CCSK Flashcards

1
Q

Which technology is generally required to build resource pools?

The Internet
Virtualization
VLANs
CPUs and memory

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the key difference between traditional virtualization and cloud?

Orchestration
Abstraction
Hypervisors
Commercial virtualization software

A

Orchestration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not a key potential benefit of cloud computing?

Economics
Agility
Resiliency
Compliance

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What business benefit(s) was Amazon attempting to realize when they created their internal cloud computing program? Select all that apply

Better match real-time capacity to fluctuating demand
Beat Microsoft
Build a world class public cloud computing platform
Faster time to deploy developer resources

A

Better match real-time capacity to fluctuating demand

Faster time to deploy developer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Resource pools permanently assign resources to a user.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud computing supports scaling up of resources, but not scaling down.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following appear in both the NIST and ISO/IEC cloud computing definitions? Select all that appl

Self Service/rapid provisioning
Self Service
Resource pools
On-demand
Network access
A
Self Service/rapid provisioning
Self Service
Resource pools
On-demand
Network access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which service model would a cloud database be considered?

Platform as a Service
Software as a Service
Infrastructure as a Service
Storage as a Service

A

Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software as a Service is always built on top of Platform as a Service which is always built on Infrastructure as a Service.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is most likely to be considered IaaS?

A container registry
The cloud’s management console
A virtual machine
A cloud message queue

A

A virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In IaaS, individual virtual machines use which kind of storage?

The local hard drives on the servers
A database platform
VSTOR-based hardware
Virtual volumes from a storage pool

A

Virtual volumes from a storage pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Platform as a service abstracts application platforms and platform components from underlying resources, and can be built on top of IaaS.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not required to e considered SaaS?

Customer management of the underlying resources
Underlying physical hardware
A complete application
The essential characteristics

A

Customer management of the underlying resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If an organization uses Community Cloud Deployment Model, some portion of the physical infrastructure MUST be on-premises with one of the community members.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If an organization employs the technique of cloud bursting, which cloud model are they utilizing?

Hybrid
Multi-tenancy
PaaS
Proprietary

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which element of the logical model describes the cloud management plane?

Infostructure
Applistructure
Infrastructure
Metastructure

A

Metastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In which service model does the cloud consumer have the least amount of control over security?

Infrastructure as a Service
Platform as a Service
Software as a Service
Security as a Service

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In which cloud service model is the cloud consumer responsible for ensuring that the hypervisor is not vulnerable to attack?

Infrastructure as a Service
Software as a Service
Platform as a Service
None of the above

A

None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When should you define the security controls when building a cloud deployment?

Before determining the service and deployment models
After identifying requirements
After identifying control gaps
Before selecting the provider

A

After identifying control gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cloud infrastructure security does not include the virtualization components.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following resource pools is not associated with IaaS?

Compute
Storage
Network
Middleware

A

Middleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following are typically in the underlying infrastructure of a cloud? Select all that apply

Database
Identity Service
Message queue
API Server
Hypervisors
A
Database
Identity Service
Message queue
API Server
Hypervisors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is hardening infrastructure components so important?

Clouds are sometimes based on common components that may cause vulnerabilities

All security is important

Infrastructure components are most likely to be exposed to cloud customers

This prevents the cloud provider from accessing cloud consumer data

A

Clouds are sometimes based on common components that may cause vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following physical networks is used for Internet to instance traffic?

Management
Storage
Service
Virtual

A

Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why should cloud providers use multiple underlying physical networks? Select all that apply

Cost management
Resiliency
Better performance
Better isolation

A

Better performance

Better isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which virtual network technology is best suited for cloud?

Token Ring
V-flow
VLAN
SDN

A

SDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Virtual Networks:

Are more flexible, but more difficult to secure
Substitute for physical networks
May include inherent security capabilities
Take fewer resources

A

May include inherent security capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which is a defining characteristic of Software Defined Networks?

Uses OpenFlow

Decouples the control plane from the underlying physical network

Leverages packet tagging

Autoscaling for resiliency

A

Decouples the control plane from the underlying physical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which SDN security capability often replaces the need for a physical or virtual appliance?

Integrated isolation
Default deny
Lack of support for packet sniffing
Security groups

A

Security group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The most effective way for an attacker to compromise a security group is to compromise the host/virtual machine and then modify the rules.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is the most effective security barrier to contain blast radius?

