CCSK Flashcards
Which technology is generally required to build resource pools?
The Internet
Virtualization
VLANs
CPUs and memory
Virtualization
What is the key difference between traditional virtualization and cloud?
Orchestration
Abstraction
Hypervisors
Commercial virtualization software
Orchestration
Which of the following is not a key potential benefit of cloud computing?
Economics
Agility
Resiliency
Compliance
Compliance
What business benefit(s) was Amazon attempting to realize when they created their internal cloud computing program? Select all that apply
Better match real-time capacity to fluctuating demand
Beat Microsoft
Build a world class public cloud computing platform
Faster time to deploy developer resources
Better match real-time capacity to fluctuating demand
Faster time to deploy developer resources
Resource pools permanently assign resources to a user.
True
False
False
Cloud computing supports scaling up of resources, but not scaling down.
True
False
False
Which of the following appear in both the NIST and ISO/IEC cloud computing definitions? Select all that appl
Self Service/rapid provisioning Self Service Resource pools On-demand Network access
Self Service/rapid provisioning Self Service Resource pools On-demand Network access
Which service model would a cloud database be considered?
Platform as a Service
Software as a Service
Infrastructure as a Service
Storage as a Service
Platform as a Service
Software as a Service is always built on top of Platform as a Service which is always built on Infrastructure as a Service.
True
False
False
Which of the following is most likely to be considered IaaS?
A container registry
The cloud’s management console
A virtual machine
A cloud message queue
A virtual machine
In IaaS, individual virtual machines use which kind of storage?
The local hard drives on the servers
A database platform
VSTOR-based hardware
Virtual volumes from a storage pool
Virtual volumes from a storage pool
Platform as a service abstracts application platforms and platform components from underlying resources, and can be built on top of IaaS.
True
False
True
Which of the following is not required to e considered SaaS?
Customer management of the underlying resources
Underlying physical hardware
A complete application
The essential characteristics
Customer management of the underlying resources
If an organization uses Community Cloud Deployment Model, some portion of the physical infrastructure MUST be on-premises with one of the community members.
True
False
False
If an organization employs the technique of cloud bursting, which cloud model are they utilizing?
Hybrid
Multi-tenancy
PaaS
Proprietary
Hybrid
Which element of the logical model describes the cloud management plane?
Infostructure
Applistructure
Infrastructure
Metastructure
Metastructure
In which service model does the cloud consumer have the least amount of control over security?
Infrastructure as a Service
Platform as a Service
Software as a Service
Security as a Service
Software as a Service
In which cloud service model is the cloud consumer responsible for ensuring that the hypervisor is not vulnerable to attack?
Infrastructure as a Service
Software as a Service
Platform as a Service
None of the above
None of the above
When should you define the security controls when building a cloud deployment?
Before determining the service and deployment models
After identifying requirements
After identifying control gaps
Before selecting the provider
After identifying control gaps
Cloud infrastructure security does not include the virtualization components.
True
False
False
Which of the following resource pools is not associated with IaaS?
Compute
Storage
Network
Middleware
Middleware
Which of the following are typically in the underlying infrastructure of a cloud? Select all that apply
Database Identity Service Message queue API Server Hypervisors
Database Identity Service Message queue API Server Hypervisors
Why is hardening infrastructure components so important?
Clouds are sometimes based on common components that may cause vulnerabilities
All security is important
Infrastructure components are most likely to be exposed to cloud customers
This prevents the cloud provider from accessing cloud consumer data
Clouds are sometimes based on common components that may cause vulnerabilities
Which of the following physical networks is used for Internet to instance traffic?
Management
Storage
Service
Virtual
Service
Why should cloud providers use multiple underlying physical networks? Select all that apply
Cost management
Resiliency
Better performance
Better isolation
Better performance
Better isolation
Which virtual network technology is best suited for cloud?
Token Ring
V-flow
VLAN
SDN
SDN
Virtual Networks:
Are more flexible, but more difficult to secure
Substitute for physical networks
May include inherent security capabilities
Take fewer resources
May include inherent security capabilities
Which is a defining characteristic of Software Defined Networks?
Uses OpenFlow
Decouples the control plane from the underlying physical network
Leverages packet tagging
Autoscaling for resiliency
Decouples the control plane from the underlying physical network
Which SDN security capability often replaces the need for a physical or virtual appliance?
