources without the need to provision servers, but it does not relate to the specific question. C is incorrect because virtualization refers to the underlying structure of resources within a cloud environment and is what enables ephemeral computing to work, but it is not the best answer to the question. D is incorrect because while DevOps very often makes heavy use of ephemeral computing, it is not the best answer to the question.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 349). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which phase of the risk management process involves an organization deciding how to mitigate risk discovered during the course of an audit?

A. Assessing
B. Framing
C. Responding
D. Monitoring

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 349). McGraw Hill LLC. Kindle Edition.

A

C. Responding

Explanation:
C. Responding is the stage of the risk management process where an organization will determine, based on the exact nature of the risk finding, as well as the potential costs and efforts involved with mitigation, which direction is appropriate to take. The organization may decide to accept the risk “as is,” which is typically an option when the finding is of a low or possible moderate classification. It can opt to avoid the risk by employing countermeasures or changes in operations so that the risk is never realized, which is typically accomplished by disabling or blocking access to certain functions or interfaces. It can also opt to transfer the risk to another entity, which, although not always possible, will typically be in the form of insurance. Lastly, the organization can decide to mitigate the risk through the use of applicable technologies, configuration changes, or code changes to remove or lessen the vulnerability or exposure. A is incorrect because the process of assessing risk involves evaluating potential vulnerabilities, coupled with the likeliness of occurrence and the possible damage from a successful exploit, and then assigning a risk classification value (ranging from minimal to critical). In some instances, the assigning of a risk level will be automatically dictated by regulatory requirements, depending on the type of data and application involved. This value and rating will then be used in the responding phase to determine the appropriate course of action based on the risk exposure, the risk appetite of the organization, and the costs associated with mitigation. B is incorrect because the framing stage of the risk management process is where the overall risk assessment is defined and scoped. The organization will determine during framing what risk and levels it wants to evaluate, based on specific threats, regulation, or the type of data that is used. This will guide the overall risk assessment process from start to finish. D is incorrect because the main purpose of the monitoring phase is to track risks and evaluations of them over time to determine if they are still applicable and if the same level of risk classification still applies. This will also incorporate changes from the regulatory perspective and ongoing threats, and it can serve as a continual risk management and assessment process for the organization.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 349-350). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

During the testing phase of the SDLC, which of the following is not included as a core activity of testing?

A. User testing
B. Stakeholder testing
C. Vulnerability scanning
D. Auditing

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 350). McGraw Hill LLC. Kindle Edition.

A

D. Auditing

Explanation:
Although many different types of testing are done at this phase, auditing is not one of them. Testing, as part of the SDLC process, is highly focused on functional and operational readiness, both from a stability perspective and a meeting functional requirements perspective. The testing phase does include security scanning as part of it, but not to the extent of formal audits and evaluations. A is incorrect because user testing involves having actual users test the application to see if it performs as expected and desired. This is very important overall because it will be a similar experience for all users of the application, and any features that are difficult to use or any aspects that are confusing to users will come to light, and possible fixes can be explored before the application is released to all users. With most testing, application developers and stakeholders are so involved in the application and how it is supposed to work that it is difficult for them to do proper testing and see things from the perspective of actual users, especially those who are new to the application or are encountering the new features being deployed. This will also bring out any user actions and behaviors that cause error conditions or incorrect data inputs that were not considered when the application and error checking were defined and coded. B is incorrect because stakeholder testing involves management, strategic partners, internal experts, and possibly customers if done as part of a contract for development. These groups are the core investors and administrators of the system or application as well as those who have a vested interest in it and an intimate knowledge of it and how it should operate. Testing by this group should be thorough, using scripted regression testing that evaluates all aspects of the application, including specific targeted testing for new and updated features as part of the code release. C is incorrect because while much of the testing phase is focused on functional and usability testing by populations of users and stakeholders, vulnerability scanning is also crucial at this stage. Although not a comprehensive audit, scanning should be done using standard tools with full signature sets to detect any common vulnerabilities, especially any code or functions that are vulnerable to XSS or injection attacks.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 350-351). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have decided to use SOAP as the protocol for exchanging information between services for your application. Which of the following is the only data format that can be used with SOAP?

A. SAML
B. OAuth
C. XML
D. HTML

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 351). McGraw Hill LLC. Kindle Edition.

A

C. XML

Explanation:
C. The SOAP protocol only uses XML as a data format for exchanging information. XML is a free, open standard for encoding documents and data in a format that is both machine and human readable. XML is designed to be extremely flexible and to handle any type of data formatting, which makes it ideal for web services. XML is widely used across all platforms and many different application frameworks and programming languages. A is incorrect because SAML is a free, open standard that is built on XML and is intended to be used for authentication and authorization data exchange between identity and service providers. While it is similar to and built on top of XML, it is used for the specific purposes of authentication and authorization and is not appropriate to use for general web services, specifically within the SOAP protocol, which requires XML. B is incorrect because OAuth is an authentication mechanism that allows users to authenticate to many different applications or web services using commonly used credentials, such as Google, Facebook, Twitter, and so on. It enables users to use credentials they already have, without having to create an account on each system or application, and without their credentials ever being exposed. It is an open standard that any system or application is free to use and leverage. D is incorrect because HTML forms the backbone of web pages and web design, and it is used as markup language to enable web browsers to render and display content. Although it is widely used and will be crucial to any web-based application, it is not used to encode information to be used by web services or protocols such as SOAP.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 351-352). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

12.A cloud provider is looking to provide a higher level of assurance to current and potential cloud customers about the design and effectiveness of its security controls. Which of the following audit reports would the cloud provider choose as the most appropriate to accomplish this goal?

A. SAS 70
B. SOC 1
C. SOC 2
D. SOC 3

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 352). McGraw Hill LLC. Kindle Edition.

A

D. SOC 3

Explanation:
SOC reports are done to test controls in place within an organization for financial or other systems. SOC 3 reports specifically are intended for general use and exposure, so they would be appropriate to use for potential cloud customers or put out for public consumption and review. A is incorrect because SAS 70 reports have largely been phased out and replaced by SOC 1 reports. When they were in routine use, SAS 70 reports were considered “restricted audience,” and as such would not be appropriate for potential customers or current customers. They were intended for internal audit or regulatory compliance review. B is incorrect because SOC 1 reports are considered restricted-use reports, much the same as their predecessor, the SAS 70 reports. They would not be appropriate for use with potential customers because they are restricted for internal use only and are also focused only on financial controls. C is incorrect because SOC 2 reports are very similar to SOC 3 reports, in that they cover security controls and go beyond the financial control limitation of SOC 1 reports. However, SOC 2 reports are not meant for general use and, in this particular example, potential customers.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 352). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At which stage of the software development lifecycle is the most appropriate place to begin the involvement of security?

A. Requirements gathering
B. Design
C. Testing
D. Development

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 352). McGraw Hill LLC. Kindle Edition.

A

A. Requirements gathering

Explanation:
Security should be involved at all times in the SDLC process, including from the very initial stages of requirements gathering. Security can provide guidance on requirements from the regulatory perspective and the necessary security controls they dictate. By not involving security from the earliest stages, an organization can incur substantial risk for software development because security controls and requirements may be missed or inadequate, requiring later revisions or fixes. This can add additional costs and time to software development projects that are largely avoidable by including security from the onset. It also serves to foster better cooperation and to limit the perception prevalent in many organizations that security is a hindrance or roadblock in development and operations. B is incorrect because at the design stage, specific decisions are made as to which technologies and programming languages will be used with development. At this point, requirements have already been gathered and scoped, and it is very possible that security requirements have been missed or misunderstood. Although this is still early in the process, and changes are much easier to make at this stage than at later stages, it still adds additional time and costs that could have largely been avoided. C is incorrect because by the testing stage, development has been either mostly or completely finished, and it is far too late to start the involvement of security. Although security will play a role in the testing phase as far as vulnerability scanning and evaluation of security controls and their implementations go, many security concerns or requirements will likely have been missed throughout the overall development. Because this stage occurs as a final approval before release to production is approved, any changes in design or code based on discovered security concerns will likely incur substantial costs and delays, and depending on the release and any publicity that may have been done, or requirements to meet required deadlines, these delays can carry significant risk to an organization. D is incorrect because during the development stage, actual coding and implementations are done, based on requirements and decisions made during the design phase. At this stage, the lack of security could lead to a return to the design phase to mitigate concerns or deficiencies, which will in turn delay the project and will likely add additional costs to the overall project.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 353). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not one of the main considerations with data archiving?

A. Format
B. Regulatory requirements
C. Testing
D. Encryption

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 353). McGraw Hill LLC. Kindle Edition.

A

D. Encryption

Explanation:
Although encryption will be used in many archiving solutions and implementations, it is not always a requirement and will be largely subjective, based on the type of data and the archiving method chosen. It is not considered, by itself, to be a major consideration with archiving. A is incorrect because the format of archives is very important to consider, both at the time of archiving and for the long-term considerations involved. The format chosen will have to be one that properly ensures archiving and readability. Failure to pick a format that is recoverable for the duration of the required archiving term will expose an organization to substantial risk for noncompliance with data-retention requirements. B is incorrect because in most instances, requirements for data retention, and possibly even archiving methods, will come from regulatory requirements. Depending on the type of data and its use, regulations will typically require minimum periods of archiving and data retention. In some instances, regulatory requirements will also dictate the time of recovery, in which case regulations will play a large role in the exact methods and technologies chosen for archiving. Also, an organization needs to ensure that it can recover data for the duration of the retention requirements. It serves no purpose and doesn’t satisfy compliance requirements if the data being archived for a period of time cannot be recovered. C is incorrect because in order for an archiving system to be considered valid and sound, it must be tested to ensure restoration and access are functional. Without this level of assurance, there is no point in having the archives in the first place. Testing should be done at regular intervals and follow the same procedures as those used for actual recoveries and restorations.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 353-354). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

While an audit is being conducted, which of the following could cause management and the auditors to change the original plan in order to continue with the audit?

A. Cost overruns
B. Impact on systems
C. Regulatory changes
D. Software version changes

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 354). McGraw Hill LLC. Kindle Edition.

A

B. Impact on systems

Explanation:
During an audit, even after extensive planning and scoping, there may end up being negative impacts on the environment and the performance of systems. Although testing should ideally be done against offline systems, that is not always possible in all environments, and it may cause potential service interruptions or slowdowns with the systems being tested. If this were to occur, it will be a decision by management as to whether to continue with the audit or to modify the scope or approach. A is incorrect because cost issues and budgeting would be completed before the audit begins. Once the audit has begun and the original scope and process are followed, costs should not be a dynamic value and should have no impact on the audit proceeding as planned. C is incorrect because regulatory changes during an actual audit would have no impact on the current audit. Since the audit scope and requirements are done before the audit begins, any changes after that would be captured by future audits. Also, regulatory changes happen over time, and even if new regulations were released during an audit, they would almost certainly have a future implementation and enforcement date. D is incorrect because software changes or releases would be suspended during auditing periods within any organization. Organizations almost always use an audit period as a freeze for configuration and version changes so that the environment is consistent and static while undergoing testing. The exception to this would be limited changes to mitigate auditing findings during the actual audit so that they can be closed before becoming official, but those changes would be very specific and limited in scope.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 354-355). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following threat models has elevation of privilege as one of its key components and concerns?

A. DREAD
B. STRIDE
C. HIPAA
D. SOX

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 355). McGraw Hill LLC. Kindle Edition.

A

B. STRIDE

Explanation:
The E in the acronym for the STRIDE threat model stands for “elevation of privilege.” Elevation of privilege occurs as a threat to applications and systems that use a common login method and then display specific functions or data to users based on their role, with administrative users having the same initial interface as regular users. If the application is not properly coded and performing authorization checks within each function, it is possible for users to authenticate and change their level of access once they are within the application, even gaining administrative access if access controls are not properly enforced. A is incorrect because the DREAD model does not include elevation of privilege. While the DREAD model also contains an E in its acronym, in this instance it represents “exploitability,” which is a quantitative measure of the skills and sources needed for someone to successfully exploit a weakness. The value will be within a range of 0 to 10, with 0 representing extensive knowledge and resources to exploit and 10 representing no specific knowledge or skill required to exploit. C is incorrect because HIPAA refers to the U.S. Health Insurance Portability and Accountability Act of 1996. It covers the privacy and security of patient medical information. D is incorrect because SOX refers to the U.S. Sarbanes-Oxley Act of 2002. SOX is intended to protect the public and shareholders from accounting and fraudulent practices by corporations. In addition, it requires that certain information be disclosed to the public.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 355). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

17.What type of risk assessment is based on a documentation review and making informed judgment calls about risk from operational procedures and system designs?

A. Computational
B. Quantitative
C. Qualitative
D. Cursory

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 356). McGraw Hill LLC. Kindle Edition.

A

C. Qualitative

Explanation:
C. Qualitative risk assessments are based on documentation and other data about systems and applications that are not easily converted into numerical values for comparison. These assessments are often done in situations where an organization does not have the time or money to complete a more exhaustive quantitative assessment. After a thorough review of documentation, systems design, policies, and operational practices, risk categories can be assigned for management review based on the likeliness of threats being exploited as well as the potential damage that could occur if they are successfully exploited. A is incorrect because computational is not a type of risk assessment. B is incorrect because quantitative risk assessments are based on numerical data and metrics. With the availability of quantified data and risks, real calculations can be performed during a quantitative assessment. This will include the values for single loss expectancy (SLE), the annualized rate of occurrence (ARO), and the derived annualized loss expectancy (ALE). These values and calculations can give management hard data and cost numbers to make informed risk mitigation or acceptance decisions. D is incorrect because cursory is not a type of risk assessment.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 356). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following principles must always be included in a SOC 2 auditing report?

A. Security
B. Processing integrity
C. Privacy
D. Availability

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 356). McGraw Hill LLC. Kindle Edition.