Virtual network
Virtual subnet (with or without ACLs)
Security group
Cloud account/project/subscription

A

Cloud account/project/subscription

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How does a virtual network affect network visibility?

Virtual networks block packet capture for better isolation

An SDN can provide more visibility than a physical network

Virtual networks always encrypt traffic and break packet capturing

Virtual machines on the same physical host don’t use the physical network

A

Virtual machines on the same physical host don’t use the physical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Place the following network security tools in the preferred order in most cloud deployments, from 1 (most preferred} to 4.

Virtual appliance
Physical Appliance
Inherent cloud controls
Host security agents

A
  1. Inherent cloud controls
  2. Host security agents
  3. Virtual appliance
  4. Physical Appliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the purpose of a bastion network/transit VPC?

To better support multiple virtual networks and accounts in hybrid scenarios

To better lock down a hybrid cloud

To create a cloud DMZ

To improve internal routing and IP address space availability

A

To better support multiple virtual networks and accounts in hybrid scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is primarily a responsibility of the cloud provider?

Configuring security groups
Securing the underlying virtualization technology
Correct configuration in the management plane
Designing subnets, virtual networks, and ACLS2

A

Securing the underlying virtualization technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Of the following, which is the most important use case for the Software Defined Perimeter?

To secure hybrid networks
To encrypt SON traffic
For federated network identity
To improve and secure remote access

A

To improve and secure remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following are cloud workloads? Select all that apply:

Virtual machines

Serverless/Function as a Service

Host servers

Containers

A

Virtual machines

Serverless/Function as a Service

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following most impacts traditional workload security controls when applied to cloud deployments?

Hypervisors

Low resiliency

High volatility/rates of change Security groups

Serverless

A

High volatility/rates of change Security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How can immutable workloads improve security?

They eliminate error-prone manual management
They better support use of traditional security tools
They better meet performance requirements
They scale for DDoS

A

They eliminate error-prone manual management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Select the cloud workload security option that can most improve overall security and reduce attack surface:

Store Logs external to instances
Select cloud aware host security agents
Use immutable as much as possible
Leverage existing/traditional vulnerability assessment tools

A

Use immutable as much as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is primarily a cloud consumer workload security responsibility?

Volatile memory security
Hypervisor security
Underlying infrastructure security
Monitoring and logging

A

Monitoring and logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Why is management plane security so critical?

It is the primary integration point for hybrid cloud.

It is the best way for cloud consumers to protect themselves from hostile cloud provider employees.

REST APIs are inherently insecure.

Compromise of the management plane potentially compromises all cloud assets

A

Compromise of the management plane potentially compromises all cloud assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Select the best option for authenticating to a cloud API

HTTP request signing
Username/password
Biometrics
TLS-MA

A

HTTP request signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Place the management plane security steps to the correct order

Secure Root Account

Enable Monitoring/Auditing

Manage non-Root Users

A
  1. Secure Root Account
  2. Manage non-Root Users
  3. Enable Monitoring/Auditing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Identify one drawback to managing users in the management plane:

The reliance on RAC
Insufficient MFA support
High variability between cloud providers
Lack of SSO support

A

High variability between cloud providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the role of a service administrator?

They are the core administrators for a cloud account.

To administer a limited set of cloud services

To administer cloud platform/management plane users.

To isolate application security

A

To administer a limited set of cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Select the best option for management plane monitoring, when it is available:

Inherent cloud auditing, since it captures the most activity

Inherent cloud auditing, since that offloads responsibility to the cloud provider

Proxy-based auditing, since it eliminates the need to trust the cloud provider

Proxy-based auditing, since it captures more activity

A

Inherent cloud auditing, since it captures the most activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Multi factor authentication is the single most important management plane security control.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the single most important rule for cloud BC/DR?

Use object storage for backups
Snapshot regularly
Architect for failure
Use multiple cloud providers

A

Architect for failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which is not a key aspect of cloud BC/DR?

Hypervisor resiliency
Continuity within the provider/platform
Portability
Preparing for provider outages

A

Hypervisor resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which is the logical model layer that is most difficult to enable for DR across cloud providers.