Integrated isolation
Default deny
Lack of support for packet sniffing
Security groups
Security group
The most effective way for an attacker to compromise a security group is to compromise the host/virtual machine and then modify the rules.
True
False
False
Which of the following is the most effective security barrier to contain blast radius?
Virtual network
Virtual subnet (with or without ACLs)
Security group
Cloud account/project/subscription
Cloud account/project/subscription
How does a virtual network affect network visibility?
Virtual networks block packet capture for better isolation
An SDN can provide more visibility than a physical network
Virtual networks always encrypt traffic and break packet capturing
Virtual machines on the same physical host don’t use the physical network
Virtual machines on the same physical host don’t use the physical network
Place the following network security tools in the preferred order in most cloud deployments, from 1 (most preferred} to 4.
Virtual appliance
Physical Appliance
Inherent cloud controls
Host security agents
- Inherent cloud controls
- Host security agents
- Virtual appliance
- Physical Appliance
What is the purpose of a bastion network/transit VPC?
To better support multiple virtual networks and accounts in hybrid scenarios
To better lock down a hybrid cloud
To create a cloud DMZ
To improve internal routing and IP address space availability
To better support multiple virtual networks and accounts in hybrid scenarios
Which of the following is primarily a responsibility of the cloud provider?
Configuring security groups
Securing the underlying virtualization technology
Correct configuration in the management plane
Designing subnets, virtual networks, and ACLS2
Securing the underlying virtualization technology
Of the following, which is the most important use case for the Software Defined Perimeter?
To secure hybrid networks
To encrypt SON traffic
For federated network identity
To improve and secure remote access
To improve and secure remote access
Which of the following are cloud workloads? Select all that apply:
Virtual machines
Serverless/Function as a Service
Host servers
Containers
Virtual machines
Serverless/Function as a Service
Containers
Which of the following most impacts traditional workload security controls when applied to cloud deployments?
Hypervisors
Low resiliency
High volatility/rates of change Security groups
Serverless
High volatility/rates of change Security groups
How can immutable workloads improve security?
They eliminate error-prone manual management
They better support use of traditional security tools
They better meet performance requirements
They scale for DDoS
They eliminate error-prone manual management
Select the cloud workload security option that can most improve overall security and reduce attack surface:
Store Logs external to instances
Select cloud aware host security agents
Use immutable as much as possible
Leverage existing/traditional vulnerability assessment tools
Use immutable as much as possible
Which of the following is primarily a cloud consumer workload security responsibility?
Volatile memory security
Hypervisor security
Underlying infrastructure security
Monitoring and logging
Monitoring and logging
Why is management plane security so critical?
It is the primary integration point for hybrid cloud.
It is the best way for cloud consumers to protect themselves from hostile cloud provider employees.
REST APIs are inherently insecure.
Compromise of the management plane potentially compromises all cloud assets
Compromise of the management plane potentially compromises all cloud assets
Select the best option for authenticating to a cloud API
HTTP request signing
Username/password
Biometrics
TLS-MA
HTTP request signing
Place the management plane security steps to the correct order
Secure Root Account
Enable Monitoring/Auditing
Manage non-Root Users
- Secure Root Account
- Manage non-Root Users
- Enable Monitoring/Auditing
Identify one drawback to managing users in the management plane:
The reliance on RAC
Insufficient MFA support
High variability between cloud providers
Lack of SSO support
High variability between cloud providers
What is the role of a service administrator?
They are the core administrators for a cloud account.
To administer a limited set of cloud services
To administer cloud platform/management plane users.
To isolate application security
To administer a limited set of cloud services
Select the best option for management plane monitoring, when it is available:
Inherent cloud auditing, since it captures the most activity
Inherent cloud auditing, since that offloads responsibility to the cloud provider
Proxy-based auditing, since it eliminates the need to trust the cloud provider
Proxy-based auditing, since it captures more activity
Inherent cloud auditing, since it captures the most activity
Multi factor authentication is the single most important management plane security control.
True
False
True
What is the single most important rule for cloud BC/DR?
Use object storage for backups
Snapshot regularly
Architect for failure
Use multiple cloud providers
Architect for failure
Which is not a key aspect of cloud BC/DR?