A

A. Security

Explanation:
A. The SOC 2 auditing reports are built on a set of five principles: security, processing integrity, privacy, availability, and confidentiality. A SOC 2 audit can include any number of these principles, but under the official guidelines, the security principle must always be included. Within the security principle are seven categories: change management, communications, logical and physical access controls, monitoring of controls, organization and management, risk management and design and implementation of controls, and system operations. B is incorrect because while processing integrity is one of the five principles of the SOC 2 audits, it is not required to be included with any of the other principles. The processing integrity principle is focused on ensuring that data is in its correct format, accurate, and verified and that it has not been altered or modified by unauthorized parties or means. C is incorrect because while privacy is one of the five principles of the SOC 2 audits, it is not required to be included with any others during audits. The privacy principle is focused on personal and private information and ensuring that it is handled per the organization’s policies, as well as per any applicable regulations or laws, during all times—whether it is created, stored, processed, or disposed of by a system or application. D is incorrect because like processing integrity and privacy, availability is one of the five principles of the SOC 2 auditing reports, but it is not a required principle to be included while auditing any others. The availability principle evaluates whether data or functions are available to authorized parties when needed and in such a manner that meets requirements and policies. These requirements and policies can come from either business needs and expectations or in some instances legal or regulatory mandates.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 356-357). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following would be used to isolate test systems from production systems within a cloud environment for testing or development purposes?

A. Sandboxing
B. Application virtualization
C. Firewalling
D. Puppet

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 357). McGraw Hill LLC. Kindle Edition.

A

A. Sandboxing

Explanation:
Sandboxing involves isolating systems and applications from others within the same environment. This is typically done to keep data segregated and inaccessible from other systems, such as keeping production and nonproduction data segregated from each other. This can also be done within environments to keep production data isolated, such as keeping employee data and customer data completely segregated from each other, or in an academic setting, keeping student data and faculty/staff data isolated from each other. The need for isolation can sometimes come from organizational security policies, but in many instances it will be required by regulation. B is incorrect because while application virtualization will keep applications isolated away from operating systems and other applications, it is restricted to the application layer and cannot be used for overall systems. Also, application virtualization will typically be within the same host systems, so any potential compromise of the host system could expose data between the two virtualization containers. C is incorrect because firewalling is used to limit or restrict specific network traffic from making successful inbound or outbound connections, usually with specific ports as well. Although a firewall is a security tool for protecting and isolating traffic, it is not used for segregating and isolating systems or applications as an overall concept like sandboxing is. D is incorrect because Puppet is a tool for maintaining configurations and deployments across systems and applications as well as for enforcing rules and requirements for the configurations. It is not a concept for segregating and isolating systems or applications within an environment.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 357-358). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is not an aspect of static application security testing (SAST)?

A. Access to source code
B. Offline system
C. Knowledge of system configurations
D. Live system

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 358). McGraw Hill LLC. Kindle Edition.

A

D. Live system

Explanation:
SAST is always done against systems that are not live and operational to users or customers. SAST is done by testers with extensive knowledge of systems and how they were coded, and as such, it will typically produce superior results as compared to other types of testing that must use scanning to discover how systems are put together. A is incorrect because the testers performing SAST will have access to the source code and in many instances full knowledge of the SDLC process that the application went through. It is intended to expose programming errors and typical security deficiencies related to coding, such as XSS and injection. B is incorrect because SAST testing is always done against nonproduction systems; these systems will not have production data or users interacting with them. This enables testers to do more invasive and deeper testing than what can be done against live systems because the risk of data corruption or negatively impacting users will not exist with SAST. C is incorrect because one of the key aspects of SAST is the knowledge on the part of the testers of the systems’ configurations and the technologies used. With other types of testing, where this inside knowledge is not present, the testers are limited to the information they are able to expose or glean from scanning and other discovery tools. Relying on scanning and discovery will always pose significant challenges because many other layers of security and complementary systems will likely limit or prohibit a high degree of success for these tools.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 358). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following are the four cloud deployment models?

A. Public, private, hybrid, and community
B. Public, private, internal, and hybrid
C. Internal, external, hybrid, and community
D. Public, private, hybrid, and organizational

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 358-359). McGraw Hill LLC. Kindle Edition.

A

A. Public, private, hybrid, and community

Explanation:
A. The four cloud deployment models are public, private, hybrid, and community. Public cloud deployments are operated and maintained by companies that offer services to the public as a whole, without needing to be part of a special group or population. Many of these offerings are free or mostly free, and many are very commonly known to the public and in widespread use. Someone wanting to leverage a public cloud just needs network access and typically a credit card to purchase services or add-ons. Private clouds are run either by cloud service providers or by the organizations using them. They are not available to the general public and will necessitate a contractual or partnership relationship with the cloud customer. Hybrid clouds are a mixture of two or more of the other cloud models, typically public and private cloud offerings used together. The community cloud model is where cloud services are maintained and offered by an organization or company, which may or may not be a member of the specific community, but services are restricted to a certain population or type of cloud customer, such as universities or members of professional organizations. B is incorrect because while public, private, and hybrid are correct cloud deployment models, there is no “internal” model for cloud deployments. Instead, the correct cloud deployment model is community. C is incorrect because while hybrid and community are correct cloud deployment models, there are no “internal” and “external” cloud models. The other two correct cloud deployment models are public and private. D is incorrect because while public, private, and hybrid are correct cloud deployment models, there is no “organizational” cloud deployment model. Instead, the correct cloud deployment model is community.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 359). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is a commonly used tool for maintaining software versioning and code collaboration?

A. GitHub
B. Chef
C. Puppet
D. Nessus

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 359). McGraw Hill LLC. Kindle Edition.

A

A. GitHub

Explanation:
GitHub is an online code repository that works from both command-line and web-based interfaces. It provides robust access control and many different toolsets for code collaboration, including bug tracking, management tools, and wikis. For code collaboration and management, it offers extensive versioning and branching capabilities and is in widespread use throughout the IT industry. B is incorrect because Chef is a software tool for handling infrastructure configurations. It will often be used in conjunction with GitHub to form a comprehensive management solution for systems and applications, but by itself Chef does not handle code versioning and collaboration. C is incorrect because Puppet is also a software application for handling infrastructure configurations. It works much in the same way as Chef and is used to manage configurations and standards in regard to systems configuration, not to handle code versioning and collaboration. D is incorrect because Nessus is a tool for conducting vulnerability scans, and it does not have anything to do with code collaboration and versioning. Nessus works by taking a large ensemble of known vulnerabilities and scanning against systems to determine if they are vulnerable to them. With the results, application developers and security teams can proactively discover and mitigate security vulnerabilities before a malicious actor is able to exploit them.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 359-360). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is not a core component of an SIEM solution?

A. Correlation
B. Aggregation
C. Compliance
D. Escalation

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 360). McGraw Hill LLC. Kindle Edition.

A

D. Escalation

Explanation:
D. Escalation is the process of moving issues or alerts along a predefined path to others responsible for remediation and action if those prior to them in the chain do not respond. This is done to bring the issues to the attention of management. While SIEM solutions can trigger alerts based on predefined conditions, the full workflow of escalation is handled by an external tool or application, and the role of the SIEM solution would be the initial identification and alert. A is incorrect because correlation is a key component and use of SIEM solutions. An SIEM solution has as a primary function the collecting of logs from many systems throughout an infrastructure. With having data from many different systems, an SIEM solution can easily detect the same pattern or other details across those systems, whereas relying on log files from particular servers would require each server to be analyzed independently. The SIEM solution also allows for the identification of the same types of issues, traffic, or events across a heterogeneous environment. For example, if an IP address is suspected of attempting to attack a system or application, an SIEM solution can correlate the traffic and events across networking devices, servers, firewalls, IPSs, and so on, which otherwise would require different teams and substantial resources to search and would typically take much longer than the rapid nature of a security incident. B is incorrect because a core component of an SIEM solution is the aggregation of events and data from many disparate systems into a single searching and reporting platform. Without an SIEM solution, log data would be held through a data center environment on many different devices, and likely in many different formats. An SIEM solution will collect and aggregate all of that data into a single system that can be searched in a uniform and consolidated manner. This allows an organization to see the same particular traffic or details across the enterprise, without having to search many different systems, as well as being able to search logs (which are likely in many different formats) from a single interface using the same commands. Aggregation in this way allows an organization to analyze data in a much more rapid and efficient manner than would be possible without aggregation. C is incorrect because an SIEM solution is a crucial tool in many organizations for compliance activities. Almost all regulatory systems require activities such as periodic review of log data for specific types of activities. This could include invalid login attempts, account creations, access control changes, and many other types of data points. With an SIEM solution, this reporting is easy to do using the robust search and reporting features as well as leveraging correlation and aggregation to allow a single reporting tool to generate reports across the enterprise and many diverse and disparate systems.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 360-361). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following threat types is the most difficult for an organization to defend against and detect?

A. Data loss
B. Malicious insiders
C. Insecure APIs
D. Account hijacking

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 361). McGraw Hill LLC. Kindle Edition.

A

B. Malicious insiders

Explanation:
A malicious insider is any user of a system, though typically someone with elevated access, who uses their otherwise authorized access for unauthorized means. Because a malicious insider uses authorized access, it is very difficult for an organization or monitoring tool to detect such a vulnerability. Typically, such an attack will only become obvious after it has already been completed and the damage is done. While possessing authorized access, a malicious insider in most instances will also have extensive knowledge of the system or application, as well as the data contained within it, and will know what has the most value and the best ways to compromise it. A is incorrect because data loss can typically be prevented by having in place redundant systems as well as appropriate business continuity and disaster recovery plans. While redundancy can help prevent data loss from happening at all, having robust and comprehensive backups, as well as the means to restore them quickly, will largely mitigate or minimize the effects of any data loss. C is incorrect because proper validation, certification, and testing of APIs will largely mitigate vulnerabilities and prevent successful exploits from ever occurring. Because the APIs of a system are known and selected prior to use, secure requirements and standards can be used in their selection and implementation, ensuring everything is done in a secure manner. The use of appropriate monitoring tools will also go a long way toward preventing insecure APIs from being successfully exploited and mitigating the damage should such exploitation occur. D is incorrect because many methods and tools are available to minimize or prevent account hijacking. Through the use of technologies such as multifactor authentication, the possibility of credentials being stolen and successfully used to access data is very minimal. Even if passwords and user IDs are successfully stolen and obtained by a malicious actor, they will not be in possession of the second factor needed to access the systems or data. Other approaches, such as active alerting for users attempting to access systems from unknown or unique locations, can also make such an attack much more difficult. For example, systems can monitor for the location or origination of login attempts, and any attempt made from outside a typical geographic region (especially from a foreign location) can cause logins for that user to be disabled until they can be validated, even in instances where multifactor authentication is not used.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 361-362). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following storage types are used with Infrastructure as a Service (IaaS)?

A. Structured and unstructured
B. File and database
C. Object and volume
D. Block and striped

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 362). McGraw Hill LLC. Kindle Edition.

A

C. Object and volume

Explanation:
C. IaaS uses object and volume storage types. With volume storage, a logical storage unit will be allocated to the virtual machine, and it will appear to the system, applications, or users as part of the file system. It can then be used as normal storage would in a physical server model, complete with file system organization, permissions, data structures, and any other aspects of a file system. With object storage, data is kept in a flat structure and accessed through the use of opaque tokens, rather than a filename or through a directory structure. This type of storage is often used for media objects such as images, videos, and audio files and is where cloud providers store system images and virtual machine files. A is incorrect because structured and unstructured storage types belong to PaaS, not IaaS. Structured storage is done typically through systems such as databases, which have a set, defined data-organization scheme and are maintained by the cloud provider, with data inserted or created by the cloud customer. Unstructured data does not follow platform-defined structures and is open to the data structures defined by the cloud customer. This will typically be used for web-based systems within a PaaS environment, where the web objects, media files, and components are stored and accessed via the application framework. B is incorrect because while file and database are two common storage methods or concepts, they are higher-level concepts that many other data structures fit within, and they are not part of the formal data structures that IaaS uses. D is incorrect because while block and striped are concepts in computing that relate to data storage and structure, they are not data types themselves, nor are they used and defined within IaaS or other cloud models.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 362-363). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

26.Which of the following data-sanitation approaches is always available within a cloud environment?

A. Physical destruction
B. Shredding
C. Overwriting
D. Cryptographic erasure

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 363). McGraw Hill LLC. Kindle Edition.

A

D. Cryptographic erasure

Explanation:
D. Cryptographic erasure is a means of ensuring data is no longer accessible, and it can always be used within a cloud environment because it is purely a software approach and not dependent on the infrastructure. Rather than a traditional means of overwriting or destroying physical media, cryptographic erasure is performed by encrypting data and then destroying the keys that were used to encrypt it, thus rendering it inaccessible and unreadable. This method, especially where data is already encrypted, is extremely fast and efficient. Whereas deleting large volumes or numbers of files on a system can often take substantial time to complete, in addition to the significant time required for overwriting or ensuring it is deleted, keys can be deleted instantaneously and from where they are housed, sometimes without even accessing the systems holding the actual data. If the data was encrypted with strong encryption, the chances of it ever being accessed again are extremely low; for the most part, it’s virtually impossible. A is incorrect because physical destruction of media is virtually impossible within a cloud environment. With multitenancy and resource pooling, you can be assured that every physical device houses more than one cloud customer. Due to this, the idea of having the cloud provider destroy the physical media housing the data is an impossibility. Also, with how much data is always moving and being balanced within a cloud environment, it is almost impossible to fully determine all the physical locations of data at any one point so that such destruction could even be requested. B is incorrect because shredding is a form of physical destruction of media and, as explained for answer A, would not be possible within a cloud environment. C is incorrect because the realities of a cloud environment, with the use of virtualization and constant balancing and migrating of data, make it impossible to perform overwriting in a manner where it could be ensured that all data is overwritten. It also would be virtually impossible to isolate a particular customer’s data, even if one could determine all the locations of that data, and perform overwriting in a manner that would not impact other tenants within the same environment.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 363). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following technologies will often make elasticity a bigger challenge in a cloud environment?

A. IPS
B. XML accelerator
C. Vulnerability scanner
D. Web application firewall

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 364). McGraw Hill LLC. Kindle Edition.