Metastucture
Infrastructure
Infostructure
Applicstructure

A

Metastucture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Select a technique to manage continuity within the cloud provider.

Multi-cloud provider plans
Cross-location/region design
Hybrid cloud backup
Data portability

A

Cross-location/region design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Select the governance tool that is most affected by the transition to cloud computing:

Chart of accounts
Mission statement
Board of director reporting
Compliance reporting

A

Compliance reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

In terms of cloud computing and security… what is the primary governance role of a contract?

To define the data custodian
Defines how you extend internal controls to the cloud provider
Cost management
Regulatory Requirements

A

Defines how you extend internal controls to the cloud provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Does the shared responsibilities model define the contract or the contract define the shared responsibilities model?

The contract defines the shared responsibilities model
The shared responsibilities model defines the contract

A

The contract defines the shared responsibilities model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Select the layer where you evaluate your providers:

Governance
Risk tolerance
Supplier Assessment
Contracts
Share Responsibilities Model
Risk mangement
A

Supplier Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the responsibility of information risk management?

Manage overall risk to the organization
Determine the overall risk of cloud providers
Eliminate all risks to information assets
Align risk management to the tolerance of the data owner

A

Align risk management to the tolerance of the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Your risk assessment effort should be equal for all information assets.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

In which service model does the cloud consumer have to rely most on what is in the contract and documented to enforce and manage security?

Hybrid
SaaS
PaaS
IaaS

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Under which conditions is managing risk similar for public and private cloud?

When your private cloud is third party hosted and managed
The risk profiles are always the same
No conditions; public cloud is always riskier
When using a major public cloud provider

A

When your private cloud is third party hosted and managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which do you need to rely more on to manage risks when using public cloud computing?

Testing instead of assessments and attestations
Contracts and SLA
Physical control of assets
Consultants

A

Contracts and SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is critical when evaluating a cloud service within your risk management program?

Accounting for the context of the information assets involved
Eliminating all outsourcing risk
Minimizing regional harm
Ensuring the provider’s security program supports your existing on-premise tools

A

Accounting for the context of the information assets involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

How can you manage risk if you can’t negotiate a contract with the cloud provider?

Use compensating controls and your own risk mitigation mechanisms
Always choose a different provider
Accept all potential risks
Obtain cyberinsurance

A

Use compensating controls and your own risk mitigation mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Audits are only used to meet government regulatory requirements.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Cloud changes compliance. Select the statement that is incorrect:

Metastructure/management may span jurisdictions even if data is localized

There may be a greater reliance on third party audits

There are large variations between the compliance capabilities of different cloud providers

The cloud provider is ultimately responsible for their customer’s compliance

A

The cloud provider is ultimately responsible for their customer’s compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which is not a source of compliance obligations?

Internal Audits
Legislation
Contracts
Industry Standards

A

Internal Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Compliance inheritance means that an application built on top of a cloud provider’s service that is compliant with a regulation/standard is always guaranteed to be compliant.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

The Cloud Security Alliance Security Guidance provides:

Legal Advice
Legal Guidance
Legal Recommendation
Information you should discuss with your attorneys.

A

Information you should discuss with your attorneys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

The Australian Privacy Act of 1988 can apply to Australian customers, even if the cloud service provider is based elsewhere:

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the purpose of a data localization law?

To require company to hire only local workers
To require that all business documents be in the country’s official language
To require service providers to register with the country’s data protection commission
To require that data about the country’s citizens be stored in the country

A

To require that data about the country’s citizens be stored in the country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following is correct?

GDPR Stands for “Government Data Privacy Rule”.

GDPR Establishes fines of $1,000 per credit card number compromised

GDPR prohibits the transfer of personal data outside the EU or EEA to a country that does not offer a similar privacy rights

GDPR requires that EU member state’s national laws impose network requirements on operators of essential services

A

GDPR prohibits the transfer of personal data outside the EU or EEA to a country that does not offer a similar privacy rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

The Federal Government in the United States does not directly address issues of data privacy, but instead leave it up to the states to create laws that address privacy concerns.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

If a business is located outside the European Union it does not have to comply with the privacy laws of the European Union

True
False

A

False

74
Q

In the United States, only entities that collect or process financial data or health data must comply with privacy or security laws

True
False

A

False

75
Q

Which of the following is a standard?

