CCSK: Certificate of Cloud Security Knowledge 1 of 6 Practice Flashcards
What risk must be mitigated by a customer?
A. Any Risk
B. Risks associated with the service model
C.Risks accepted by the provider
D.Risks listed in the Cloud Controls Matrix
C.Risks accepted by the provider
Explanation:
The best answer is that a customer must mitigate any risk accepted by the provider, except for any risk the customer determines unacceptable. This must be based on the value of a particular system and cannot be a blanket approach.
What is the number one tool of governance in a cloud?
A.Reviewing vendor certifications
B.Training your people on cloud security
C.Working with auditors with cloud experience
D.Contract review
D.Contract review
Explanation:
Contract reviews are the primary tool associated with governance in a cloud.
Which of the following will not prevent you from moving unapproved data to cloud services?
A.Data Loss Prevention B.Database Activity Monitoring (DAM) C.File Activity Monitoring (FAM) D.URL Filtering E.Intrusion Detection System (IDS)
E.Intrusion Detection System (IDS)
Explanation:
Aside from traditional data security controls (like access controls or encryption), there are two other steps to help manage unapproved data moving to cloud services: Monitor for large internal data migrations with Database Activity Monitoring (DAM) and File Activity Monitoring (FAM). Monitor for data moving to the cloud with URL filters and Data Loss Prevention.
Which of the following is one of the most common open standards to enable federation in the cloud?
A.XML B.Kerbros C.SAML D.X.509 E.SOAP
C.SAML
Explanation:
A variety of Identity providers or Service providers may generate tokens such as SAML, OpenID, or OAuth tokens for session caching allowing a pass-through sign-on capability. Applications to be deployed in cloud should have capability to integrate with these claims/assertion services and Applications/services should be designed to support the open standards for Federation, i.e. SAML, OAuth, OpenID. Source: Security Guidance for Critical Areas of Focus in Cloud Computing Topic: IAM Standards for
How can you prevent cloud providers from inappropriately accessing customer data?
A.Encrypt your data at rest and implement multi-factor authentication
B.Implement strong access controls on your data
C.Wherever possible, do not store the keys in the cloud
D.Disable the root user access and delete the access keys
E.Use strong contractual controls to prevent unauthorized access
C.Wherever possible, do not store the keys in the cloud
Explanation:
Wherever possible, keys should not be stored in the cloud and must be maintained by the enterprise or a trusted key management service provider. Where data is stored in a public cloud environment, there are problems when exiting that environment to be able to prove that all data (especially PII or SPI data, or data subject to regulatory assurance regimes) has been deleted from the public cloud environment, including all other media, such as back-up tapes. Maintaining local key management allows
Which of the following is a permission to do something like access a file, network, or perform a certain function like an API call on a particular resource?
A.Identification B.Authorization C.Authentication D.Access Control E.Entitlement
B.Authorization
Explanation:
An authorization is permission to do something—access a file or network, or perform a certain function like an API call on a particular resource. An access control allows or denies the expression of that authorization, so it includes aspects like assuring that the user is authenticated before allowing access. An entitlement maps identities to authorizations and any required attributes (e.g. user x is allowed access to resource y when z attributes have designated values). We commonly refer to a m
Role-Based Access Control (RBAC) model for IAM offers greater flexibility and security than the Attribute-Based Access Control (ABAC) model
A.INCORRECT
B.CORRECT
A.INCORRECT
Explanation:
Cloud platforms tend to have greater support for the Attribute-Based Access Control (ABAC) model for IAM, which offers greater flexibility and security than the Role-Based Access Control (RBAC) model. RBAC is the traditional model for enforcing authorizations and relies on what is often a single attribute (a defined role). ABAC allows more granular and context aware decisions by incorporating multiple attributes, such as role, location, authentication method, and more. • ABAC is the preferred mo
Which of the following is a preferred model for cloud-based access management?
A.Attribute based
B.Access based
C,Identity based
D.Role based
A.Attribute based
Explanation:
ABAC is the preferred model for cloud-based access management. Cloud platforms tend to have greater support for the Attribute-Based Access Control (ABAC) model for IAM, which offers greater flexibility and security than the Role-Based Access Control (RBAC) model. RBAC is the traditional model for enforcing authorizations and relies on what is often a single attribute (a defined role). ABAC allows more granular and context aware decisions by incorporating multiple attributes, such as role, loca
In addition to providing better server utilization, and data center consolidation, virtualization also reduces the security threats significantly.
A.INCORRECT
B. CORRECT
A.INCORRECT
Explanation:
Virtualization brings with it all the security concerns of the operating system running as a guest, together with new security concerns about the hypervisor layer, as well as new virtualization specific threats, inter-VM (Virtual Machine) attacks and blind spots, performance concerns arising from CPU and memory used for security, and operational complexity from “VM sprawl” as a security inhibitor. New problems like instant-on gaps, data comingling, the difficulty of encrypting virtual machine im
Which logical model holds the management plane that is exposed to customers?
A.Infostructure
B.Applistructure
C.Metastrcture
D.Infrastructure
C.Metastrcture
Explanation:
The management plane is part of the metastructure logical model.
You are running a web server in an IaaS environment. You get a call from a customer saying the server appears to have been compromised. Which logical model has been impacted?
A.Infostructure
B.Applistructure
C.Metastructure
D.Infrastructure
B.Applistructure
Explanation:
The web server is part of the applistructure. The controls surrounding the web server would be implemented at the metastructure level, but the web server itself is at the applistructure level (and data is at the infostructure layer).