A

A. IPS

Explanation:
A. The use of intrusion prevention systems (IPSs) can be complicated with elasticity and auto-scaling; as systems are expanded programmatically, it is difficult to ensure that traffic is accurately routed through IPSs and that the correct signatures, policies, and rules are applied. Within a traditional data center, network pathways are known, and routing as well as physical network connections will ensure that the correct paths are always taken. In cloud environments, where the infrastructure is in a constant state of flux, this is far more difficult to achieve. The primary means to implement intrusion prevention to get around the shortcomings of virtual network-based IPSs is through the use of host-based IPSs in a cloud environment. B is incorrect because XML accelerators will be placed around load balancers and will automatically be added as systems are expanded programmatically. This differs from IPSs because it relates to where in the network flow XML accelerators are placed and how the network is routed. XML accelerators also are used in conjunction with established web services, which, regardless of the number of virtual machines accessing them, will remain the same. C is incorrect because elasticity will have no impact on vulnerability scanners, other than changing the number of systems that must be scanned. However, through auto-scaling and elasticity, the server type and purpose will be known, and it is easy to ensure that these systems are added to the lists for vulnerability scanning. D is incorrect because web application firewalls (WAFs) are used based on the purpose of the server, which will be known through auto-scaling. Also, they are often placed in front of servers at the load balancer level, so the number of servers behind the load balancer will not have any direct impact on the use of WAFs.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 364). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

28.Which of the following concepts involves the ability of cloud customers to easily move services from one cloud provider to another?

A. Interoperability
B. Portability
C. Multitenancy
D. Measured service

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 364). McGraw Hill LLC. Kindle Edition.

A

B. Portability

Explanation:
B. Portability is the feature that allows a system to easily move between different cloud providers. This is accomplished by relying on standardized toolsets and platforms and avoiding the use of propriety APIs or other toolsets that will end up binding an organization to a particular cloud provider, making the cost of moving to another substantial, in both time and money.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 365). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

29.What does the S stand for in the STRIDE threat model?

A. Secure
B. Structured
C. Standard
D. Spoofing

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 365). McGraw Hill LLC. Kindle Edition.

A

D. Spoofing

Explanation:
D. The S in the STRIDE threat model stands for “spoofing,” or more specifically, “spoofing identity.” This involves applications that have unique access controls for individual users and administrators, but then within the application they use service accounts or common credentials to communicate with databases, APIs, or other services. In this instance, it is possible for a user to assume the identity of another within the application once authenticated and then make it appear as if that user is accessing resources through the application. To mitigate this threat, the system should continually check the access of a user as they move between interfaces or functions to ensure they have the proper level of access. The system should also check that the identity it assumes the user has actually matches the identity they used to initially authenticate and access the system or application. A is incorrect because the S stands for “spoofing identity” and not for “secure.” While security is obviously a large part of the STRIDE threat model at a high level and is the overarching concept, it is not the actual term used here. B is incorrect because the S stands for “spoofing identity” and not for “structured.” The term structured typically applies to data types, especially for PaaS implementations, where structured and unstructured are the two official data types. C is incorrect because the S stands for “spoofing identity” and not for “standard.” While standard is a term used a lot within security and IT in general, especially as it relates to certifications and best practices, it is not applicable in this instance as part of the STRIDE threat model.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 365-366). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is not a major concern with encryption systems?

A. Integrity
B. Confidentiality
C. Efficiency
D. Key management

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 366). McGraw Hill LLC. Kindle Edition.

A

A. Integrity

Explanation:
A. Encryption is intended to protect the confidentiality and privacy of data first and foremost. While encryption can certainly prevent the unauthorized altering of data at rest, and thus its integrity, that is not its intended purpose. B is incorrect because confidentiality is the main concern and focus of encryption. It is intended to prevent the unauthorized exposure or leakage of data to parties that are not authorized to have it. In order to read data that is encrypted, a party would need to have access to the keys used to encrypt it. Encryption is focused solely on the ability to read data, so it is not used to prevent the encrypted volumes from being intercepted specifically—just the reading and access of the data contained with them. C is incorrect because in order for an encryption system to be usable in a real environment and within applications, it must be easy and efficient to use. That is one of the main benefits and features of encryption. Although an encryption system is virtually unbreakable with current technology and capabilities, if you are in possession of the correct keys, it takes very little overhead to decrypt and read the data. In order to integrate into applications, especially those open to the public and that have larger user bases, this speed and efficiency are absolutely crucial. D is incorrect because key management is one of the central challenges and components of any encryption system. The keys are central to encrypting and then decrypting data, and the corruption, loss, or exposure of the keys will either render the security useless or make the data unrecoverable. Each organization will have to carefully analyze its systems and applications where encryption is used, and based on the particulars of each system and application, where it is hosted, how it is accessed, and many other factors, make the most appropriate decision on how keys will be secured and managed.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 366). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following types of data is the United States’ HIPAA regulations concerned with?

A. Financial
B. Historical
C. Healthcare
D. Hybrid cloud

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 367). McGraw Hill LLC. Kindle Edition.

A

C. Healthcare

Explanation:
C. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States is concerned with the protection of patient privacy and the security involved with the protection of medical records. While a major part of the law protects workers and their families from losing health insurance when they change or lose their jobs, the other major parts of the law that are important in this context are the protection of patient data, the requirements to establish electronic healthcare transactions, and the attempt to standardize identifiers with healthcare institutions. A is incorrect because HIPAA is concerned with healthcare data, not financial data. Other major regulatory and standards systems are concerned with financial data, such as SOX and PCI DSS. B is incorrect because HIPAA has nothing to do with historical data beyond how it relates to healthcare data. As with most regulatory systems, there are requirements for data retention that establish minimum periods of time to maintain data, but the overall focus of the regulations is not “historical” in any sense. D is incorrect because HIPAA was established long before cloud computing came into existence, and it is not focused on specific technologies, but rather on the overall handling of records and security requirements. While HIPAA will certainly apply to any healthcare systems hosted in a hybrid cloud environment, that is not the purpose or focus of the law.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 367). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

32.In a federated environment, which of the following is responsible for consuming authentication tokens?

A. Relying party
B. Identity provider
C. Cloud services broker
D. Authentication provider

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 367). McGraw Hill LLC. Kindle Edition.

A

A. Relying party

Explanation:
A. The relying party in a federated environment is the actual service provider that gives access to secure systems or data. The relying party consumes authentication tokens that are generated by an acceptable identity provider and then grants authorization to access the systems or data based on the successful authentication, and possibly based on specific attributes about the user or entity that are provided by the identity provider, enabling the relying party to make decisions about roles based on predefined configurations. B is incorrect because the identity provider is the generator of authentication tokens in a federated system, not the component that will consume and process them. The role of the identity provider is to perform authentication on users who are known to it, and in many instances to provide additional attributes and information about those users to the relying party so that it can make authorization decisions that are appropriate for the user and the data access they are attempting to use. C is incorrect because a cloud services broker does not play any role in a federated system or environment. The role of a cloud services broker is to take the cloud services offered by public or private cloud providers and then extend or add value to them through integration, aggregation, or by providing customized interfaces or data fields. D is incorrect because authentication provider could be another term for identity provider. Thus, the authentication provider would not be a consumer of authentication tokens, but rather a generator or provider of them.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 367-368). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which phase of the cloud data lifecycle involves processing by a user or application?

A. Create
B. Share
C. Store
D. Use

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 368). McGraw Hill LLC. Kindle Edition.

A

D. Use

Explanation:
D. The Use phase of the cloud data lifecycle is where the data is actually processed or consumed by an application or user. During the Use phase, data will transition between the data-at-rest and data-in-use states and will require additional security as it is exposed and accessed by systems. Therefore, it must be presented in an unencrypted state. This also extends the data security concerns from the server or storage aspect to the client aspect and the security of the specific device or client being used to access the data. Compared to some other phases, the Use phase is considered read-only because any modification or creation would fall under a different phase. A is incorrect because the Create phase is when data is first entered into a system, or modified from a previous form, and thus new data has been created. At the Create phase, the important initial decisions as to data classification are made so that security controls can be immediately placed on the data from the point of conception. These decisions will impact all later phases for the data and will govern much of its use and processing for its lifetime. B is incorrect because the Share phase is where data is made available for systems or applications outside of the original intended ones for the data. Because the data will be leaving the original system and its security enclave, security becomes an important aspect, as it is incumbent on the receiving party to secure it from that point onward. This is typically accomplished from auditing reports and operating agreements that establish security standards and requirements for all parties that will consume and accept the data. C is incorrect because the Store phase is where the data is officially recorded and entered upon its creation. This is usually a simultaneous process, or one that happens immediately after the creation of the data. Data can be entered in many different types of storage, including databases and file systems. Storage must be done with respect to the classification of the data, ensuring that appropriate security controls are in place immediately upon the data being entered. This is also the phase where concepts such as redundancy and backup methods are used on the data.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 368-369). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is not a state of data that is important for security and encryption?

A. Data in use
B. Data in transit
C. Data at rest
D. Data in archive

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 369). McGraw Hill LLC. Kindle Edition.

A

D. Data in archive

Explanation:
Data in archive is not one of the official states of data as it applies to security and encryption. Although the other three states of data in use, data at rest, and data in transit will have implications and applicability to archiving, the concept of archiving is found within them and is not considered a state in and of itself. A is incorrect because data in use is an official state of data. During this state, data is actually consumed and processed by a system or application. As such, additional security controls need to be applied compared to when the data is in static storage. This also exposes the security from the client side because it will be what is viewing the data and in some instances processing the data as well. B is incorrect because data in transit is also an official state of data. During this phase, data will traverse networks and systems, typically between storage and processing entities. During this phase, particular security concerns arise because the data will usually cross systems and networks that are not under the control or security perimeter of the originating organization. This will often be mitigated by the use of encryption, where the entities on both sides are knowledgeable of the keys. This prevents any systems in the middle, or anyone who manages to capture the data, from being able to read or modify it. C is incorrect because data at rest is an official state of data. With this state, the data is contained within storage systems and is not actively being processed or consumed. This is typically the easiest state in which to secure data because technologies such as encryption and isolation can be used to prevent the access or exposure of data.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 369). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is a standard and certification for cryptographic modules?

A. FIPS 199
B. FIPS 140
C. FIPS 201
D. FIPS 153

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 370). McGraw Hill LLC. Kindle Edition.

A

B. FIPS 140

Explanation:
B. FIPS 140 (specifically the current revision, FIPS 140-2) is a processing standard published by the United States government pertaining to the certification of cryptographic modules used within systems. Following this standard, which is contained in four levels, will ensure varying degrees of confidence in the security of cryptographic modules used to encrypt and decrypt data on systems. A is incorrect because FIPS 199 is a U.S. government standard that defines security categories of systems that are used by the government and are not specifically related to cryptographic modules. The FIPS 199 standard establishes low, moderate, and high categories for information systems, and it requires all agencies of the government to evaluate and rate their systems into one of the categories for confidentiality, integrity, and availability security concerns. The highest rating from any of these three areas becomes the overall rating of the system. For example, if a system is rated moderate for confidentiality and availability but high for integrity, then the system as a whole will be considered a high system. C is incorrect because FIPS 201 is a U.S. government standard that establishes guidelines for personal identity verification (PIV) for any employees or contractors of the federal government. The requirements apply to all federal government information systems and applications, with the exception of national security systems, which are covered under their own separate regulations and policies. The PIV standard advocates for the use of smartcard technology as a requirement for any identification systems, extending beyond the typical password requirements into the multifactor realm. D is incorrect because FIPS 153 is a standard relating to 3D graphics and has no impact on or role in cryptographic modules.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 370). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The use of which of the following technologies will not require the security dependency of an operating system other than its own?

A. Management plane
B. Type 1 hypervisor
C. Type 2 hypervisor
D. Virtual machine

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 370). McGraw Hill LLC. Kindle Edition.

A

B. Type 1 hypervisor

Explanation:
B. Type 1 hypervisors run directly attached to the underlying hardware of the host and do not have any software between them or dependencies on external operating systems. With configuration, the Type 1 hypervisor is highly optimized for its intended functions, and all code is removed by the vendor, with the exception of the code explicitly required for it. This removes the complexity and flexibility of operating systems, which even with all unnecessary services and functions disabled or removed will still contain large amounts of code or components that are not needed to operate the hypervisor. The direct tie between the hypervisor and hardware allows the vendors to lock down and patch specific to threats and exploits in their software only, without the need to rely on other libraries or components from operating systems, including being at the mercy of the operating system vendors to appropriately patch their own systems within a reasonable timeframe. A is incorrect because the management plane is a web portal or utility for managing hypervisors that runs within its own systems and software. This creates dependencies on operating systems and application frameworks that will run the portal or utilities, potentially introducing many security vulnerabilities and requiring the reliance on those vendors for timely and comprehensive patching. Because the management plane is used to manage and control hypervisors throughout the environment, any security exploit of it will potentially expose an entire infrastructure or data center to threats and exposure. C is incorrect because Type 2 hypervisors are software-based applications that reside on a host system and then launch virtual machines within them. With this type of configuration, the hypervisor is dependent on the operating system of the host, rather than running directly on top of the hardware with a Type 1 hypervisor. Due to this dependency, the hypervisor is potentially vulnerable to any security exploits that occur with the underlying operating system. Operating systems are also designed to support a wide range of applications and uses. Therefore, they will have large amounts of code and components that are not necessary for the use of the hypervisor, potentially exposing far more possible vulnerabilities to protect and monitor than if the hypervisor was dedicated and running on the hardware directly. D is incorrect because, as part of their nature, virtual machines run under host systems and therefore are dependent on them and are largely at their mercy from a security perspective. Any compromise of the host system can potentially render any virtual machines hosted by it vulnerable as well.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 371). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following threats involves sending untrusted data to a user’s browser in an attempt to have it executed using the user’s permissions and access?

A. Cross-site scripting
B. Injection
C. Unvalidated redirects
D. Man in the middle

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 371). McGraw Hill LLC. Kindle Edition.

A

A. Cross-site scripting

Explanation:
A. Cross-site scripting involves injecting scripts into web pages that are then executed on the client side by the browser. This allows an attack to run scripts using the permissions of the browser and any authenticated sessions to execute. This can expose web applications to potential attacks by allowing the bypassing of some security controls such as same-origin policies as well as by utilizing the credentials of a valid user to execute. B is incorrect because injection attempts involve sending segments of code through input fields in order to have the code executed by the system or application. This is done to attempt to access information and bypass security controls when the input fields are not properly validated or sanitized when submitted by the user. For example, a field may call for the user’s e-mail address, but an attacker may send SQL code in the input field. If the application does not properly validate the input fields, the application may either directly run the code or insert it into the database and then execute it later when a SQL command is run against that field. This can be used by an attacker to expose other database areas beyond those intended, or even to dump entire database fields or file system information back to the malicious actor. C is incorrect because unvalidated redirects occur when an application does not properly validate input and sets up a situation where users can be redirected through this untrusted input to external sites. Through this kind of attack, it is possible for the attacker to steal user credentials and attempt phishing attacks against users as well. Because the user went through a trusted application and was redirected by it, they may not be aware they are no longer sending input to the trusted application and are thus exposing their private data or privileged access. D is incorrect because a man-in-the-middle attack involves the interception of communications between two parties. The attacker attempts to read, alter, or redirect the data flows in such a manner that the parties are unaware it is happening and continue to use the transmissions as they normally would.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 372). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

38.Which of the following involves assigning an opaque value to sensitive data fields to protect confidentiality?