Hypervisor resiliency
Continuity within the provider/platform
Portability
Preparing for provider outages
Hypervisor resiliency
Which is the logical model layer that is most difficult to enable for DR across cloud providers.
Metastucture
Infrastructure
Infostructure
Applicstructure
Metastucture
Select a technique to manage continuity within the cloud provider.
Multi-cloud provider plans
Cross-location/region design
Hybrid cloud backup
Data portability
Cross-location/region design
Select the governance tool that is most affected by the transition to cloud computing:
Chart of accounts
Mission statement
Board of director reporting
Compliance reporting
Compliance reporting
In terms of cloud computing and security… what is the primary governance role of a contract?
To define the data custodian
Defines how you extend internal controls to the cloud provider
Cost management
Regulatory Requirements
Defines how you extend internal controls to the cloud provider
Does the shared responsibilities model define the contract or the contract define the shared responsibilities model?
The contract defines the shared responsibilities model
The shared responsibilities model defines the contract
The contract defines the shared responsibilities model
Select the layer where you evaluate your providers:
Governance Risk tolerance Supplier Assessment Contracts Share Responsibilities Model Risk mangement
Supplier Assessment
What is the responsibility of information risk management?
Manage overall risk to the organization
Determine the overall risk of cloud providers
Eliminate all risks to information assets
Align risk management to the tolerance of the data owner
Align risk management to the tolerance of the data owner
Your risk assessment effort should be equal for all information assets.
True
False
False
In which service model does the cloud consumer have to rely most on what is in the contract and documented to enforce and manage security?
Hybrid
SaaS
PaaS
IaaS
SaaS
Under which conditions is managing risk similar for public and private cloud?
When your private cloud is third party hosted and managed
The risk profiles are always the same
No conditions; public cloud is always riskier
When using a major public cloud provider
When your private cloud is third party hosted and managed
Which do you need to rely more on to manage risks when using public cloud computing?
Testing instead of assessments and attestations
Contracts and SLA
Physical control of assets
Consultants
Contracts and SLA
What is critical when evaluating a cloud service within your risk management program?
Accounting for the context of the information assets involved
Eliminating all outsourcing risk
Minimizing regional harm
Ensuring the provider’s security program supports your existing on-premise tools
Accounting for the context of the information assets involved
How can you manage risk if you can’t negotiate a contract with the cloud provider?
Use compensating controls and your own risk mitigation mechanisms
Always choose a different provider
Accept all potential risks
Obtain cyberinsurance
Use compensating controls and your own risk mitigation mechanisms
Audits are only used to meet government regulatory requirements.
True
False
False
Cloud changes compliance. Select the statement that is incorrect:
Metastructure/management may span jurisdictions even if data is localized
There may be a greater reliance on third party audits
There are large variations between the compliance capabilities of different cloud providers
The cloud provider is ultimately responsible for their customer’s compliance
The cloud provider is ultimately responsible for their customer’s compliance
Which is not a source of compliance obligations?
Internal Audits
Legislation
Contracts
Industry Standards
Internal Audits
Compliance inheritance means that an application built on top of a cloud provider’s service that is compliant with a regulation/standard is always guaranteed to be compliant.
True
False
False
The Cloud Security Alliance Security Guidance provides:
Legal Advice
Legal Guidance
Legal Recommendation
Information you should discuss with your attorneys.
Information you should discuss with your attorneys.
The Australian Privacy Act of 1988 can apply to Australian customers, even if the cloud service provider is based elsewhere:
True
False
True
What is the purpose of a data localization law?
To require company to hire only local workers
To require that all business documents be in the country’s official language
To require service providers to register with the country’s data protection commission
To require that data about the country’s citizens be stored in the country
To require that data about the country’s citizens be stored in the country
Which of the following is correct?
GDPR Stands for “Government Data Privacy Rule”.
GDPR Establishes fines of $1,000 per credit card number compromised
GDPR prohibits the transfer of personal data outside the EU or EEA to a country that does not offer a similar privacy rights
GDPR requires that EU member state’s national laws impose network requirements on operators of essential services
GDPR prohibits the transfer of personal data outside the EU or EEA to a country that does not offer a similar privacy rights
The Federal Government in the United States does not directly address issues of data privacy, but instead leave it up to the states to create laws that address privacy concerns.
True
False
False