CCSK: Certificate of Cloud Security Knowledge 3 of 6 Practice Flashcards
When is a party excused from presenting evidence in a court of law?
A.When it doesnt exist
B.When it is too expensive to retrieve
C.Never; a party must always present data when its requested by a judge
D.When its not reasonably accessible
D.When its not reasonably accessible
Explanation:
FRCP clause 26(b)(2)(B) permits data not being presented as evidence when it is not reasonably accessible. This may be applicable, for instance, when a bit-level copy of a drive is required when the data is stored in a cloud environment.
What format should be used when presenting electronically stored information (ESI) in a court of law?
A.PDF
B.CSV
C.Standard Format
D.Native Format
C.Standard Format
Explanation:
The best answer is that evidence is most useful if it is presented in a standard format. Although both PDF and CSV can be considered standard formats, neither is the best answer here, because standard format is more accurate as a response. Presentation of native format may be required if metadata isn’t properly preserved as part of an export routine.
Which of the following may lead to issues with validating that any data found is complete and accurate when stored in a cloud environment?
A.Transparency
B.Use of unknown hardware at provider location
C.There are no issues with validating data stored in the cloud
D.Lack of metadata in cloud environments
A.Transparency
Explanation:
Transparency issues may cause issues with validating that any data found is complete and accurate. Any issues must be identified as part of due diligence of the provider environment.
Which of the following is the minimum retention period for any data that may be required in a court of law?
A.1 year
B. 5 years
C.Any data that may be considered evidence must be retained
D.There is no general minimum retention period of data
D.There is no general minimum retention period of data
Explanation:
-There are no mandated retention periods that are generically applied to all data sets. Different retention periods will be applied by laws or other means (such as standards, continued value to the company, and so on) based on the type of data. Although data that can be reasonably expected to serve as evidence in a court case should be preserved by an organization, there is no retention period mandated for these data sets.
What is the most important item to consider when reviewing third-party audits and attestations?
A.The firm that performed the audit
B.The services being consumed by the customer
C.The location of services
D.The service provider certification
B.The services being consumed by the customer
Explanation:
The services being consumed by the customer is the most important item to consider when reviewing third-party audits and attestations. Although all of the other options are certainly valid, they are of little value if the services consumed are not part of the scope of the audit being reviewed
What should a customer do when dealing with a non-negotiable contract where controls may be lacking?
A.Do not use the service provider
B.Identify any gaps and fill them with appropriate controls
C.Purchase cyber-insurance to mitigate the associated risk
D.Accept the risk the provider accepts
B.Identify any gaps and fill them with appropriate controls
Explanation:
The best answer is to identify potential gaps and implement controls to address perceived risk. Although risk response may include avoiding the risk by not using the provider, accepting the risk, and mitigating financial damages by purchasing cyberinsurance, the best answer is to identify the controls the provider is contractually required to supply, determine your requirements, and address gaps by deploying controls.
The Australian Privacy Act requires that a breach disclosure be performed in which scenario?
A.When any data pertaining to a citizen is disclosed
B.When personally identifiable information is disclosed
C.When disclosure would be likely to cause serious harm to the individual
D.The Australian Privacy Act does not address breach notification requirements
C.When disclosure would be likely to cause serious harm to the individual
Explanation:
The Australian Privacy Act requires that a breach of security must be reported when personal information that may lead to serious harm is disclosed
How must audits be conducted?
A.Always bu your company
B.Always by the provider
C.Always by an independent auditor
D.Always by a federal regulator
C.Always by an independent auditor
Explanation:
The key concept for audits is that they are performed by an independent auditor. This is true for all audits. Although you may want to conduct an audit of a provider yourself, the provider may view giving you access to a data center as a security issue, for example.
A pass-through audit is a form of what?
A.Compliance inheritance
B.Demonstration of adherence by the provider to industry standards
C.A physical assessment that has taken place as part of the audit
D.A term used for all services being in scope for the audit engagement
A.Compliance inheritance
Explanation:
Pass-through audits are a form of compliance inheritance. The audit does not speak to the completeness of the audit scope itself. Rather, it certifies that the controls implemented and managed by the provider are compliant. Your organization is required to meet compliance for your systems and data in the provider’s environment.
How do audits work with compliance?
A.Audit are the technical means to assess systems
B.Audits are the processes and procedures used to assess systems
C.Audits are a key tool for proving or disproving compliance
D.Audits are required for proper governance of cloud systems
C.Audits are a key tool for proving or disproving compliance
Explanation:
The most accurate and therefore the best answer is that audits are used to prove or disprove compliance with corporate governance.