COPPA
APPi
GDPR
PCI DSS

A

PCI DSS

76
Q

When selecting a cloud provider, if a provider won’t negotiate a contract:

Always choose another provider

Read the contract carefully, and consult with your advisors, to evaluate the terms and understand the potential risks

Always trust the provider

Contracts are not enforceable in cloud due to the wide range of jurisdictions

A

Read the contract carefully, and consult with your advisors, to evaluate the terms and understand the potential risks

77
Q

Cloud consumers are ultimately responsible for understanding the legal implications of using a particular cloud provider and service.

True
False

A

True

78
Q

A contract with a cloud service provider can fulfill all of the following except one

Clarify what happen when the service is terminated
Clarify the price for the service
Define the minimum security measures taken by the cloud provider
Clarify whether metadata can be reused for secondary purposes
Prevent a breach of security

A

Prevent a breach of security

79
Q

If you own the data, it is still possible for your CSP to own the metadata:

True
False

A

True

80
Q

Why do cloud providers typically limit their customers’ ability to directly assess and inspect their facilities and services?

Cost management

They are worried customers will find vulnerabilities and they will lose business

On-site inspections can be a security risk, and remote assessments are hard to distinguish from real attacks

To deter paying out bug bounties

A

On-site inspections can be a security risk, and remote assessments are hard to distinguish from real attacks

81
Q

Audit scopes for any given standard, like an SSAE16 are always consistent.

True
False

A

False

82
Q

Select all the following sources that are considered artifacts of compliance

Log files
Activity reports
System configuration details
Change management details

A

Log files
Activity reports
System configuration details
Change management details

83
Q

Should you assess or review the audits of a cloud provider more or less frequently than traditional outsourcers?

More
Less

A

More

84
Q

Which CSA tool maps cloud security control specifications to architectural relevance?

Cloud Controls Matrix
STARWatch
The Security, Trust and Assurance Registry (STAR)
Consensus Assessment Initiative Questionnaire

A

Cloud Controls Matrix

85
Q

Where can cloud providers publish their CAIQ and other security/compliance documents to help cloud prospects and customers assess the provider’s current security posture?

The AWS marketplace
The Security, Trust and Assurance Registry (STAR)
The United States Federal Register of Cloud Providers Google

A

The Security, Trust and Assurance Registry (STAR)

86
Q

You are a cloud provider and struggling to respond to a large amount of highly variable customer RFP requests for security controls documentation. Which CSA document could you instead complete and send to customers:

STARWatch
Cloud Controls Matrix
The Security, Trust and Assurance Registry (STAR)
Consensus Assessment Initiative Questionnaire

A

Consensus Assessment Initiative Questionnaire

87
Q

Which CSA. tool allows you to quickly search a providers assessment for controls that map to regulations you care about and see the responses to those controls?

CCM
CAIQ
STAR
STARWatch

A

STARWatch

88
Q

The CSA Cloud Controls Matrix v3.0.1 maps control specifications to FedRAMP High Impact Level.

True
False

A

False

89
Q

The CSA Cloud Controls Matrix v3.0.1 contains how many control specifications?

295
57
133
16

A

133

90
Q

All cloud data is eventually stored on a like a hard drive.

True
False

A

True

91
Q

Which of the following cloud data storage types can be described as “a database for files”?

Object storage
Volume storage
Database storage
Platform storage

A

Object storage

92
Q

Why do we use data dispersion in Cloud Computing?

To improve security by reducing the chances a complete file can be stolen
To improve resiliency in case of individual drive failure
To improve resiliency by eliminating the need for physical drives
To improve security by obviating the need for encryption

A

To improve resiliency in case of individual drive failure

93
Q

Which security tool can help detect sensitive data migrating to the cloud’?

IPS
Data Loss Prevention (DLP)
Data security proxies (DSP)
Firewalls

A

Data Loss Prevention (DLP)

94
Q

Which of the available CASB modes is most cloud-native but often not supported by smaller, especially Saas, providers:

API
In line (cloud)
lnline (local)
Cloud-integrated

A

API

95
Q

Which is the preferred model of protecting data migrating to the cloud:

Encryption proxies, because they are the most efficient
Encrypting files, since you can’t trust network encryption
Encrypting network connections, since you can’t trust file encryption
All are equally effective

A

All are equally effective

96
Q

How does Cloud complicate access controls as compared to traditional data storage?