A. Obfuscation
B. Masking
C. Tokenization
D. Anonymization

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 372). McGraw Hill LLC. Kindle Edition.

A

C. Tokenization

Explanation:
C. Tokenization is the process of replacing sensitive data with an opaque or random value, with the ability to map back the value to the original real value. This allows an application to operate in the same manner in which it was coded and to use the same values as keys, but without using the actual real values, which may contain PII or other sensitive data. This can allow an application to conform to confidentiality or privacy requirements without the need for other, more expensive and intensive implementations such as encryption. With the ability to map back tokenized values to the original sensitive values, the system that contains the original mappings or is responsible for generating them must be protected and secured to prevent exposure. A is incorrect because obfuscation involves replacing sensitive or protected data fields with random information, typically for generating data sets for testing in nonproduction systems or other purposes similar in nature. The difference between tokenization and obfuscation is that, with obfuscation, the original mappings to the protected data are not maintained, nor are they important. Although this will be more secure than tokenization because the original mappings are not preserved anywhere, it also means that the data cannot be used in any meaningful way beyond functional testing or development purposes. B is incorrect because masking is another term for obfuscation. D is incorrect because anonymization involves replacing data so that it cannot be successfully mapped back to an individual. It is built on the concept of direct and indirect identifiers. Indirect identifiers are those attributes that by themselves cannot map to a single individual, but a combination of many indirect identifiers could lead to the identification of a specific individual. Anonymization is often used in conjunction with the obfuscation or tokenization of sensitive fields as a way of removing the indirect identifiers to ensure the data sets cannot be mapped back successfully through any means.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 373). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following is not one of the security domains presented within the Cloud Controls Matrix?

A. Financial security
B. Mobile security
C. Data center security
D. Interface security

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 373). McGraw Hill LLC. Kindle Edition.

A

A. Financial security

Explanation:
Financial security is not one of the specific security domains presented as part of the Cloud Controls Matrix (CCM). While many other domains will play into the protection of financial information, there is not a domain that is specifically related to it. This also includes the inclusion of costs as a factor in security, because only security controls and policies are part of the CCM. B is incorrect because mobile security is one of the specific domains outlined in the Cloud Controls Matrix. C is incorrect because data center security is one of the specific domains outlined in the Cloud Controls Matrix. D is incorrect because interface security is one of the specific domains outlined in the Cloud Controls Matrix, specifically labeled as application and interface security.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 373-374). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which ISO/IEC set of standards documents the cloud definitions for staffing and official roles?

A. ISO/IEC 27001
B. ISO/IEC 17788
C. ISO/IEC 17789
D. ISO/IEC 27040

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 374). McGraw Hill LLC. Kindle Edition.

A

B. ISO/IEC 17788

Explanation:
B. ISO/IEC 17788 (specifically the latest revision, ISO/IEC 17788:2014) provides an overview and vocabulary for cloud computing. It defines much of the commonly used cloud terminology, such as service categories and cloud deployment models. A is incorrect because ISO/IEC 27001 is a general security standard that can apply to any type of system in any type of hosting environment. C is incorrect because ISO/IEC 17789 is focused on cloud computing and the reference architecture, including the common features that define cloud computing, such as measured service, broad network access, multitenancy, on-demand self-service, rapid elasticity and scalability, and resource pooling. D is incorrect because ISO/IEC 27040 is focused on security techniques as they relate to storage security.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 374). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following pieces of information is not included as part of PII as a direct identifier?

A. Address
B. ZIP Code
C. Biometric records
D. Phone number

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 374). McGraw Hill LLC. Kindle Edition.

A

B. ZIP Code

Explanation:
B. As they relate to PII, ZIP Codes would not be considered a protected piece of information. A ZIP Code, being a broad geographic area, would not meet the definition required for PII because it solely cannot be used to identify an individual. However, combined with other various pieces of information, a ZIP Code could be used to narrow down information and possibly identify or distinguish an individual from others with similar attributes. A is incorrect because an address relates to a specific resident or location and, as such, can directly identify an individual. C is incorrect because biometrics can immediately and directly identify an individual, and most biometric markers will be unique to a single individual. D is correct because a personal phone number, and in many instances even a business phone number, can be directly tied to a specific individual and, as such, is definitely considered PII.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 374-375). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

42.Which concept pertains to the risk an organization entails in regard to the ability to move between cloud providers at a later date?

A. Interoperability
B. Reversibility
C. Portability
D. Broad network access

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 375). McGraw Hill LLC. Kindle Edition.

A

C. Portability

Explanation:
Portability is the concept that allows a cloud customer to easily move between cloud providers at a later date. Portability takes into account the characteristics and features of a system or application that can lead to vendor lock-in and therefore are aspects that should be avoided. For example, if a cloud customer builds their systems or applications around specific APIs or features that are proprietary to a specific cloud provider, it will be almost impossible for the cloud customer to later move to a different cloud provider without incurring substantial costs in both time and money to change their applications, which would also expose them to significant risk for such an undertaking. A is incorrect because interoperability refers to the ability of a system or application to reuse components from previous versions or other applications in new ways. With this ability, developers can save time and money building applications and components through the use of code that not only is already written but also tested and verified by both users and security scanning. B is incorrect because reversibility refers to the ability of a cloud customer to remove all systems, applications, and data from a cloud environment as well as to ensure that all traces of them have been securely deleted. This is governed by contract terms for the level of assistance that the cloud provider must provide as well as the timeliness of having all tasks completed and verified. D is incorrect because broad network access is one of the core components of cloud computing, but it does not relate at all to moving between cloud providers. Broad network access refers to the ability to access cloud resources and systems from anywhere and over the public Internet, rather than through restricted network tunnels or specific physical networks.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 375). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which cloud computing offering enables a company to offer the lowest possible latency for users to access data from their systems?

A. XML accelerator
B. Edge computing
C. DLP
D. IDS

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 376). McGraw Hill LLC. Kindle Edition.

A

B. Edge computing

ExplanatioN:
B. Edge computing is a computing paradigm that is based on putting the processing of data and computing resources as close to the source of that data as possible. The main purpose of edge computing is to reduce latency by removing the need for data and computing resources to be accessed over remote networks. A is incorrect because an XML accelerator can be used to improve performance of the processing of XML data, but it is not a better answer than edge computing to deliver the lowest latency to customers. C is incorrect because data loss prevention (DLP) is used to prevent the accidental disclosure or leakage of data, but it is not used to lower latency for data access. D is incorrect because an intrusion detection system (IDS) will monitor for possible breaches and attempted breaches, but it will not improve latency for data access.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 376). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

44.Which of the following is not one of the core building blocks of cloud computing?

A. CPU
B. Memory
C. Storage
D. Hardware

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 376). McGraw Hill LLC. Kindle Edition.

A

D. Hardware

Explanation:
D. Hardware is not considered one of the core building blocks of cloud computing. With cloud computing specifically, hardware should not be a concern at all for cloud customers, because they will never interact with it or even have a need to really know what it is. All cloud services are segregated from the hardware layer, and cloud customers are only buying computing resources that are consumable in nature and specific to their computing needs. A is incorrect because CPU is a core building block of cloud computing. When new virtual machines or virtual appliances are provisioned in a cloud environment, one of the main selections made is in regard to their CPU resources. The measured service costs associated with each virtual machine and the aggregate total of CPU resources will tie directly into the costs of hosting with the cloud environment. With the cloud built entirely on virtual and logical infrastructure from the perspective of the cloud customer, CPU allocations per virtual machine can easily be changed with stopping and starting of a virtual machine after configuration changes have been made through the service portal. CPU is part of the resource pooling and is shared between the tenants of the cloud environment. B is incorrect because memory is a core building block of cloud computing. Much like CPU resources, memory is configured per virtual machine, and the individual or aggregate totals will tie into the cost structure for the cloud customer. Memory can also be changed after the provisioning configurations have been updated by a simple stopping and starting of the virtual machine instance. Memory is part of the resource pooling and is shared among the tenants of the cloud environment. D is incorrect because storage is also part of the pooled resources of a cloud infrastructure, and it shares similar qualities to memory and CPU as far as ease of changes and modifications after initial builds. Depending on the cloud service category, storage will come in different formats, and billing may differ as a unit cost based on the type of storage selected.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 376-377). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

You have been tasked with creating an audit scope statement and are making your project outline. Which of the following is not typically included in an audit scope statement?

A. Statement of purpose
B. Deliverables
C. Classification
D. Costs

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 377). McGraw Hill LLC. Kindle Edition.

A

D. Costs

Explanation:
D. The audit scope statement focuses on the reasons and goals for conducting the audit, and the costs associated with the audit are handled under different processes. By the time an audit scope statement is being worked out between the organization and the auditor, costs will have already been determined and the scope will focus on the technical and procedural details of the audit. A is incorrect because the statement of purpose is the first step in the audit scope statement. The statement of purpose covers the reason for the audit. Typically, audits can be conducted either for internal purposes of the organization and at the organization’s own request or they can be conducted to fulfill requirements from regulations. In the case of regulations, the statement of purpose, as well as many aspects of the audit scope as a whole, may be dictated by the regulatory requirements pertinent to the type of application or data under review. B is incorrect because deliverables are a key component to an audit scope statement. While all audits will ultimately result in the production of certain reports, these reports can differ greatly based on the audience or purpose of the audit. The scope will cover the format of the deliverables, which can be textual reports, presentations, or even formatted specifically for import into software applications for tracking. This also includes who should receive the reports in the end. In most instances, even if they are done for regulatory reasons, unless the auditors are tied directly to the regulators, the reports will first go to management for review and will then be made known to the regulators. C is incorrect because the classification of the data, as well as the reports produced, is a key consideration of an audit scope. Under most regulatory systems, the classification of the data will directly tie into the type and scope of audit as well as to what degree specific security controls are tested and what is required of them. When the report is ultimately produced, it could fall under classification requirements as well, depending on the system and data. Audit reports should be well protected at all times because they essentially contain information about verified and perceived weaknesses of the security controls employed on a system as well as information pertaining to specific threats and the likeliness of their successful exploit.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 377-378). McGraw Hill LLC. Kindle Edition.

46
Q

46.With a multifactor authentication system, which of the following would not be appropriate as a secondary factor after a password is used?

A. Fingerprint
B. RSA token
C. Text message
D. PIN code

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 378). McGraw Hill LLC. Kindle Edition.

A

D. PIN code

Explanation:
A PIN could not be used as part of a multifactor authentication system if a password is also used because a PIN is essentially a type of numeric password, so both would be in the same category of authentication types—in this case, something “known” to the user. A is incorrect because a fingerprint could be used along with a password for multifactor authentication. The password would be something “known” to the user, while the fingerprint would be something in the user’s possession as well as being a biometric factor. B is incorrect because an RSA token could be used as secondary factor with multifactor authentication if a password is used as well. The RSA token represents a PIN code, and the user would need to be in possession of the token in order to know the regularly changing PIN code that the token has at the time the PIN code needs to be entered. This would satisfy the multifactor requirements because the password would constitute something “known” to the user and the RSA token would be something in possession of the user. C is incorrect because the use of a text message as a secondary factor along with a password would satisfy the requirement for multifactor authentication. To receive the text message with a secondary code, the user would need to be in possession of a preregistered device, which would be something in their possession. Because the device would have to be preregistered with the system to receive the text code, this also is a robust security system because it would negate someone from getting a new device and then trying to use it to access the system.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 378). McGraw Hill LLC. Kindle Edition.

47
Q

Which of the following ISO/IEC standards pertains to eDiscovery processes and best practices?

A. ISO/IEC 27050
B. ISO/IEC 17789
C. ISO/IEC 27001
D. ISO/IEC 17788

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 379). McGraw Hill LLC. Kindle Edition.

A

A. ISO/IEC 27050

Explanation:
A. ISO/IEC 27050 is a standard focused on eDiscovery processes and how best to approach an order. The goal of the standard is to establish common terminology, give an overview of the eDiscovery process, and then provide guidance and best practices for conducting the data collection, including discovery, preservation, and analysis. B is incorrect because ISO/IEC 17789 provides a reference architecture for cloud computing and is focused on general cloud computing design and implementation. While some information contained would be useful in some instances of eDiscovery, the standard itself does not address eDiscovery at all or provide any guidance toward it. C is incorrect because ISO/IEC 27001 is focused on general security principles and best practices and does not have any specific guidance or focus on eDiscovery processes or anything that is involved with them. D is incorrect because ISO/IEC 17788 provides terminology and definitions for cloud computing in general but does not have any focus on or sections pertaining to eDiscovery at all.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 379). McGraw Hill LLC. Kindle Edition.

48
Q

48.Which of the following is not one of the cloud computing activities, as outlined in ISO/IEC 17789?

A. Cloud service provider
B. Cloud service partner
C. Cloud service administrator
D. Cloud service customer

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 379). McGraw Hill LLC. Kindle Edition.

A

C. Cloud service administrator

Explanation:
C. The activity of a cloud service administrator is not one of the defined cloud computing activities in ISO/IEC 17789. A is incorrect because the cloud service provider is an official role established in ISO/IEC 17789. The cloud service provider is the entity that makes cloud services available to users or customers, regardless of the cloud deployment model or hosting model used. B is incorrect because the cloud service partner is an official role established in ISO/IEC 17789. The cloud service partner is defined as an entity that assists the cloud service customer or the cloud service provider, or both, in the delivery of cloud services. D is incorrect because the cloud service customer is an official role established in ISO/IEC 17789. The cloud service customer is defined as any entity that has a business relationship for the use of cloud services.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 379-380). McGraw Hill LLC. Kindle Edition.

49
Q

Which act relates to the use and protection of PII with financial institutions?

A. SOX
B. GLBA
C. HIPAA
D. PCI DSS

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 380). McGraw Hill LLC. Kindle Edition.

