C90.07A: Fundamental Cloud Security Flashcards
____________ refers to ability to ensure that only authorized users can access data so that private or sensitive data remains private.
Confidentiality
The _____________ mechanisms is a network of servers on the internet that maps domain names to their numeric IP addresses.
Domain Name Service (DNS)
List the four main components that comprise the identity and access management (IAM) mechanism.
º Authentication
º Authorization
º User Management
º Credential Management
The certificate revocation list (CRL) mechanism is a signed list that lists revoked certificates that are still within their validity dates. It is published and maintained by the ____________
Certificate Authority (CA)
Trust is designation, while thrustworthiness is a characteristic.
(True / False)
True
The ______________ mechanism consists of policies, procedures, components and devices that are used to protect, manage and distribute cryptographic keys and certain specific information.
Cryptographic Key Management System (CKMS)
The ______________ mechanism provides a mechanism for thrusting self-signed certificate from internal and other organization’ certificate authorities.
Certficate Trust Store
Which design pattern can be applied to coordinate cloud monitoring and logging activities between a cloud consumer and cloud provider?
Collaborative Monitoring and Logging
________________ is the ability to prevent data from being modified in an authorized or uneducated manner.
Integrity
The _______________ architecture enables full management control and integration of resources contained both on-premise and in the cloud.
Virtual Private Cloud (VPC)
Which design pattern can be applied to make cloud- based IT resources with diverse protocol requirements accessible to cloud service consumers.
Cloud Authentication Gateway
The __________________ mechanism is a tamper-resistant integrated circuit built into som computer motherboards that can perform cryptographic operations and protect small amounts of sensitive information. It is used to store platform measurements that help ensure that a platform remains trustworthy.
Trusted Platform Module (TPM)
List the six security threat categories that make STRIDE.
º Spoofing º Tampering º Repudiation º Information Disclosure º Denial-of-Service º Elevation of Privilege
Which deign pattern can be applied to protect cloud communication from traffic hijacking?
Cloud Traffic Hijacking Protection
The seizing of groups of IP addresses by an attacker trough corruption of Internet routing tables is known as ______________
IP hijacking
_____________, _______________ and _____________ provide protection against loss of confidentiality.
Encryption, authentication and authorization
The _______________ mechanism is a data file that binds the identity of an entity to a public key and contains the user’s identification and signature from the issuing authority.
certficate
Identify the required and optional patterns for the Cloud Authentication compound pattern.
º Cloud Authentication Gateway (required)
º Federated Cloud Authentication (optional)
Which design pattern is applied via the implementation of a local CVS that checks the revocation status of submitted certificates form multiple organizations?
Federated Cloud Authentication
Identify two foundational cloud security technologies that are used to establish borders to protect workloads.
º Cryptography
º Identity and access management (IAM)
Which design pattern can be applied to protect a perimeter that is dynamic and extends from on-premise to multi-vendor cloud resources?
Automatically Defined Perimeter (ADP)
Identify the mechanism that is used to collect relevant data about an enterprise’s security posture in multiple locations and analyze the data form a single point of view, providing the capability to spot trends and patterns that may be the result of malicious activity.
Security Information and Event Management (SIEM)
Which design pattern can be applied to audit cloud-hosted IT resources for compliance and SLA requirements when they are not owned or accessible by cloud consumers?
Independent Cloud Auditing
_____________ is ability to ensure that an organization’s resources are available when required, from a performance and reliable access and use perspective.
Availability