Cloud storage may offer more options, such as sharing privileges or access to the data’s metadata

Cloud access controls are less reliable

All providers must support the same access controls, which makes building the cloud more complex

There is no difference; they are not more complicated

A

Cloud storage may offer more options, such as sharing privileges or access to the data’s metadata

97
Q

In a Cloud Computing Environment, what is always your most control?

Provider specific controls
Encryption controls
Access controls
Management controls

A

Access controls

98
Q

Select the layer in the stack where encryption is best for protecting discrete data throughout the layers, but may be more complex and is less effective for bulk data.

Application
Database
File/API
Volume Storage

A

Application

99
Q

Select the 3 components of an encryption system.

Encryption engine
Data
Protocol
Key

A

Encryption engine
Data
Key

100
Q

In “externally managed” encryption, which is the key component that should be kept externally to improve security:

Data
Application code
Key management
Encryption Engine

A

Key management

101
Q

Instance managed encryption is:

An example of what not to do
Your preferred option for volume encryption

A

An example of what not to do

102
Q

Which of the following options encrypts data before you transfer it to object storage:

Client-side encryption
Server-side encryption
Externally managed encryption
Application encryption

A

Client-side encryption

103
Q

Select all potential options for encrypting data in PaaS, if they are supported by the platform:

Application-level (in your own code)
Provider-integrated
Volume storage
Database

A

Application-level (in your own code)
Provider-integrated
Database

104
Q

Which location would provide the most secure place to keep encryption keys?

App server
Encryption Server
Storage
Database

A

Encryption Server

105
Q

When using provider managed encryption, you are always sharing the same keys with other tenants.

True
False

A

False

106
Q

Proxy-encryption requires you to break any existing secure connection to your cloud provider.

True
False

A

True

107
Q

Which is the most inherently secure key management option, but it not be viable or even needed depending on your project requirements and platform/provider support?

Third–Party Service
Cloud Provider Service
Virtual Appliance
HSM/Appliance

A

HSM/Appliance

108
Q

To be considered Bring Your Own Key (BYOK) the provider must not be able to ever see or manage your keys.

True
False

A

False

109
Q

Which key management option should you select if you are dealing with highly sensitive data that you don’t want your provider to potentially access under any circumstances:

Virtual appliance
HSM/hybrid
BYOK
3rd party key management service

A

HSM/hybrid

110
Q

Which option allows you to use an existing build for key management without replicating everything in the cloud?

Virtual Appliance
Hybrid
Third-party Service
HSM/Appliance

A

Hybrid

111
Q

For the cloud, where is DLP often best integrated?

The cloud virtual network/VPC
NGFW
Secure Web Gateway
CASB

A

CASB

112
Q

What is the primary goal of data masking?

Hide production data from employees
Turn test data back into production data
Generate test data that still resembles production data
Stop hackers

A

Generate test data that still resembles production data

113
Q

Logs of some events in a cloud environment may not be available to you depending on your choice of cloud provider.

True
False

A

True

114
Q

How should the data security lifecycle be used?

To replace existing data security architectures.

To create granular documentation for all sensitive data in the cloud.

As a lightweight tool to better understand data flow and potential vs. desired data usage.

To create granular documentation for all data, sensitive or not, in the cloud.

A

As a lightweight tool to better understand data flow and potential vs. desired data usage.

115
Q

List the lifecycle phases in order:

Store
Share
Destroy
Create
Archive
Use
A
Create
Store
Use
Share
Archive
Destroy
116
Q

What is the primary objective of mapping functions, actors, and locations?

To replace data flow diagrams
To list all potential security controls
To document information risk
To determine what’s possible vs. what should be allowed

A

To determine what’s possible vs. what should be allowed

117
Q

What do we use to reduce what is possible to what should be allowed within the context of the lifecycle?

Security controls
Key management
CASB or DLP
Entitlement matrix

A

Security controls

118
Q

When moving to cloud, what now becomes within the scope of application security unlike with traditional infrastructure?

Management Plane
SAST
Source code
Architecture

A

Management Plane

119
Q

Arrange the phases of the lifecycle to the correct order.