A

B. GLBA

Explanation:
The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Modernization Act of 1999, is specifically focused on the use of PII by financial institutions and the necessary requirements for the protection of it. The act contains what is known as the Safeguards Rule, which puts the specific requirements and burdens on financial institutions to protect the privacy and personal information of their customers. The act also requires regular notification of the privacy practices of financial institutions as well as with whom they share personal information and for what purposes. A is incorrect because the Sarbanes-Oxley Act (SOX) is focused on the protection of stakeholders and shareholders from financial irregularities, improper practices, and errors by organizations. The act also outlines specific requirements for data retention and preservation of financial and system records. C is incorrect because the Health Insurance Portability and Accountability Act (HIPAA) is focused on privacy and personal information as it relates to healthcare and health records. It has no bearing on financial institutions at all. D is incorrect because PCI DSS is a financial industry regulation as it pertains to organizations that accept credit card payments from the major credit network providers. It is focused on security requirements and records retention for those types of transactions specifically and does not apply to personal data or the financial sector in general.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 380). McGraw Hill LLC. Kindle Edition.

50
Q

Which of the following is not one of the cloud service capabilities?

A. Infrastructure
B. Network
C. Platform
D. Software

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 380). McGraw Hill LLC. Kindle Edition.

A

B. Network

Explanation:
B. Network is not a defined cloud service capability. Network services are a major component of cloud computing in general, and all service capabilities heavily use and depend on network services, but network is not a standalone category. A is incorrect because infrastructure is one of the three cloud service capabilities. This is why Infrastructure as a Service is one of the three main cloud service categories, where the cloud provider is responsible for the physical environment and making services available, but the cloud customer is responsible for the virtual machines, configurations, storage, and almost all aspects of maintenance. C is incorrect because platform is one of the three cloud service capabilities. Platform as a Service, being one of the main cloud service categories, is where the cloud provider makes available to the cloud customer virtual machines with application frameworks installed and configured, where the cloud customer just needs to load their application code and data. The cloud service provider is responsible for the patching and maintenance of the virtual machines and the associated frameworks running on them. D is incorrect because software is one of the three cloud service capabilities. Software as a Service is one of the main cloud service categories, and one where the cloud provider is responsible for the infrastructure up through the fully functional application. The cloud customer may have limited configuration or default settings to leverage but otherwise is responsible for importing or loading applicable data and then for user account management.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 380-381). McGraw Hill LLC. Kindle Edition.

51
Q

Which of the following would not be used to determine the classification of data?

A. Metadata
B. PII
C. Creator
D. Future use

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 381). McGraw Hill LLC. Kindle Edition.

A

D. Future use

Explanation:
D. The future use or intended use of data should have no bearing on the classification of it. The classification of data should be based on the sensitivity of the data, any regulatory requirements, and the potential risks and costs associated with compromise. Applications and services that intend to use data must adapt their security controls and policies to the classification of the data. The data should not be classified based on the demands or needs of specific applications or users. A is incorrect because metadata is one of the keys for classifying data. Information about the creation of data, the time of creation, who created the data, where and how it is stored, and the specific fields involved all play heavily into data classification, and all fall under the concept of metadata. B is incorrect because any data that contains PII will automatically have legal or regulatory requirements placed on it for data classification. In most regulatory systems, the inclusion of PII will have automatic ramifications on the classification level of the data and the necessary security controls that must be used on it. C is incorrect because the creator of data can definitely have an impact on the classification level of it. For example, if the creator of data is a doctor’s office and the nature of the data is healthcare related, then the data will automatically assume certain data classification requirements.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 381-382). McGraw Hill LLC. Kindle Edition.

52
Q

What is the prevailing factor for determining which regulations apply to data that is housed in a cloud environment?

A. PII
B. Classification
C. Population
D. Location

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 382). McGraw Hill LLC. Kindle Edition.

A

D. Location

Explanation:
D. The location of the data, and any jurisdictions that the location falls under, will always be the prevailing factor for determining which regulations apply to it, regardless of what type of data it is. A is incorrect because while PII will have a definite impact on the regulations that apply to data, it is a subsection of the overall data classification requirements. B is incorrect because the classification of the data will always have a major impact on the regulations that apply to it, but the jurisdiction, based on location, is ultimately what makes that determination. C is incorrect because while the population of the data can certainly have an impact on the regulations that apply to it, it is a subset of the overall data classification requirements.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 382). McGraw Hill LLC. Kindle Edition.

53
Q

Which concept involves applying standardized configurations and settings to systems to ensure compliance with policy or regulatory requirements?

A. Images
B. Repudiation
C. Baselines
D. Interoperability

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 382). McGraw Hill LLC. Kindle Edition.

A

C. Baselines

Explanation:
C. Baselines are set configuration standards and requirements that apply to a system or application. Baselines are often part of regulatory or legal requirements and oftentimes follow published industry standard guidelines. A is incorrect because images form the basis for virtual machines but are the end result of applied configurations and requirements, not the mechanism for applying or ensuring their compliance. B is incorrect because repudiation deals with the verifiability of an individual and proof of their activities and does not have any impact or bearing on system configurations or regulatory requirements, though repudiation and nonrepudiation may certainly be themes of regulatory requirements. D is incorrect because interoperability has to do with the ability of systems or applications to reuse components or code to make development simpler, more granular and efficient, and less costly. It does not have anything to do with regulatory requirements or their enforcement.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 382-383). McGraw Hill LLC. Kindle Edition.

54
Q

Your company has just been served with an eDiscovery order to collect event data and other pertinent information from your application during a specific period of time, to be used as potential evidence for a court proceeding. Which of the following, apart from ensuring that you collect all pertinent data, would be the most important consideration?

A. Encryption
B. Chain of custody
C. Compression
D. Confidentiality

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 383). McGraw Hill LLC. Kindle Edition.

A

B. Chain of custody

Explanation:
B. When a company is dealing with eDiscovery orders, the chain of custody is extremely important as it pertains to official legal proceedings. The chain of custody documents everyone who has had possession of the data, in what format, and for what reasons. For data to be admissible for legal proceedings, the chain of custody is vital in showing that nothing has been tampered with and that everyone in possession of the data can be questioned and investigated, if needed. A is incorrect because although encryption may be used as part of eDiscovery to sign, preserve, and protect any evidence that is collected and turned over, especially if the data is sensitive, in general it is not a required element of eDiscovery. C is incorrect because although compression may be used when preserving and submitting evidence pursuant to the order, it is not a required element and will have no bearing on the overall process of eDiscovery. D is incorrect because confidentiality may or may not be a factor with eDiscovery, depending on the nature of the data requested and the types of systems involved.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 383). McGraw Hill LLC. Kindle Edition.

55
Q

Which of the following concepts will ensure that no single host or cloud customer can consume enough resources to impact other users on the same system?

A. Limits
B. Multitenancy
C. Reservations
D. Shares

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 383). McGraw Hill LLC. Kindle Edition.

A

A. Limits

Explanation:
A. Limits are put in place to enforce the maximum amount of compute resources that any one tenant or system can consume. The limits can be placed on various levels and units, ranging from a specific virtual machine to a cloud customer for the aggregate of their utilization across all systems. They are designed to ensure that no single host or customer can utilize enormous resources that will ultimately make the cloud provider unable to properly allocate resources and serve the needs of other cloud customers. B is incorrect because multitenancy is the larger concept that deals with hosting multiple, different cloud customers within the same cloud environment. While it is certainly the driving reason why the need for balancing resource allocations is necessary, that concept itself does not play into the specific details of implementations like this. C is incorrect because a reservation is the minimum amount of resources guaranteed to a cloud customer within the environment. A reservation will typically guarantee to a cloud customer that they will have the minimum required resources necessary to power on and operate their services within the environment. Reservations also offer insurance against denial of service (DoS) attacks or other customers using such large amounts of resources that the cloud customer cannot operate their services. D is incorrect because shares are focused on cloud customers requesting more resources for allocation and provisioning than are currently available in the environment. Shares establish a prioritization and weighting system, defined by the cloud provider, that determines which systems, applications, and customers will receive priority for additional resource requests when utilization is high and resources are limited.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 384). McGraw Hill LLC. Kindle Edition.

56
Q

Which of the following roles is responsible in many organizations for overseeing access requests for data utilization and ensuring that policies are followed and proper approvals are granted?

A. Data owner
B. Data steward
C. Data processor
D. Data controller

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 384). McGraw Hill LLC. Kindle Edition.

A

B. Data steward

Explanation:
B. The data steward is responsible for overseeing an organization’s policy in regard to data access as well as for evaluating access requests and matching them with organizational policy to ensure compliance and proper use. If the business purpose is acceptable, the data steward is responsible for ensuring that appropriate approvals have been obtained and documented as well. A is incorrect because while the data owner has final authority and responsibility over data policies and access, the data steward is the position officially designated for directly carrying out those duties. The data owner is responsible for establishing the risk management approach to data security and access in conjunction with management and then matching this to the organizational policies or regulatory requirements. C is incorrect because the data processor is the one who actually uses the data within an application or service. As the consumer of the data, the data processor does not play a role in granting data access or policy enforcement. D is incorrect because the term data controller is synonymous with data owner; they have the same duties and responsibilities.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 384-385). McGraw Hill LLC. Kindle Edition.

57
Q

57.To optimize auto-scaling capabilities of a cloud deployment, when would the optimal time be to apply baselines to systems?

A. Immediately after enabling the virtual machine
B. Before penetration testing is done
C. Immediately prior to putting services into production
D. Before the image is created

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 385). McGraw Hill LLC. Kindle Edition.

A

D. Before the image is created

Explanation:
D. The optimal time for the application of baselines for use with auto-scaling is before the image is created that will be used in production. With auto-scaling, you want the systems ready to be used with minimal additional configurations as soon as they are enabled within the cloud. Applying baselines, along with verification of them before the image is created to be used, will alleviate the need to do so after a new virtual machine is powered on as well as increase the immediate availability of it. A is incorrect because applying baselines after a virtual machine is brought online would dramatically delay the availability of the new system and create additional work and processing that are needed before it can be used. This would negate the intended goal and purposes of auto-scaling. B is incorrect because penetration testing would not be done immediately upon new systems enabled via auto-scaling. Certainly, penetration testing against the image, before it is created and finalized for use with auto-scaling, is desirable, but the correct time is not as a post-process after the image is enabled. C is incorrect because doing baseline applications after a new virtual machine is enabled would negate the benefits and speed of auto-scaling, and with the use of an image for all new systems, this would create redundant work versus doing the baseline application before the image is finalized.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 385). McGraw Hill LLC. Kindle Edition.

58
Q

Which of the following is directly part of the “metered” costs associated with PaaS?

A. Staffing
B. Development
C. Licensing
D. Auditing

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 386). McGraw Hill LLC. Kindle Edition.

A

C. Licensing

Explanation:
C. With PaaS, the cloud provider is giving the cloud customer a fully functioning environment, including the operating system and any middleware or application framework components. As part of the services, the licensing costs and tracking are the responsibility of the cloud provider and are factored into the metered costs of the cloud customer. A is incorrect because staffing comes in many different forms, with many different parties involved. Within cloud computing, although the cloud provider has staffing to maintain the environment, due to self-service provisioning, staffing is not needed as additional virtual machines are brought online or new services provisioned; this is all handled through automated processes. B is incorrect because development is not part of the services from a cloud provider, nor is it included in the costs from the cloud provider for cloud services. Development would be done under its own contract, or possibly even under contracts that incorporate the costs of the cloud hosting services as well. However, it would not be a direct part of the metered services from the cloud provider as additional resources are allocated or provisioned. D is incorrect because auditing is part of all cloud server categories and is documented in the contract and SLA requirements. It is not a specific part of any one category over another, though it can differ in scope based on the specific category used. Regardless, it does not relate to the metered costs of any cloud category.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 386). McGraw Hill LLC. Kindle Edition.

59
Q

59.Many highly regulated data types and systems will have specialized regulatory requirements that extend further than the regulatory requirements that apply to all data. Which of the following is not a specialized regulatory framework that has its own compliance requirements?

A. FedRAMP
B. HIPAA
C. FIPS 140-2
D. PCI DSS

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 386). McGraw Hill LLC. Kindle Edition.

A

C. FIPS 140-2

Explanation:
C. FIPS 140-2 is a certification for cryptographic modules based on the specific needs and requirements for the level of encryption and the protection of them. It is based on both software and hardware requirements and the level of control, features, and protections that each has. It is not a regulatory framework with compliance requirements. A is incorrect because FedRAMP is a regulatory framework that the United States federal government uses to assess and certify cloud services for its use by federal agencies. As part of FedRAMP, there is a certification process for low and moderate systems, as well as high systems as of 2016, to meet requirements and auditing. One aspect of FedRAMP is that it was designed for use by any federal agency once a provider had been certified, removing the need for each agency to conduct its own certifications and audits of the cloud services provider. FedRAMP is available for use by civilian agencies and can be used for data and systems other than those for national defense. B is incorrect because HIPAA relates to regulated healthcare and personal data within the United States, and it sets strict and extensive requirements for how this data must be protected. It is specialized for healthcare data and supersedes any other regulatory requirements to which a system or data might be subjected. As part of HIPAA regulations, data controllers are subjected to increased scrutiny for the methods and processes they use to protect personal and patient data. D is incorrect because PCI DSS is an industry-specific regulation and oversight framework, established by the major credit card companies and networks, and is a requirement for any business that conducts transactions over those networks.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 386-387). McGraw Hill LLC. Kindle Edition.

60
Q

Which cloud deployment model offers the most control and ownership over systems and operations for an organization?

A. Private
B. Public
C. Community
D. Hybrid

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 387). McGraw Hill LLC. Kindle Edition.

A

A. Private

Explanation:
A. Private clouds offer the most control and ownership for an organization. With a private cloud, an organization will either have sole ownership or be a strategic paying partner with the entity running the cloud and thus have much more influence and input into decisions and policies than any other model affords. B is incorrect because an organization would have very little say, or possibly even no say, in how a public cloud operates or functions. Public clouds typically offer free services to the public at large, or offer services to any customer willing to pay. With the large number of customers or free services offered, it is not possible for a public cloud to take into account individual demands from customers or for customers to have any reasonable expectation of their demands being met. Public clouds are intended to serve mass populations and to do so cheaply and efficiently. They are not intended for a large degree of customization or for adapting to the particular needs of individual customers. C in incorrect because while a community cloud will typically offer customers a higher degree of input and influence than a public cloud, it will not match what a private cloud can offer. While a community cloud will usually have a smaller subset of users, who share many common traits, it is still bound to serve multiple different customers with their own needs, desires, and expectations. Any requested changes by one customer would almost certainly have an impact on other customers, so it is difficult to allow customers to have significant influence for particular needs or requests. D is incorrect because a hybrid cloud itself is not an entity that an organization could have influence over; it is a concept that involves the use of multiple cloud deployment models. As such, the positives and negatives of each environment would be combined within a hybrid cloud and ultimately would minimize the level of influence a cloud customer could have.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 387-388). McGraw Hill LLC. Kindle Edition.