Which of the following statement regarding service administrator account is not true?
A.Service administrator accounts manage parts of the service
B.Service administrators accounts are more suited for common daily use
C.Service administrators help compartmentalize individual sessions
D.Service administrator accounts can expose the entire deployment
D.Service administrator accounts can expose the entire deployment
Explanation:
Service administrator accounts don’t necessarily expose the entire deployment if they are abused or compromised and thus are better for common daily usage. Your platform or provider may support lower-level administrative accounts that can only manage parts of the service. We sometimes call these “service administrators” or “day to day administrators”. These accounts don’t necessarily expose the entire deployment if they are abused or compromised and thus are better for common daily usage. They a`
All assets in the cloud require same business continuity.
A.CORRECT
B.INCORRECT
B.INCORRECT
Explanation:
Overall, a risk-based approach is key: • Not all assets need equal continuity. • Don’t drive yourself crazy by planning for full provider outages just because of the perceived loss of control. Look at historical performance. • Strive to design for RTOs and RPOs equivalent to those on traditional infrastructure. Source: Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 Topic: Architect for Failure Domain 6// MANAGEMENT PLANE AND BUSINESS CONTINUITY
In the United States, a party is obligated to take reasonable steps to prevent the destruction or modification of data in its possession that it knows, is relevant to pending litigation or government investigation.
A.CORRECT
B.INCORRECT
A.CORRECT
Explanation:
In the United States, a party is generally obligated to undertake reasonable steps to prevent the destruction or modification of data in its possession, custody or control that it knows, or reasonably should know, is relevant either to pending or reasonably anticipated litigation or a government investigation. (This is often referred to as a “litigation hold” on document destruction.) Source: Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 Topic: Preservation Domain 3 // LE
In which type of environment it is impractical to allow clients to conduct their own audits ?
A.Multi application environment B.Dedicated environment C.Multi tenant environment D.Long Distance relationships E.Multi-database environment
C.Multi tenant environment
Explanation:
Multi-tenant environment. Forensics: Bit-by-bit imaging of a cloud data source is generally difficult or impossible. For obvious security reasons, providers are reluctant to allow access to their hardware, particularly in a multitenant environment where a client could gain access to other clients’ data. Even in a private cloud, forensics may be extremely difficult, and clients may need to notify opposing counsel or the courts of these limitations. Luckily, this type of forensic analysis is rarel
Cloud service providers leverage which of the following to manage costs and enable capabilities?
A.On demand self service B.Broad network access C.Measured service D.Economies of scale E.Resource pooling
D.Economies of scale
Explanation:
Cloud service providers try to leverage economies of scale to manage costs and enable capabilities. This means creating extremely standardized services (including contracts and service level agreements) that are consistent across all customers. Governance models can’t necessarily treat cloud providers the same way they’d treat dedicated external service providers, which typically customize their offerings, including legal agreements, for each client. Source: Security Guidance for Critical Areas
Which of the following describes the cloud management plane?
A.It is a layer in which all types of devices and resources from different vendors are interconnected
B.Is a layer where the data center is the component element
C.APIs that are remotely accessible and those wrapped into a web based user interface
D.Is a layer consisting of plenty of vendors and third party applications
C.APIs that are remotely accessible and those wrapped into a web based user interface
Explanation;
APIs are both remotely accessible and wrapped into a web-based user Interface. This combination is the cloud management plane, since consumers use it to manage and configure the cloud resources, such as launching virtual machines (instances) or configuring virtual networks. Option B. is Infrastructure plane. Option C. is Cloud Control plane. Option D. is Application plane. Physical facilities and infrastructure hardware form the foundation of IaaS. With cloud computing we abstract and pool these
Which of the following is not one of the benefits of Cloud Computing?
A.Agility
B.Economy
C.Vendor Lock In
D.Resiliency
C.Vendor Lock In
Explanation:
Vendor Lock-in could be a disadvantage of Cloud Computing. Cloud computing offers tremendous potential benefits in agility, resiliency, and economy. Organizations can move faster (since they don’t have to purchase and provision hardware, and everything is software defined), reduce downtime (thanks to inherent elasticity and other cloud characteristics), and save money (due to reduced capital expenses and better demand and capacity matching). We also see security benefits since cloud providers ha
How can web security as a service be offered to the cloud customer?