Design
Test
Develop
Training
Define
A
Training
Define
Design
Develop
Test
120
Q

STRlDE is a common thread modeling framework. Which of the four categories does a cloud provider typically take more responsibility to manage:

Privilege escalation
Denial of service
Spoofing
Information disclosure

A

Denial of service

121
Q

What is one example of a control that can reduce the potential of spoofing:

Encryption
Audit logging
Authorization
Authentication

A

Authentication

122
Q

Specific testing techniques are tightly aligned and should only be performed during their designated phase in the secure software development process

True
False

A

False

123
Q

Which kind of test should be added to static analysis for cloud deployments?

API resiliency
Scanning for stored cloud credentials
Code completion
Regression tests

A

Scanning for stored cloud credentials

124
Q

Which kind of testing will most likely require permission from your cloud provider before performing?

SAST
Vulnerability assessment
Composition analysis
Security unit tests

A

Vulnerability assessment

125
Q

Which vulnerability analysis option will always comply with the terms of service of the cloud provider, but may require paying close attention to network architecture:

Penetration testing
Traditional network-based
Deployment pipeline testing
Host-based

A

Host-based

126
Q

While there are many definitions of DevOps, one technology/process is typically considered to be central to any DevOps program. Which technology is that?

Configuration management
Static analysis
Composition management
Continuous integration

A

Continuous integration

127
Q

Identify the core security benefit of immutable

There are are no manual changes, so everything is consistent and administrative access can be disabled.

It fully isolates developers from production environment

It fully isolates operations from production environments

AU security updates are automatically applied

A

There are are no manual changes, so everything is consistent and administrative access can be disabled.

128
Q

Which of the following are security benefits of DevOps?

Automated Testing
Greater Standardization
Improved Auditing
Improved Security 0perations

A

Automated Testing
Greater Standardization
Improved Auditing
Improved Security 0perations

129
Q

Which of the following is not a new concern of secure operations for applications in the cloud?

The management plane
SAST
WAF limitations/differences
The cloud configuration

A

SAST

130
Q

Which of the following is an inherent architectural security advantage cloud?

12 factor applications
The management plane
Containers
Segregation

A

Segregation

131
Q

How can serverless improve security?

Some attack surface is the responsibility of the cloud provider in the shared responsibilities model

Through automation

Serverless actually reduces security

Better visibility due to the management plane

A

Some attack surface is the responsibility of the cloud provider in the shared responsibilities mode

132
Q

Many of the new architectural options for cloud offer security benefits over what is possible in traditional infrastructure

True
False

A

True

133
Q

What could an email address be considered?

Entity
Identity
Identifier
Authorization

A

Identity

134
Q

What is the technical definition of authentication?

The process of confirming an identity
Providing a user access to a resource 
Allowing a user to perform an action 
The process of validating an entity 
 
A

The process of confirming an identity

135
Q

Which of the following is a discrete type that will have an identity? Examples include users and organizations.

Persona
Role
Entity
Attributes

A

Entity

136
Q

What is the biggest difference between IAM in cloud and in traditional environments?

They use different standards
Cloud is less secure
IAM Must span at least two organizational boundaries
Cloud is more secure

A

IAM Must span at least two organizational boundaries

137
Q

Which IAM standard is best suited for enterprises federating with cloud providers?

OACML
Kerberos
OATH
SAML

A

SAML

138
Q

Which of the following is one of the 3 most common identity standards cloud environments?

Kerberos
SCIM
OATH
XACML

A

OATH

139
Q

In a hub and spoke model, which technology mediates between director servers/identity providers and the service providers/relying parties:

CASB
Attribute services 
Directory servers 
Federated identity brokers 
 
A

Federated identity brokers

140
Q

Which of the following IAM security incidents is more likely in cloud versus traditional infrastructure and requires a dedicated incident response focus?’

Account takeover 
Pass the hash 
Privilege escalation 
Account abuse 
 
A

Account takeover

141
Q

Multifactor authentication is absolutely mandatory for cloud computing due to the higher potential for remote account takeovers.

True
False

A

True

142
Q

Checking to see if a user authenticated with MFA from a corporate IP address to authorize an action is an example of?