61
Q

Which of the following is encryption most intended to address?

A. Integrity
B. Availability
C. Data loss
D. Confidentiality

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 388). McGraw Hill LLC. Kindle Edition.

A

D. Confidentiality

Explanation:
D. The purpose of encryption, first and foremost, is to prevent the unauthorized viewing of data. While encryption can be a useful tool when used in conjunction with other tools (for digital signing and nonrepudiation, for example), the protection against unauthorized access to data is its primary intended use and focus. With the use of modern and strong encryption techniques, along with the proper protection of keys, data can easily and efficiently be rendered inaccessible and virtually unbreakable. A is incorrect because encryption is not focused on integrity, or useful to protect it, in any reasonable sense. Encryption is focused solely on the confidentiality aspect of security overall. While it will prevent a user from accessing the data to modify it, especially while the data is at rest, it is not a tool that can be used with an application or live environment to prevent the unauthorized modification of data once it is accessible. B is incorrect because encryption will not promote or assist in availability at all. Instead, it is merely designed to protect the confidentiality of data. C is incorrect because encryption will not prevent the destruction or deletion of data at all.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 388). McGraw Hill LLC. Kindle Edition.

62
Q

To test some new application features, you want to isolate applications within the cloud environment from other applications and systems. Which of the following approaches would be the most appropriate to accomplish this?

A. Sandboxing
B. Application virtualization
C. Honeypot
D. Federation

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 389). McGraw Hill LLC. Kindle Edition.

A

B. Application virtualization

Explanation:
B. Application virtualization allows you to run parallel application deployments in the same environment for the purposes of testing new features or patches. It differs from sandboxing because it does not require distinct systems or segregated networks to function, and it can be focused purely at the application level. It takes far fewer resources to set up and use than sandboxing. A is incorrect because sandboxing goes far beyond isolating applications for testing. With sandboxing, you are setting up totally separate and distinct virtual machines, and in most cases network isolation as well. Although sandboxing could be used to test new features for applications, it goes far beyond that mandate. Therefore, application virtualization is a more appropriate approach to take. C is incorrect because a honeypot does not have anything to do with the testing of new application features or the isolation of them. A honeypot is a security concept of setting up servers and data that appear to be legitimate production systems in order to entice attackers to go after them instead of the real systems. The security team can then use the attacks and traffic they see going against the honeypot to block sources or refine security controls and configurations of the actual production systems. D is incorrect because a federation is a concept within identity and access management and does not have any relationship to or impact on application isolation or testing.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 389). McGraw Hill LLC. Kindle Edition.

63
Q

Which of the following would not be included as input into the requirements gathering for an application or system?

A. Users
B. Management
C. Regulators
D. Auditors

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 389). McGraw Hill LLC. Kindle Edition.

A

D. Auditors

Explanation:
Auditors would not be included or considered during the collection of requirements for an application or system. While auditors will play a role later in any new design or modification by ensuring compliance with regulation and policy, they would not be involved at an early stage at all. The role of an auditor is to validate configurations, policies, and practices against the regulations they are designed to comply with as well as to establish a gap analysis between the desired and actual state of the system or application, not to be involved with design or development decisions. A is incorrect because users would be a primary concern and focus during the requirements-gathering stage of a system or application. Input from users, as the ultimate consumers of the system, is vital for a system to work efficiently and easily, with features that consumers find beneficial and productive. Without the input of users, stakeholders and developers are left to assume their decisions are what people will ultimately desire and need, and substantial gaps between their perceptions and the perceptions of users are very likely. This could lead to a system that does not meet expectations, or even ultimately fails to catch on with consumers. B is incorrect because management has the major financial role and responsibility to both shareholders and users of a system or application. While the users and their satisfaction will ultimately decide the fate or success of an application, management sets the direction and desired features of the application as well as ensures compliance with regulators. Management also has the responsibility for protecting both personal and financial data, and it needs to be heavily involved at all stages to set priorities and budgets for development as well as to make decisions as to which requirements to focus on and which might be deferred to a later version or update. C is incorrect because regulators and the regulations they enforce will have a strong influence on all aspects of an application in regard to security and policies. Many of the features and configurations of a system or application will be driven directly by regulations, or at least choices in approach will be limited by regulations.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 389-390). McGraw Hill LLC. Kindle Edition.

64
Q

Which phase of the SDLC process includes the selection of the application framework and programming languages to be used for the application?

A. Requirement gathering
B. Development
C. Design
D. Requirement analysis

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 390). McGraw Hill LLC. Kindle Edition.

A

D. Requirement analysis

Explanation:
D. The requirement analysis phase is where the specific hardware and software platforms with which the programmers will work are decided, along with the specific functionality and features that are expected. This will then be used during the design phase for the programmers to plan the actual coding and methodology to develop the application around to meet the design requirements. A is incorrect because the requirement-gathering phase is where the mandatory requirements and success criteria for the development and overall project are decided. This involves representation from all stakeholder groups as well as an analysis of any regulatory requirements that must be adhered to. The overall budget and timeline for the project are also decided at this phase. B is incorrect because the development phase is where the actual coding of the application occurs and where the executable code is compiled. As each segment of code is completed and each milestone reached, functional testing is completed against the code to ensure that it functions as designed and required. The development phase is typically the longest phase of the SDLC process. C is incorrect because the design phase is where the requirements for and decisions on platforms and technologies are combined to form a project plan to create the actual code. This phase also includes the merging of security and risk management concerns into the overall plan as well as the testing and validation to be completed during the development phase.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 390-391). McGraw Hill LLC. Kindle Edition.

65
Q

65.Which regulation was designed to optimize personal privacy of, and control over, personal data?

A. GDPR
B. HIPAA
C. SOX
D. GLBA

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 391). McGraw Hill LLC. Kindle Edition.

A

A. GDPR

Explanation:
A. The General Data Protection Regulation (GDPR; EU 2016/679) is a regulation, covering the European Union and the European Economic Area, pertaining to data protection and privacy. The GDPR is a uniform regulation throughout the EU and covers all countries, citizens, and areas under its jurisdiction, regardless of where the data is created, processed, or stored. The regulation places the burden for technical and operational controls on the entities using and storing the data for the protection and enforcement of it. Under the GDPR, organizations must make it known to users what data they are collecting and for what purpose, whether it will be shared with any third parties, and what their policies are for data retention. The GDPR grants the right to individuals to obtain a copy of the data that an organization is storing in regard to themselves as well as the right to request deletion of the data in most instances. B is incorrect because the Health Insurance Portability and Accountability Act (HIPAA) is focused on healthcare data and the privacy and protection of patient data by covered healthcare professionals. It does not pertain to the privacy regulations regarding the European Union. C is incorrect because the Sarbanes-Oxley Act (SOX) pertains to financial and accounting records and their transparency to regulators and shareholders. It involves reporting requirements and data-retention requirements and does not pertain to the privacy of individuals or interactions with the European Union at all. D is incorrect because the Gramm-Leach-Bliley Act (GLBA) pertains to PII and financial institutions. It requires that financial institutions provide all users and customers with a copy of their privacy policy and practices, including when and with whom customer information may be shared. It also puts the burden on financial institutions for adequate security controls and oversight of any personal data they collect or store from customers.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 391-392). McGraw Hill LLC. Kindle Edition.

66
Q

Which concept involves the maintenance of resources within a cloud environment to ensure resources are available when and where needed?

A. Dynamic optimization
B. Auto-scaling
C. Elasticity
D. Resource pooling

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 392). McGraw Hill LLC. Kindle Edition.

A

A. Dynamic optimization

Explanation:
A. Dynamic optimization is the continual and automatic process within a cloud environment of shifting resources and virtual machines between physical hosts and resources to ensure a proper balance is maintained. This ensures that a single physical host or a subset of physical hosts does not become maxed out on resources and thus impact other customers or virtual machines on the same host. This ensures availability and auto-scaling and makes sure any provisioning requests are able to be met as they come in from customers. B is incorrect because auto-scaling pertains to the automatic and programmatic mechanisms for scaling up or down a system or application based on load and demand. It pertains only to the system or application in question and does not pertain to the resources of the overall environment or to meeting the needs of each tenant. C is incorrect because elasticity refers to the ability of the environment to provision and de-provision resources to meet current needs in a programmatic and automated way. If elasticity is implemented correctly, the systems and applications should ideally have the exact resources they need at any time and not have an excess or deficit of resources. D is incorrect because resource pooling refers to the overall sharing of the aggregate resources available in a cloud environment between all the individual tenants of the environment. It refers to the overall allocation of resources and is not related to the ability to adapt to specific situations or demands on a system or application.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 392). McGraw Hill LLC. Kindle Edition.

67
Q

67.Which type of storage with IaaS will be maintained by the cloud provider and referenced with a key value?

A. Structured
B. Object
C. Volume
D. Unstructured

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 392-393). McGraw Hill LLC. Kindle Edition.

A

B. Object

Explanation:
B. Object storage is a type of IaaS storage where files and objects are physically stored on a separate system and are referenced by a key or token value. It differs from traditional storage, as it does not contain any organizational or hierarchical capabilities; instead, everything is stored in a flat system with a token or key as the only reference for access. It is heavily used for media objects such as pictures and videos as well as for the storage of larger files where organization is not relevant, such as virtual machine image files. A is incorrect because structured is a type of storage under Platform as a Service, and it is typically related to storage types such as databases that have defined structures and rules pertaining to how the data is organized and stored. C is incorrect because while volume storage is a type used under IaaS, it involves and resembles traditional storage, with a file system and tree structure where data can be organized and accessed in the same manner as a traditional server (by pathname and filename). D is incorrect because unstructured is a type of storage under PaaS that is used for handling data objects that will not fit within a structured system. This includes websites and web pages, their associated components, media files, images, and anything else that will not fit within a typical database paradigm.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 393). McGraw Hill LLC. Kindle Edition.

68
Q

68.A company has the need to restrict access to administrative systems based on the physical location of an engineer. Which concept will enable the company to accomplish this?

A. RFID
B. Broad network access
C. Geolocation
D. Geofencing

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 393). McGraw Hill LLC. Kindle Edition.

A

D. Geofencing

Explanation:
D. Geofencing is the use of location technology, such as Wi-Fi, cellular networks, RFID tags, IP address locations, or GPS, to control access to or the behavior of devices. By using geofencing, a company can implement additional security layers by only allowing the use of certain devices or actions in specific areas, such as in a company’s office location. A is incorrect because although RFID is one technology that can be used to implement geofencing, it is not the best answer. B is incorrect because broad network access refers to the overall ability to access cloud services from anywhere with network access. Therefore, it is not pertinent to the question. C is incorrect because although geolocation will serve to tell a system where a user is located and connecting from, it will not allow for the implementation of security measures by itself.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 393). McGraw Hill LLC. Kindle Edition.

69
Q

69.When an audit plan is being prepared, four distinct steps are done in sequence. Which of the following is the second step, after the defining of objectives?

A. Define scope
B. Conduct audit
C. Identify stakeholders
D. Gather documentation

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 394). McGraw Hill LLC. Kindle Edition.

A

A. Define scope

Explanation:
A. After the objectives within an audit have been defined, the defining of the scope is the next step. This involves the specifics of what is to be tested as well as all the details about how and when it will be tested. B is incorrect because conducting the audit occurs after both the scope and objectives have been defined, which will serve as the roadmap for the actual audit. C is incorrect because the identification of stakeholders will be done as part of initially defining objectives and will then be refined some during the defining of the scope. D is incorrect because gathering documentation is not a step itself and is done as part of both the defining objectives and defining scope steps.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 394). McGraw Hill LLC. Kindle Edition.

70
Q

70.Which of the following technology concepts is listed specifically as its own domain as part of ISO/IEC 27001:2013?

A. Firewalls
B. IPS
C. Honeypots
D. Cryptography

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 394). McGraw Hill LLC. Kindle Edition.

A

D. Cryptography

Explanation:
D. Cryptography as an overall concept is a specific domain of ISO/IEC 27001:2013, which covers all of the various aspects and methods where cryptography is used within IT services and operations. A is incorrect because firewalls are covered under network domains and are not a specific domain themselves. B is incorrect because IPS is covered under network and application security and is not a domain itself. C is incorrect because a honeypot is a security mechanism for capturing and analyzing attack attempts against systems that uses a similar-looking server with fake data designed to entice attackers. The application owners can then use the exploit attempts that are directed toward the honeypot to refine and augment security controls on the actual production systems.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 394). McGraw Hill LLC. Kindle Edition.

71
Q

71.What are the two main types of APIs used with cloud-based systems and applications?

A. REST and SOAP
B. XML and SOAP
C. REST and XML
D. HTTPS and REST

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 395). McGraw Hill LLC. Kindle Edition.

A

A. REST and SOAP

Explanation:
A. Representational State Transfer (REST) and Simple Object Access Protocol (SOAP) are the two main types of APIs used within cloud-based systems. SOAP is focused on providing a structured information exchange system for web services, and REST is a protocol for using HTTP requests to access and manipulate data. B is incorrect because although SOAP is one of the two methods, XML is a protocol for encoding and representing data and is not one of the two main API types for cloud-based systems. C is incorrect because although REST is one of the two methods, XML is a protocol for encoding and representing data and is not one of the two main API types for cloud-based systems. D is incorrect because although REST is one of the two methods, HTTPS is a protocol for secure communication extensions to the HTTP web protocol and is not one of the two types of APIs used by cloud-based systems.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 395). McGraw Hill LLC. Kindle Edition.

72
Q

You have been tasked by management to offload processing and validation of incoming encoded data from your application servers and their associated APIs. Which of the following would be the most appropriate device or software to consider?

A. XML accelerator
B. XML firewall
C. Web application firewall
D. Firewall

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 395). McGraw Hill LLC. Kindle Edition.