A.Via the cloud using proxy or redirecting web traffic to the cloud provider
B.Either on premise through software and/or appliance installation
C.Both of these
D.None of these
C.Both of these
Explanation:
Explanation Web Security (Web Security Gateways) Web Security involves real-time protection, offered either on-premise through software and/or appliance installation, or via the Cloud by proxying or redirecting web traffic to the cloud provider (or a hybrid of both). This provides an added layer of protection on top of other protection, such as anti-malware software to prevent malware from entering the enterprise via activities such as web browsing. In addition, it can also enforce policy rules
In which phase of the application design and development process, the focus is on architecture?
A.Test B.Develop C.Design D.Training E.Define
C.Design
Explanation:
During the application design process, especially when PaaS is involved, the focus for security in cloud is on architecture. Design: During the application design process, especially when PaaS is involved, the focus for security in cloud is on architecture, the cloud provider’s baseline capabilities, cloud provider features, and automating and managing security for deployment and operations. There are often significant security benefits to integrating security into the application architecture s
Which of the following is among the top security benefits?
A.Data Protection
B.Compatibility with consumer IT services and infrastructure
C.Lock-In
D.More timely, effective and efficient updates and default
E.Certifications and Accreditations
D.More timely, effective and efficient updates and default
Explanation:
More timely, effective and efficient updates and default is amongst one of the TOP SECURITY BENEFITS. Explanation MORE TIMELY, EFFECTIVE AND EFFICIENT UPDATES AND DEFAULTS: default virtual machine images and software modules used by customers can be pre-hardened and updated with the latest patches and security settings according to fine-tuned processes; IaaS cloud service APIs also allow snapshots of virtual infrastructure to be taken regularly and compared with a baseline. Updates can be rolled
Which of the following tools provide a standard template for cloud providers to document their security and compliance controls ?
A.Cloud Security Alliance STAR Registry B.Cloud Provider Contracts C.Consensus Assessments Initiative Questionnaire D.Cloud Control Matrix E.Supplier (Cloud Provider) Assessments
B.Cloud Provider Contracts
C.Consensus Assessments Initiative Questionnaire
Explanation:
The Consensus Assessments Initiative Questionnaire (CAIQ) is a tool from Cloud Security Alliance (CSA) that provides a standard template for cloud providers to document their security and compliance controls. The Consensus Assessments Initiative Questionnaire (CAIQ). A standard template for cloud providers to document their security and compliance controls. • The Consensus Assessments Initiative Questionnaire (CAIQ).
Which of the following is an underlying vulnerability related to loss of Governance?
A.Lack of resource isolation B.Lack of standard technologies and solutions C.Lack of capacity planning D.Unclear asset ownership E.Lack of information on jurisdictions
D.Unclear asset ownership
Explanation:
Explanation Loss of Governance Vulnerabilities · Unclear roles and responsibilities · Poor enforcement of role definitions · Synchronizing responsibilities or contractual obligations external to cloud · SLA clauses with conflicting promises to different stakeholders · Audit or certification not available to customers · Cross-cloud applications creating hidden dependency · Lack of standard technologies and solutions · Storage of data in multiple jurisdictions and lack of transparency about THIS ·
Which of the following is an important consideration in management plane usage?
A.Multi Factor Authentication B.Segregation of Duties C.Least Privilege D.Authorization E.Biometric Authentication
C.Least Privilege
Explanation:
Both providers and consumers should consistently only allow the least privilege required for users, applications, and other management plane usage. All privileged user accounts should use multi-factor authentication (MFA). If possible, all cloud accounts (even individual user accounts) should use MFA. It’s one of the single most effective security controls to defend against a wide range of attacks. This is also true regardless of the service model: MFA is just as important for SaaS as it is for
Which of the following statement is true for orchestration?
A.Orchestration allows the cloud provider to divvy up resources to different groups
B.Orchestration is used to coordinate carving out and delivering a set of resources from the pools to the consumers
C.Orchestration is used to coordinate carving out and delivering a set of resources from the pools to the consumers
D.Orchestration ensures that different groups cant see or modify each other assets
C.Orchestration is used to coordinate carving out and delivering a set of resources from the pools to the consumers
Explanation:
Orchestration is done (and automation) to coordinate carving out and delivering a set of resources from the pools to the consumers. The key techniques to create a cloud are abstraction and orchestration. We abstract (abstraction) the resources from the underlying physical infrastructure to create our pools, and use orchestration (and automation) to coordinate carving out and delivering a set of resources from the pools to the consumers. As you will see, these two techniques create all the essent