Role-based access controls
Authentication
Attribute based access controls
Multifactor authorization

A

Attribute based access controls

143
Q

What is an entitlement matrix used for?

To map the directory servers to the appropriate cloud provider
To translate physical security controls to cloud controls
To communicate security controls to a cloud provider
To document authorizations

A

To document authorizations

144
Q

Why are elasticity and infrastructure templating critical laaS security capabilities?

They optimize performance
These are operational capabilities, not security capabilities
They improve scalability
They enable immutable deployments.

A

They enable immutable deployments.

145
Q

Which of the following protocols should a SaaS provider support to help extend an enterprises existing user management security controls and is considered a critical security capability?

IPv6
AuthZ
SAML
LDAP

A

SAML

146
Q

Why are reviewable audits important when evaluating a cloud provider?

Third party auditors provide better results than internal auditors
They will meet all regulatory and compliance standards
They fill the gaps in any cloud provider security documentation
They provide third party validation when you cannot audit a provider yourself

A

They provide third party validation when you cannot audit a provider yourself

147
Q

Frequent audits and assessments are important when looking at a cloud provider due to how rapidly they evolved their services

True
False

A

True

148
Q

If an attacker compromises one of your virtual machines, and then uses to attack other clients on the same cloud platform, what is the cloud provider’s likely action?

The CSP will prioritize alerting you and providing information needed for you to respond to the attack.

The CSP will first protect the rest of their broader clients, which may mean disrupting your deployment

The CSP has no responsibility in this situation per the shared responsibilities model.

The CSP will prioritize defending the rest of your deployment from the attack.

A

The CSP will first protect the rest of their broader clients, which may mean disrupting your deployment

149
Q

Place the incident response phases in the proper order.

Containment, eradication, recovery
Preparation
Post-mortem
Detection and Analysis

A

Preparation
Detection and Analysis
Containment, eradication, recovery
Post-mortem

150
Q

In which phase would you build a cloud “jump kit” of tools and code to speed a response?

Detection and analysis
Containment and response
Postmortem
Preparation

A

Preparation

151
Q

In which phase would you snapshot a virtual machine for forensics?

Detection and analysis 
Containment and response 
Postmortem 
Preparation
 
A

Detection and analysis

152
Q

Which of the following most helps you quick[y build parallel infrastructure, so that you can rapidly restore operations while still having the compromised environment for analysis?

Infrastructure as code templates
Snapshots
SaaS
PaaS

A

Infrastructure as code templates

153
Q

In a postmortem what would be your highest priority to review and remediate if it was a blocker in your incident response?

Communications with the cloud provider
Internal communications
Container vulnerabilities
Operating system vulnerabilities

A

Communications with the cloud provider

154
Q

Security as a Service is only used to secure cloud services.

True
False

A

False

155
Q

Select all of the following characteristics that are required for something to be considered Security as a Service:

It is a security product or service delivered as a cloud service

It meets the NIST essential characteristics

It is marketed as SECaaS

It is built on a laaS provider

It has a hosted web interface

A

It is a security product or service delivered as a cloud service

It meets the NIST essential characteristics

156
Q

Which of the following is one of the more unique potential benefits of Security as a Service:

Intelligence Sharing
Customer Visibility
Compliance
Transparency

A

Intelligence Sharing

157
Q

Why are regulation differences a potential concern of using Security as a Service?

SECaaS is highly regulated

The cloud consumer may have regulatory obligations the SECaaS provider can’t meet

The cloud provider may have regulatory obligations the customer can’t meet

SECaaS is unregulated

A

The cloud consumer may have regulatory obligations the SECaaS provider can’t meet

158
Q

Using SECaaS removes accountability for the client, but only for the particular security control the service addresses.

True
False

A

False

159
Q

What characteristic would make a Federated Identity Broker be considered SECaaS vs. a traditional tool?

It supports SAML

It is hosted in the cloud, elastic, and you pay per user

It brokers authentication to cloud services

It supports multiple cloud providers AND on premise directories

A

It is hosted in the cloud, elastic, and you pay per user

160
Q

What is a potential advantage of a web security gateway SECaaS over an on-premise tool?

You can protect mobile users without requiring a VPN to the corporate network
It will generally catch more malware
They are always less expensive
Supports HTTPS

A

You can protect mobile users without requiring a VPN to the corporate network

161
Q

Can a cloud-based key management service be integrated with on -premise encryption?