A

A. XML accelerator

Explanation:
A. An XML accelerator is designed to sit in front of application servers or services and APIs for the purpose of offloading processing and validation of incoming XML. It is a highly scaled and tuned appliance for handling its specific purpose and will allow the back-end service providers to focus on business logic rather than processing and validating the incoming data. B is incorrect because an XML firewall is designed to protect systems and scan data as it is coming in and out of an application or data center for validity, but it does not provide the processing capabilities and application interaction of an XML accelerator. C is incorrect because a web application firewall is designed to inspect web traffic coming into an application to detect security exploit attempts or other signatures of the traffic and take specific action against them based on what policies are matched. This can include redirecting or blocking the traffic before it reaches the application. D is incorrect because a firewall is designed to control network communications between sources and destinations as well as the ports the networks are communicating over. It does not perform content inspection on packets.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 395-396). McGraw Hill LLC. Kindle Edition.

73
Q

What is used with a single sign-on system for authentication after the identity provider has successfully authenticated a user?

A. Token
B. Key
C. XML
D. SAML

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 396). McGraw Hill LLC. Kindle Edition.

A

A. Token

Explanation:
A. With a single sign-on system, once the user has successfully authenticated, they are issued an opaque token that can then be used to access systems that are part of the federation. Each system can validate the token back to the identity provider to ensure it is current and to gain information about the user to then make informed decisions on authorization within the application. B is incorrect because a key would typically refer to encryption and is not used to refer to maintaining the session and presence within a single sign-on system. C is incorrect because XML is a standard for data encoding and presentation and would not be used for proving identity after successful login. D is incorrect because SAML is used within a federated system to pass information about the user for authorization or registration purposes, but it would not be used to validate the authentication in the way the token would be.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 396). McGraw Hill LLC. Kindle Edition.

74
Q

Which document will enforce uptime and availability requirements between the cloud customer and cloud provider?

A. Contract
B. Operational level agreement
C. Service level agreement
D. Regulation

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 396). McGraw Hill LLC. Kindle Edition.

A

C. Service level agreement

Explanation:
C. The service level agreement (SLA) will determine and document the requirements and expectations for factors such as uptime and availability within a cloud environment that are expected to be met by the cloud provider. This will be done on a percentage basis that represents how much unscheduled or unplanned downtime is allowable within a specified period of time, and it will be specific to the applications and systems in question. A is incorrect because the contract is the high-level formal agreement between the cloud provider and the cloud customer that documents the requirements for policies and resources covered for an agreed-upon price, but it does not specify operational details such as availability and uptime requirements like the SLA would, or the metrics used to evaluate them. B is incorrect because an operational level agreement is similar to an SLA but is used internally between components of the same organization to document duties and responsibilities; it would not pertain to the relations or arrangements between the cloud customer and the cloud provider. D is incorrect because regulations may serve as the inputs or requirements for specific performance metrics, but not how they would be enforced as part of the business relationship. They would be captured within the SLA, where their requirements and metrics are established.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 396-397). McGraw Hill LLC. Kindle Edition.

75
Q

Which of the following concepts makes repeated audits and verification much more difficult in a cloud environment versus a traditional data center?

A. Multitenancy
B. Resource pooling
C. Elasticity
D. Virtualization

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 397). McGraw Hill LLC. Kindle Edition.

A

D. Virtualization

Explanation:
D. Virtualization makes repeated audits and verifications difficult within a cloud environment because it is almost impossible to ensure that the system being tested now is the same as the previous one. In a virtual environment, images are changed often and systems reimaged for patches or other changes. This differs from a traditional data center, where servers are physical assets that can easily be verified as being the same system as before, even if upgrades and features have changed over time. A is incorrect because multitenancy refers to the hosting of multiple customers within the same cloud environment and within the same pool of resources, and it would not play into the ability to audit or ensure consistency over time. B is incorrect because resource pooling refers to the aggregation of resources from the entire cloud environment and how they are made available to all the customers within the cloud environment. It would not be a factor in auditing consistency over time. C is incorrect because elasticity refers to the ability for systems to automatically scale up or down to meet current demands without having an excess or deficiency of resources at any given point.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 397). McGraw Hill LLC. Kindle Edition.

76
Q

Which type of assessment is based on data and numbers, rather than documentation and observation?

A. Qualitative
B. Numeric
C. Quantitative
D. Metric

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 398). McGraw Hill LLC. Kindle Edition.

A

C. Quantitative

Explanation:
C. Quantitative assessments are data-driven and assign numerical values for various metrics to do comparisons. Prominent calculations used with quantitative assessments are the single loss expectancy (SLE), annualized rate of occurrence (ARO), and the annualized loss expectancy (ALE). A is incorrect because qualitative assessments are done with nonnumerical data and are descriptive in nature. They typically involve reviews of documentation and interviews with system maintainers, developers, and security personnel. Many times, qualitative assessments are done when an organization lacks the time, money, or sophistication to conduct a quantitative assessment. B is incorrect because while numeric sounds similar to quantitative and encapsulates key aspects of that type of assessment, it is not an official term for a type of assessment. D is incorrect because metric is a type of value and measure used with quantitative assessments; it is not a type of assessment itself.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 398). McGraw Hill LLC. Kindle Edition.

77
Q

The security principle of the SOC 2 reports consists of seven categories. Which of the following is not one of the seven categories?

A. Monitoring of controls
B. Legal compliance controls
C. Change management
D. System operations

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 398). McGraw Hill LLC. Kindle Edition.

A

B. Legal compliance controls

Explanation:
B. The SOC 2 reports do not contain the legal compliance controls as a factor because they can differ greatly from one jurisdiction to another, and each regulatory system will have its own compliance requirements and auditing demands. A is incorrect because the monitoring of controls is one of the seven main categories under SOC 2. It pertains to organizations effectively testing and verifying their controls are adequately addressing their intended threats as well as ensuring that mechanisms put in place are still in place and have not been changed through unintended or unauthorized means. C is incorrect because change management is a core component of SOC 2 reports and how an organization oversees and verifies the process of changes within their environments. This includes documentation, approvals, and risk management evaluations for all proposed changes as well as tracking their completion and the signoff from functional testing and validation. D is incorrect because system operations and how an organization runs its systems through policies and procedures is a core component of evaluation under the SOC 2 reports.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 398-399). McGraw Hill LLC. Kindle Edition.

78
Q

Which privacy standard was developed as a joint effort between AICPA and the CICA?

A. GLBA
B. HIPAA
C. GAPP
D. ISO/IEC 27001

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 399). McGraw Hill LLC. Kindle Edition.

A

C. GAPP

Explanation:
The Generally Accepted Privacy Principles (GAPP) was established by a joint effort between the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA). It serves to assist organizations and their management in developing strong privacy programs that address risk and regulatory requirements. A is incorrect because the Gramm-Leach-Bliley Act (GLBA) was established by the United States federal government to deal with financial organizations and the way they handle personal and private information. B is incorrect because the Health Insurance Portability and Accountability Act (HIPAA) was established by the United States federal government and pertains to the protection of private health information and records. D is incorrect because the ISO/IEC 27001 standards on security were established by the joint technical committee between the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 399). McGraw Hill LLC. Kindle Edition.

79
Q

Which cross-cutting aspect relates to the ability for a cloud customer to remove their data and systems from a cloud provider and be afforded assurances that it has been securely removed?

A. Portability
B. Reversibility
C. Sanitation
D. Wiping

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 399). McGraw Hill LLC. Kindle Edition.

A

B. Reversibility

Explanation:
B. Reversibility refers to the ability for a cloud customer to withdraw their data and configurations from a cloud environment quickly and efficiently. The cloud provider must also provide assurances and a timeline for securely and completely removing the data from within their environment. A is incorrect because portability refers to the ability for a system or application to move between different cloud providers, but it does not relate to the ability to securely remove the data and configurations from one environment and move them to another. Instead, portability is purely focused on the ability to move or migrate. C is incorrect because sanitation commonly refers to the ability to ensure that data has been securely deleted and wiped from a system. It does not pertain to the ability to extract data or configurations from an environment. D is incorrect because wiping would be the same concept as sanitation in this case, and it would therefore have the same limitations and concepts that apply to sanitation.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 399-400). McGraw Hill LLC. Kindle Edition.

80
Q

Which protocol is the current default and industry standard for encrypting traffic across a network?

A. TLS
B. SSL
C. IPSec
D. DNSSEC

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 400). McGraw Hill LLC. Kindle Edition.

A

A. TLS

Explanation:
A. Transport Layer Security (TLS) is the standard protocol used for sending encrypted traffic over a network between two parties. It has replaced SSL, which is no longer considered secure enough for general usage. TLS supports much stronger and more robust encryption ciphers. B is incorrect because SSL was the predecessor to TLS and has been replaced as the standard method for encrypting communications over the network. At this point, SSL is considered insecure because it uses weaker and older ciphers that no longer provide adequate protection or assurance of security. C is incorrect because IPSec is a communications method that is used to encrypt traffic between two hosts. However, it is not in widespread use due to resource limitations and demands. It also requires known hosts to be configured to use it, and it is not a general-purpose encryption method that is widely available. D is incorrect because DNSSEC is used to verity the integrity and authority of DNS resolution and lookups back to their intended issuer. It digitally signs DNS resolutions that can be verified back to their source, thus preventing the spoofing or redirecting of network traffic by sending out incorrect IP address resolutions to hosts.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 400). McGraw Hill LLC. Kindle Edition.

81
Q

Which network concept is used within a cloud environment to segregate and isolate network segments from other systems or applications?

A. Subnets
B. VLANs
C. Gateways
D. IPSec

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 400). McGraw Hill LLC. Kindle Edition.

A

B. VLANs

Explanation:
B. Because cloud environments do not have the ability to physically separate networks the same way a traditional data center would, they rely on logical separations with VLANs to keep systems isolated from others. This enables security to be controlled within the VLAN and allows similar systems and applications to communicate with each other within a secure enclave where the separation of physical networks and cabling is not possible. A is incorrect because subnets break up larger networks into logical sections for IP addressing and organization, but they do not contain the protections and segregations that VLANs afford and allow. C is incorrect because gateways are where systems send data when they do not know the specific route. A gateway can determine how to route the packets to the correct destination and can serve as a router on the network. D is incorrect because IPSec is an encryption protocol that is applied to each and every packet sent between two systems over the network, and it does not play a role in the segregation of networks without a logical framework.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 401). McGraw Hill LLC. Kindle Edition.

82
Q

Which jurisdiction, through Directive 95/46, enacted in 1995, declared data privacy to be a human right?

A. United States
B. European Union
C. Russia
D. Japan

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 401). McGraw Hill LLC. Kindle Edition.

A

B. European Union

Explanation:
B. The European Union issued Directive 95/46, which established data privacy of personal information to be a human right. Following this directive, Europe has had some of the strictest privacy controls and requirements in the world. A is incorrect because the United States does not currently have a federal-level policy on data privacy and personal information protection in a general sense, but it does for more specific applications such as healthcare and financial data. C is incorrect because Russia did not issue Directive 95/46, but it does have its own laws focused on protecting the privacy of information for Russian citizens, including restrictions that require all data on Russian citizens to be housed on servers that reside within the political boundaries of the Russian Federation. D is incorrect because Japan was not a party to Directive 95/46.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 401). McGraw Hill LLC. Kindle Edition.

83
Q

What type of encryption allows for the manipulation of encrypted data without having to first unencrypt it?

A. Homomorphic
B. Symmetric
C. Asymmetric
D. Public key

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 401). McGraw Hill LLC. Kindle Edition.

A

A. Homomorphic

Explanation:
A. Homomorphic is a new cutting-edge type of encryption that allows a system or application to read and manipulate encrypted data without first having to unencrypt it. This allows for enhanced security because the data does not need to reside on a system in unencrypted format at any point, so even a compromise of a system will not reveal data to the malicious actor, because they would still need the encryption keys to read it, even on a live system that is accessing the data. B is incorrect because symmetric encryption refers to the situation where both parties of a secure communication have the same key pairs, which are exchanged prior to communications being established. This allows for very fast communications over encrypted channels, but it does require both parties to be known and familiar with each other before attempting communication so that the keys can be exchanged. C is incorrect because asymmetric encryption is done through the use of keys and certificates issued by known authorities that are trusted by both parties. This requires reliance on the third-party authority to establish trust, and it enables communications over secure channels where the parties don’t know each other and haven’t already exchanged keys. D is incorrect because public key is another term for asymmetric encryption.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 402). McGraw Hill LLC. Kindle Edition.

84
Q

Which of the following threat models includes discoverability as a key component and concern?

A. DREAD
B. SOX
C. STRIDE
D. CSA Treacherous 12

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 402). McGraw Hill LLC. Kindle Edition.

A

A. DREAD

Explanation:
A. The DREAD threat model includes discoverability as the second D in the acronym. In this sense, discoverability refers to the likeliness or possibility that a malicious actor will discover that a specific vulnerability exists and have the ability to exploit it. B is incorrect because the Sarbanes-Oxley Act covers companies and the way they handle financial transactions, records, retention, and the transparency of their practices and compliance. The concept of discoverability does not directly play a role in SOX. C is incorrect because the STRIDE threat model does not include discoverability as one of its key components. With the STRIDE acronym, the D stands for denial of service. D is incorrect because the Cloud Security Alliance Treacherous 12 does not include discoverability as one of its 12 key components.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 402). McGraw Hill LLC. Kindle Edition.

85
Q

From a legal perspective, data that is covered under eDiscovery falls into three different categories. Which of the following is not one of the three?

A. Possession
B. Shared
C. Control
D. Custody

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 403). McGraw Hill LLC. Kindle Edition.

A

B. Shared

Explanation:
B. From the perspective of eDiscovery, whom data is shared with is not a primary concern or one of the main principles of it. Data collection is the responsibility of the authoritative source or systems that use it, but logging and preservation are focused on the data owner or the one who controls and makes the data available to consumers. A is incorrect because possession of the data is one of the three main components of eDiscovery, and the party that possesses the data will likely be the first recipient of the eDiscovery order. C is incorrect because control of the data is one of the main components and principles of eDiscovery. This is of particular concern within a cloud environment because the boundaries will blur between the cloud customer and cloud provider with most cloud implementations. D is incorrect because custody is one of the main principles and components of eDiscovery. Within a cloud environment, custody is very important and can be complex because the duties for custody fall on both the cloud provider and the cloud customer, and depending on the type of cloud implementation, the duties may fall on one party more than the other.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 403). McGraw Hill LLC. Kindle Edition.