Which of the following is NOT an essential characteristic of cloud as per NIST?
A.Multitenancy
B.Elasticity
C.Resource pooling
D.On-demand self-service
D.On-demand self-service
Explanation:
NIST doesn’t call out multitenancy as an essential characteristic. ISO, however, does call out multitenancy as part of the resource-pooling essential characteristics.
In which logical model would you implement a virtual firewall?
A.Infostructure
B.Applistructure
C.Metastructure
D.Infrastrucure
C.Metastructure
Explanation:
All controls in the virtual environment are performed at the metastructure layer. If the question asked about installing a firewall agent, that would occur at the applistructure layer.
How is one consumer’s access tightly isolated from other consumers in a public cloud environment?
A.Strong passwords
B.RBAC
C.Policies at the provider side
D.Policies at the customer side
C.Policies at the provider side
Explanation:
Tenants are protected by policies at the provider side. Consider, for example, network sniffing. One tenant will never see network traffic destined for another tenant. As a general rule, one tenant should never know that another tenant even exists. Although consumers will also have their own policies in place, the provider must ensure that there is strong isolation of workloads and tenants. This makes C the best answer.
Orchestration enables a controller to request resources from a pool of resources. How is this done?
A.Ticketing systems prioritizes clients based on support level
B.Through the use of REST APIs
C.Through the use of RPC
D.Via network calls
B.Through the use of REST APIs
Explanation:
Orchestration generally uses REST API calls. Although orchestration is, of course, performed across a network, the best answer is REST API calls. This is an example of the tricks that test writers like to pull on candidates.
You are instructed to build a server with eight CPUs and 8GB of RAM. Which service model would you use?
A.SaaS
B.PaaS
C.IaaS
D.No cloud provider supports a machine with 8 CPUs
C.IaaS
Explanation:
This is a prime example of why you would use IaaS—access to core foundational computing.
Your company is using a PaaS provider to host a Python 2.7–based application. One day, the provider sends you an e-mail stating they will no longer support the Python 2.7 platform and all applications must be upgraded to use Python 3.6 within two weeks. What is the first action you should take?
A.Test the application in Python 3.6
B.Tell the provider you cant meet this timeline
C.Providers are restricted by law from doing this
D.Launch a lawsuit against the provider for pain and suffering
A.Test the application in Python 3.6
Explanation:
When a platform is deprecated (no longer supported), the provider will generally give you access to a test environment where you can test your application using the new platform. As for the time provided in the question, it’s a bit extreme based on what I’ve experienced, but there is no law stopping a provider from giving you hours to migrate, let alone weeks.
Chris is looking to procure a new CRM SaaS solution for his organization’s business unit. What is the first step Chris should take as part of performing a risk assessment of a potential vendor?
A.Determine monthly costs
B.Ask reference clients about their satisfaction with their product
C.Determine the level of sensitivity of data that will be stored in the application
D.Obtain and review supplier documentation
D.Obtain and review supplier documentation
Explanation:
The first step in performing a risk assessment is requesting documentation.
Pat is looking for an industry standard set of controls that are cloud specific. What can Pat select controls from to create a baseline risk assessment process?
A.ISO 27001
B.NOST RMF
C.COBIT
D.CCM
D.CCM
Explanation:
The CCM has a series of controls that are cloud specific. None of the other answers are applicable
Your IaaS vendor assures you that your applications will be PCI compliant if you use their cloud offering. What is wrong with this statement?
A.The vendor has no idea what they are talking about
B.The vendor is lying to you
C.The vendor doesn’t understand the shared responsibility model of cloud
D.All of these are true
D.All of these are true
Explanation:
All of the statements are applicable.
How often should risk assessments be performed against a cloud service provider?
A.Upon initial assessment prior to on-boarding
B.Upon initial assessment and on an ongoing basis
C.Providers dont allow customers to perform risk assessments
D.There are no risks associated with cloud services
B.Upon initial assessment and on an ongoing basis
Explanation:
Risk assessments should be performed prior to and throughout the use of a provider’s offering.
Virtualization security in cloud computing is the responsibility of cloud provider.
A.INCORRECT
B.CORRECT
A.INCORRECT
Explanation:
Virtualization security in cloud computing follows the shared responsibility model. Virtualization security in cloud computing follows the shared responsibility model. The cloud provider will always be responsible for securing the physical infrastructure and the virtualization platform itself. Meanwhile, the cloud customer is responsible for properly implementing the available virtualized security controls and understanding the underlying risks, based on what is implemented and managed by the cl
Which of the following statements regarding SDN (Software Defined Networking) is not CORRECT?
A.Abstracts the network management plane from physical infrastructure
B.Is defined using software settings and API calls
C.Does not overlay the overlapping addresses
D.Supports orchestration and agility
C.Does not overlay the overlapping addresses
Explanation:
You can overlay multiple virtual networks using SDN, even the ones that completely overlap their address ranges. SDN abstracts the network management plane from the underlying physical infrastructure, removing many typical networking constraints. For example, you can overlay multiple virtual networks, even ones that completely overlap their address ranges, over the same physical hardware, with all traffic properly segregated and isolated. SDNs are also defined using software settings and API cal
Containers provide full security isolation and task segregation.
A.INCORRECT
B.CORRECT
A.INCORRECT
Explanation:
Containers don’t necessarily provide full security isolation, but they do provide task segregation. Containers don’t necessarily provide full security isolation, but they do provide task segregation. That said, virtual machines typically do provide security isolation. Thus you can put tasks of equivalent security context on the same set of physical or virtual hosts in order to provide greater security segregation.