Yes
No

A

Yes

162
Q

What is required to redirect traffic to a cloud WAF?

An on-premise Proxy
DNS Change
A VPN
GRE Tunneling

A

DNS Change

163
Q

Which of the following is not considered a related technology?

Internet of Things
Mobile computing
Security as a Service
Serverless

A

Security as a Service

164
Q

Big Data is often defined as “high volume, high velocity, and high variety What does “high velocity” mean?

Storage elasticity
The data changes constantly/rapidly
Fast raw storage speeds
Fast transfer speeds

A

The data changes constantly/rapidly

165
Q

Why should you consider relying extensively on the isolation capabilities of cloud to defend a big data deployment?

Isolation improves encryption
The distributed storage is always isolated by nature
To meet compliance requirements
Big data platforms tend to have low inherent security

A

Big data platforms tend to have low inherent security

166
Q

While not directly related to cloud, which loT principle is critical for Iong term security?

The ability to patch/update the “things” (devices)
Data encryption
Elasticity
Public APls

A

The ability to patch/update the “things” (devices)

167
Q

Which of the following issues on a mobile device can actually create security risks for the cloud deployment?

Embedded/static/stored credentials
Insecure wireless networks
Use of an out of date operating system
A malicious app

A

Embedded/static/stored credentials

168
Q

Serverless, used properly, can offer more security benefits than risks.

True
False

A

True

169
Q

Which of the following is considered a separate characteristic of cloud in ISO/IEC 17788?

Resource pooling
Metered usage
On-Demand Self-Service
Multi-Tenancy
Elasticity
A

Multi-Tenancy

170
Q

If you are asked to build a server with 8 CPUs and 16GB of RAM, which service model would you use?

VMWare vSphere
SaaS
PaaS
IaaS
RedHat OpenShift
A

IaaS

171
Q

In which layer of the logical model does the management plane exist?

Infostructure
Data Center
Metastructure
Infrastructure
Between PaaS and IaaS
Applistructure
A

Metastructure

172
Q

When dealing with a public cloud provider, what aspect most commonly impacts how you can manage risk?

Co-tenants want to hack your space
Economies of scale
Standard contracts that cannot be customized
Changes to external regulations

A

Standard contracts that cannot be customized

173
Q

What is a key consideration when evaluating private cloud governance?

The entity that owns and/or manages the private cloud
The hypervisor technology used
Control plane authentication methods
Public Cloud governance

A

The entity that owns and/or manages the private cloud

174
Q

In which situations is a party excused from presenting evidence in a court of law?

When it doesn’t exist

When it is too expensive to retrieve

Never; a party must always present data when it’s requested by a judge

When it is not reasonably accessible

A

When it doesn’t exist

When it is not reasonably accessible

175
Q

What is true about an attestation?

Attestation is a legal statement from a 3rd party
Attestation is a testimony in a court of law
Attestations can only be performed by a legal official
Attestation is another term for audit

A

Attestation is a legal statement from a 3rd party

176
Q

When evaluating a cloud provider’s audit report, what should you pay particular attention to?

Whether or not the auditor has their CCSK
Services and Jurisdiction of the audit
The date of the audit report
The auditor’s conclusion

A

Services and Jurisdiction of the audit

177
Q

Which of the following locations are considered part of the data security lifecycle?

A. Location of the Data
B. Location of the access device
C. Location of the data center
D. A and B

A

D. A and B

178
Q

What determines the functions actors are allowed to perform or not?

Entitlements
Information classification
Information governance
Contractual controls
Access Device
A

Entitlements

179
Q

What is meant by data “lock-in”?

Lock-in applies when you are contractually unable to export your data

Exporting data out of a provider would require significant effort

Data exported can be used only with the original provider’s services

All of the above

A

All of the above

180
Q

Which of the following MUST a cloud customer include in their business continuity planning?

Determine how to guarantee availability in the DR region by discussing your DR plans with the vendor

Determine how the IaaS provider will fix any availability issues in your application

Use contract to ensure DR does not result in different jurisdiction to store and process data

Implement Chaos Engineering

A

Determine how to guarantee availability in the DR region by discussing your DR plans with the vendor