C90.07A: Fundamental Cloud Security Flashcards

1
Q

____________ refers to ability to ensure that only authorized users can access data so that private or sensitive data remains private.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _____________ mechanisms is a network of servers on the internet that maps domain names to their numeric IP addresses.

A

Domain Name Service (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the four main components that comprise the identity and access management (IAM) mechanism.

A

º Authentication
º Authorization
º User Management
º Credential Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The certificate revocation list (CRL) mechanism is a signed list that lists revoked certificates that are still within their validity dates. It is published and maintained by the ____________

A

Certificate Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trust is designation, while thrustworthiness is a characteristic.

(True / False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ______________ mechanism consists of policies, procedures, components and devices that are used to protect, manage and distribute cryptographic keys and certain specific information.

A

Cryptographic Key Management System (CKMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ______________ mechanism provides a mechanism for thrusting self-signed certificate from internal and other organization’ certificate authorities.

A

Certficate Trust Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which design pattern can be applied to coordinate cloud monitoring and logging activities between a cloud consumer and cloud provider?

A

Collaborative Monitoring and Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________________ is the ability to prevent data from being modified in an authorized or uneducated manner.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _______________ architecture enables full management control and integration of resources contained both on-premise and in the cloud.

A

Virtual Private Cloud (VPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which design pattern can be applied to make cloud- based IT resources with diverse protocol requirements accessible to cloud service consumers.

A

Cloud Authentication Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The __________________ mechanism is a tamper-resistant integrated circuit built into som computer motherboards that can perform cryptographic operations and protect small amounts of sensitive information. It is used to store platform measurements that help ensure that a platform remains trustworthy.

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the six security threat categories that make STRIDE.

A
º Spoofing
º Tampering
º Repudiation
º Information Disclosure
º Denial-of-Service
º Elevation of Privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which deign pattern can be applied to protect cloud communication from traffic hijacking?

A

Cloud Traffic Hijacking Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The seizing of groups of IP addresses by an attacker trough corruption of Internet routing tables is known as ______________

A

IP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____________, _______________ and _____________ provide protection against loss of confidentiality.

A

Encryption, authentication and authorization

17
Q

The _______________ mechanism is a data file that binds the identity of an entity to a public key and contains the user’s identification and signature from the issuing authority.

A

certficate

18
Q

Identify the required and optional patterns for the Cloud Authentication compound pattern.

A

º Cloud Authentication Gateway (required)

º Federated Cloud Authentication (optional)

19
Q

Which design pattern is applied via the implementation of a local CVS that checks the revocation status of submitted certificates form multiple organizations?

A

Federated Cloud Authentication

20
Q

Identify two foundational cloud security technologies that are used to establish borders to protect workloads.

A

º Cryptography

º Identity and access management (IAM)

21
Q

Which design pattern can be applied to protect a perimeter that is dynamic and extends from on-premise to multi-vendor cloud resources?

A

Automatically Defined Perimeter (ADP)

22
Q

Identify the mechanism that is used to collect relevant data about an enterprise’s security posture in multiple locations and analyze the data form a single point of view, providing the capability to spot trends and patterns that may be the result of malicious activity.

A

Security Information and Event Management (SIEM)

23
Q

Which design pattern can be applied to audit cloud-hosted IT resources for compliance and SLA requirements when they are not owned or accessible by cloud consumers?

A

Independent Cloud Auditing

24
Q

_____________ is ability to ensure that an organization’s resources are available when required, from a performance and reliable access and use perspective.

A

Availability

25
Q

The ________________ mechanism is a hardware or software-based appliance located on the consumer premises that serves as a bridge between local and remote cloud-based networks.

A

Cloud Consumer Gateway (CCG)

26
Q

Which mechanism is responsible for assessing the integrity of the cloud compute nodes trough techniques introduced by trusted computing technology and TPMs?

A

Attestation service

27
Q

Which mechanism collects evidence-based knowledge about an existing or emerging threat to an asset that can be used to inform decisions as to how the organization should respond to that threat?

A

Threat intelligence system

28
Q

List four common threat agents.

A

º External attacker
º Malicious service agent
º Malicious tenant
º Malicious insider

29
Q

Which mechanism is the public key infrastructure (PKI) entity that digitally signs and certificate revocation lists (CRLs)?

A

Certificate Authority (CA)

30
Q

The cloud-based resource segmentation process creates ______________ mechanisms that are determined trough security policies.

A

Cloud-based security group