86
Q

86.An organization’s policies require that all users and processes be validated during each and every data access point. What is this an example of?

A. Single sign-on
B. Identity and access management
C. Zero trust network
D. Authorization

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 403). McGraw Hill LLC. Kindle Edition.

A

C. Zero trust network

Explanation:
C. A zero trust network is based on the principle of automatically trusting no users or processes coming into or out of a network. In order to gain access, users must be authenticated, authorized, and validated against security policies during all transactions. While many networks will authenticate and authorize users coming into their networks, they often do not continually reevaluate the authorization as resources are accessed. With zero trust, the user or process is checked for authorization at any additional network points or data access against the current security policies, regardless of any type of authorization they have already been granted or the credentials they are presenting. A is incorrect because single sign-on will allow a user or process to access data via a central authentication system. It does not perform authorization checks during data access. B is incorrect because identity and access management is an umbrella term for managing users and credentials. It does not involve the level of validation and security checks asked by the question. D is incorrect because while authorization does check for appropriate access to systems or data, it is not the best answer because it does not encompass the continual checks that zero trust entails.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 403-404). McGraw Hill LLC. Kindle Edition.

87
Q

Which of the following would be covered by an external audit and not by an internal audit?

A. Security controls
B. Costs
C. Operating efficiency
D. System design

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 404). McGraw Hill LLC. Kindle Edition.

A

A. Security controls

Explanation:
A. Security controls and testing are crucial aspects of an external audit and typically the focus of one. While internal audits may perform some level of security controls validation, they are not considered to be valid audits, because there is no independent external auditor to evaluate them. Independent and external testing for audits is paramount to instill trust in a system, and it is a required component for regulatory compliance and certification programs. B is incorrect because costs would be considered part of an internal audit of operation policies and procedures. External audits are focused on regulatory compliance or certifications as well as on ensuring customer requirements for security controls and validation, but they are not concerned with costs. They are only concerned with the compliance (or lack thereof) with requirements and regulation. C is incorrect because operating efficiency is a major component of internal auditing and a crucial input for management oversight and decision making. An external audit would not be concerned with operating efficiency, but rather only with compliance with regulatory or certification standards and the validation of security controls and policies. D is incorrect because system design overall is internal to an organization. While an external audit will likely include a review of system design, it is for the purposes of establishing knowledge of how security controls are designed and implemented, not with the soundness of efficiency or customer satisfaction beyond the security controls requirements and validation.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 404). McGraw Hill LLC. Kindle Edition.

88
Q

What is the most prevalent communications protocol for network-based storage solutions within a data center?

A. iSCSI
B. TCP
C. TLS
D. NetBIOS

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 405). McGraw Hill LLC. Kindle Edition.

A

A. iSCSI

Explanation:
A. iSCSI is a protocol that sits on top of the TCP stack and enables the sending of SCSI commands over a network, rather than through the traditional method in a physical environment where storage devices are directly attached to the server. Within a cloud data center especially, iSCSI is crucial because virtual machines and other virtual appliances will not have any direct physical connections to storage systems. B is incorrect because TCP is the general protocol for network communications and is not specifically related to storage systems or the direct carrier of storage communications or commands. TCP does play a central role given that iSCSI is dependent on it, but by itself TCP is not an appropriate answer here. C is incorrect because TLS is a secure communications and encryption protocol for network traffic. It’s not specifically related to storage systems or the carrying of storage solution communications. D is incorrect because NetBIOS is a program that allows applications to communicate over a local area network with each other. It is not specifically related to storage communications.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 405). McGraw Hill LLC. Kindle Edition.

89
Q

Which of the following security responsibilities is always solely under the cloud provider?

A. Infrastructure
B. Data
C. Physical
D. Application

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 405). McGraw Hill LLC. Kindle Edition.

A

C. Physical

Explanation:
C. Regardless of the cloud service category employed, the cloud provider will always be responsible for the management and operations of the underlying physical environment. Even with IaaS, the cloud customer is not responsible for, or involved with, the physical environment at all. A is incorrect because infrastructure is the sole responsibility of the cloud provider with PaaS or SaaS, but it is a shared responsibility with the cloud customer for IaaS. B is incorrect because data is always the responsibility of the cloud customer, who is responsible for the maintaining and loading of data as well as ensuring the appropriate use of it and access to it. Even within a SaaS implementation, the cloud customer as the data owner is always responsible for the data. D is incorrect because only in the SaaS service category is the cloud provider responsible for the applications. With both PaaS and IaaS, the cloud customer loads, configures, and maintains the applications at all times.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 405-406). McGraw Hill LLC. Kindle Edition.

90
Q

Your organization has made it a top priority that any cloud environment being considered to host production systems have guarantees that resources will always be available for allocation when needed. Which of the following concepts will you need to ensure is part of the contract and SLA? A. Limits B. Shares C. Resource pooling D. Reservations

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 406). McGraw Hill LLC. Kindle Edition.

A
91
Q

Which is the most commonly used standard for information exchange within a federated identity system?

A. OAuth
B. OpenID
C. SAML
D. WS-Federation

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 406-407). McGraw Hill LLC. Kindle Edition.

A

C. SAML

Explanation:

92
Q

Which of the following common threats involves an organization not placing sufficient controls and oversight on its systems and data protection?

A. Data loss
B. System vulnerabilities
C. Insufficient due dilligence
D. Advanced persistent threats

A

C. Insufficient due dilligence

Explanation:
Insufficient due dilligence is where an organization does not properly evaluate, plan, design, operate or secure its systems and applications or the data that they house. Any of these areas can cause security exposure if sufficient due dilligence is not applied to them and can lead to any other sorts of culnerabilities and attacks being possible as a result

93
Q

Which of the following groups would not be appropriate to share a SOC 1 report with?

A. Regulators
B. Potential customers
C. Current customers
D. Management

A

B. Potential customers

Explanation:
SOC 1 reports are considered restricted use reports and are limited in the audience they can or should be exposed to . Potential customers which do not currently have a contractual or business relationsji[ with a cloud provider would not be included witin the restricyed use classes

94
Q

With data in transit, which of the following will be the major concern in order for a DLP solution to work properly?

A. Scalability
B. Encryption
C. Redundancy
D. Integrity

A

B. Encryption

Explanation:
In order for a DLP solution to work with data in transit, first and foremist it has to be able to read the data as it is transmitted. Typically, this will be done by having the DLP system unecrypt and the re-encrypt packets as they pass through it. This enables the point to point encryption to still be in place but also allows the DLP system to do its inspection and prociessing of data in a secure manner

95
Q

Which of the following, if important to the customer or required by regulation, is something that must be addressed by a contract, versus an SLA, to ensure compliance?

A. Certifications
B. Availability
C. Incident Management
D. Elasticity

A

A. Certifications

Explanation:
Certifications, based on industry and indepedent standards, are a primary means for a data center to ensure certain security controls and operational best pracxtices are followed by a cloud provider

96
Q

Which of the following aspects of the physical environment is considered an external redundancy issue?

A. Generators
B. Cooling chillers
C. Power distribution units
D. Storage systems

A

A. Generators

Explanation:
Generators are considered an external reduyndancy issue because theyt are outside the interior of the data center; they work on the incoming power feeds and their availability. THey do not serve a redundancy capacity for power once it has entered within the data center itself, and they are indepedent of the data center

97
Q

Which of the following methods is often used to obscure data from production systems for use in test or development environments?

A. Tokenization
B. Encryption
C. Masking
D. Classification

A

C. Masking

Explanation:
Masking involves replacing sensitive data fields with opaque and radomized values. It is particularly used for preparing production data for test or development environments, where the data is needed in the same format, but hacing connections to real users or sensiritve data is not important. UNlike tokenziation, making does not have the ability to map the data back ot the original values, which is why it is typically used for testing in non production environments

98
Q

As part of an audit, systems and mprocesses are tested to evaluate whether they are in compliance with regulatory or organizational policy requirements. What is the official term for determining any discpancies between the real and desired states?

A. Audit findings
B. Gap analysis
C. Audit deficiency
D. Compliance analysis

A

B. Gap analysis

Explanation:
A gap analysis is an official report on the differences and inconsistencies between the intended or required condfigurations and operations of a system or application and the reality of what is actually in place and in effect

99
Q

In a cloud enviornment, apart from confidentiality, what is the most important factor to consider with a key management system?

A. Integrity
B. Nonrepudiation
C. Availability
D. Archiving

A

C. Availability

Explanation:
Cloud based systems and applications are heavily dependent on encryption for virtually all communications and storage systems. They confidentiality and protection of the keys are the most important factors in rpvoding the security of data within the system.

100
Q

Which of the following top security threats involves attempting to send invalid commands to an application in an attempt to get the application to execute the code?

A. Cross site scripting
B. Injection
C. Insecure direct object references
D. Cross site request forgery

A

B. Injection

Explanation:
Injection involves sending invalid commands through input fields in an application with the intent of getting the application to execute the code and thus bypass many security controls that are in place. If an application does not properly validate input fields to ensure that they are in the correct format and do not contain extraneous code or commands, the application may expose data or configuration information to a malicious actor

101
Q

Which of the key aspects of security is concerned with ensuring information or data is in its intended format and has not been altered?

A. Integrity
B. Confidentiality
C. Availability
D. Privacy

A

A. Integrity

Explanation:
Integrity is the main security prnicniple concerned with data being accurate and in its inteneded form. THis allows the data to be considered trustworthy throughout its entire lifecycle, ensuring that it has not been altered in an unauthorized manner or by an unauthorized party

102
Q

Your company has a large volume of data processing jobs that need to be run quickly and efficiently, and you do not have the budget or the time to procure hardware. Which offering by cloud providers could help you accomplish this?

A. DBaaS
B. Data flows
C. Data warehousing
D. Data processing

A

B. Data flows

Explanation:
Data flows are serverless data processing managed services through cloud providers. They typically can support a variety of different frameworks for data pipelines and are designed to allow a customer to upload their pipeline code, along with data sets and have the operations performed. Being a fully managed environment, it allows the customer to quickly execute data processing without having to establish servers or perform configuration operations, whole also alleviating the nedd to maintain or secure them

103
Q

Which of the following has user training as a primarey means of combating and mitigating its success against a cloud application?

A. Data breaches
B. Account hijacking
C. Advanced persistent threats
D. Malicious insiders

A

C. Advanced persistent threats

Explanation:
Advanced persistent threats involve a malicious actor establishing a presence within a system or application, with the goal of accessing information or resources over an extended period of time while avoiding detection

104
Q

You have been tasked with developing a list of requirmeents for cabling design in a new data center as well as ensuring that any designs developed by the networking team meet standards. WHich standard should you consult?

A. IDCA
B. BICSI
C. Uptime Institute

A

B. BICSI

Explanation:
The Building Industry Consulting Service (BICSI) issues standards and certs related to complex cabling of data systems. The standards are focused on cabling setups and designs but also include specifications on power, energy efficiency and setup and configuration of hot and cold aisles within a data center

105
Q

Which network protocol is essential for allowing automation and orchestration within a cloud envioronment?

A. DNSSEC
B. DHCP
C. IPSec
D. VLANs

A

B. DHCP

Explanation:
The Dynamic Host Configuration Protocol is designed to automatically provide an IP address and other crucial network information to hosts on a network, as well as to provide for the centralized management of their network presence. This differs from the traditional static approach, where a host would have a specific configuration enetered into it that would need to be changed and individually and directly on the host if the need ever arose. With a cloud environment where systems autoscale and are dyanmically optimized and moved around constantly, the static method would never work

106
Q

Which of the following tools has the ability to analyze incoming traffic for patterns and content and take appropraite actions based on them before the traffic reaches the actual applications?

A. XML accelerator
B. XML Firewall
C.Web Application Firewall
D. Firewall

A

C.Web Application Firewall

Explanation:
A WAF is typically an application that inspoects HTTP traffic before it hits an application server and has the ability to apply a set of filters and rules to it

107
Q

The ISO/IEX 27018 standard focuses on privacy in cloud computing and consists of five main principles. Which of the following ins not one of the principles established in the standard?

A. Communication
B. Consent
C. Yearly audit
D. Penalties for privacy violations

A

D. Penalties for privacy violations

Explanation:
ISO/IEC in general are standards based on IT policies and best practices. They are done at a higher level, so they are flexible for a variety of diverse systems and reqiorem,ents and they serve as a strong framework for implementating regulatory or organizational policies and requirements.

108
Q

Which of the following concepts of cloud computing necessitatets the logical separation of systems, which would normally be done yb physical separation in a traditional data center?

A. Resource pooling
B. Multiltenancy
C. Elasticity
D. Measured Service

A

B. Multiltenancy

Explanation:
Multitenancy is the concept of hacing multiple customers sharing the same physical infrastructure and systems. With a traditional data center model, different customers use their own dedicated and segregated physical hardware, typically within their own cages and with totally separate networking cabling and hardware as well. With a cloud deployment, all customers share the same physical hardware, thus requiring the use of logical segregation to ensure security

109
Q

Your boss has tasked you with preparing to use containers for the application that your teram suports. Which of the following is not a focus of your deployment plan?

A. Configurations
B. Code
C. Operating system
D. Libraries

A

C. Operating system

Explanation:
A container is a wrapper with all the components necessary to run an application that is deployed into a hosted environment. The container is completely removed from the OS and underlying hardwarew

110
Q

If you have code already written and do not have sufficient resources available to execute it within the required time available, which service category would be most attractive as a possible solution?

A. DBaaS
B. CaaS
C. NaaS
D. DaaS

A

B. CaaS

Explanation:
Compute as a Service (CaaS) allows for the execution of compute intesive workloads to be performed in the cloud. Code can be executed in a serverless environment where the customer oinly pays for the computing time and the cycles they consume, without the need for setting up server instances or environments

111
Q

Which common threat is mitigated by the use of DNSSEC?

A. Spoofing
B. Snooping
C. XSS
D. DDoS

A

A. Spoofing

Explanation:
DNSSEC is explicitly designed to prove the validity and authenticity of DNS lookups from their authoritative host. It is inteded to eliminate the possibility of rogue DNS severs intercepting lookup requests from devices or clients and inserting incorrect IP address resolutions in an attempt to direct traffic away from legit sites

112
Q
A