CCSK: Certificate of Cloud Security Knowledge 2 of 6 Practice Flashcards
For which of the following SecaaS concerns, providers should be held to the highest standards of multitenant isolation and segregation?
A.Lack of sufficient visibility
B.Fear of data leakage
C.Global Regulatory Differences
D.Requirements to handle regulated data
B.Fear of data leakage
Explanation:
Data leakage- As with any cloud computing service or product, there is always the concern of data from one cloud user leaking to another. This risk isn’t unique to SecaaS, but the highly sensitive nature of security data (and other regulated data potentially exposed in security scanning or incidents) does mean that SecaaS providers should be held to the highest standards of multitenant isolation and segregation. Security-related data is also likely to be involved in litigation, law enforcement i
Cloud based Web Application Firewalls (WAFs) also include anti-DDoS capabilities.
B.CORRECT
Explanation:
In a cloud-based WAF, customers redirect traffic (using DNS) to a service that analyzes and filters traffic before passing it through to the destination web application. Many cloud WAFs also include anti-DDoS capabilities. Source: Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 Topic: Web Application Firewalls Domain 13 // SECURITY AS A SERVICE
Which of the following encryption methods is utilized when object storage is used as the back-end for an application?
A.Object encryption B.Asymmetric encryption C.Database encryption D.Symmetric encryption E.Client/Application Encryption
E.Client/Application Encryption
Explanation:
Object storage encryption protects from many of the same risks as volume storage. Since object storage is more often exposed to public networks, it also allows the user to implement Virtual Private Storage. Like a VPN, a VPS28 allows use of a public shared infrastructure while still protecting data, since only those with the encryption keys can read the data even if it is otherwise exposed. · File/Folder encryption and Enterprise Digital Rights Management. Use standard file/folder encryption too
Which technique is used in the cloud to coordinate carving out and delivering a set of resources from the pools to the consumers?
A.Multi-tenanting
B.Virtualization
C.Orchestration
D.Abstraction
C.Orchestration
Explanation:
The key techniques to create a cloud are abstraction and orchestration. We abstract the resources from the underlying physical infrastructure to create our pools, and use orchestration (and automation) to coordinate carving out and delivering a set of resources from the pools to the consumers. As you will see, these two techniques create all the essential characteristics we use to define something as a “cloud.” Source: Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 Domain
Which of the following frameworks is used in the industry to describe a series of security activities during all phases of application development, deployment, and operations?
A.SOC 2 B.ITIL C.ISO27001 D.OWASP E.FIPS
D.OWASP
Explanation:
The SSDLC describes a series of security activities during all phases of application development, deployment, and operations. There are multiple frameworks used in the industry, including: • Microsoft’s Security Development Lifecycle • NIST 800-64 • ISO/IEC 27034 • Other organizations, including Open Web Application Security Project (OWASP) and a variety of application security vendors, also publish their own lifecycle and security activities guidance Source: Security Guidance for Critical Areas
Which of the following encrypts and prevents the unauthorized copying or changing of the content?
A.Public Key Cryptography B.Digital Certificates C.Digital Rights Management (DRM) D.Data Encryption E.Data Hashing
C.Digital Rights Management (DRM)
Explanation:
At its core, Digital Rights Management encrypts content, and then applies a series of rights. Rights can be as simple as preventing copying, or as complex as specifying group or user-based restrictions on activities like cutting and pasting, emailing, changing the content, etc. Any application or system that works with DRM protected data must be able to interpret and implement the rights, which typically also means integrating with the key management system. Source: Security Guidance for Critica
Private Cloud operated solely for a single organization can be located at-
A.Trusted Third Party
B.Both On-premise and Off-premise
C.Only Off-premise
D.Only On-premise
B.Both On-premise and Off-premise
Explanation:
The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or by a third party and may be located on-premises or off-premises Source: Security Guidance for Critical Areas of Focus in Cloud Computing Topic: Deployment Models Domain 1 // CLOUD COMPUTING CONCEPTS AND ARCHITECTURES
Which of the following ensures that the consumers only use what they are allotted, and are charged for it?
A.Metered Service B.Measured Service C.On-demand Service D.Broad Network Access E.Rapid Elasticity
B.Measured Service
Explanation:
Measured service meters what is provided, to ensure that consumers only use what they are allotted, and, if necessary, to charge them for it. This is where the term utility computing comes from, since computing resources can now be consumed like water and electricity, with the client only paying for what they use. Source: Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 Topic: Essential Characteristics Domain 1 // CLOUD COMPUTING CONCEPTS AND ARCHITECTURE
Which of the following includes all the documentation on a provider’s internal and external compliance assessments?
A.Cloud Security Alliance STAR Registry B.Audit Report C.Compliance Reporting D.Supplier (cloud provider) assessment E.Contract
C.Compliance Reporting
Explanation:
Compliance reporting: Compliance reporting includes all the documentation on a provider’s internal (i.e. self) and external compliance assessments. They are the reports from audits of controls, which an organization can perform themselves, a customer can perform on a provider (although this usually isn’t an option in cloud), or have performed by a trusted third party. Third-party audits and assessments are preferred since they provide independent validation (assuming you trust the third party).
As per GDPR company must report the breach in what amount of time?
A.There is no restriction on the reporting of data breach
B.Within 72 hours of the company becoming aware of the breach
C.Within 24 hours of the company becoming aware of the breach
D.You can report the breach any time after the breach is identified
E.As soon as the breach is identified
B.Within 72 hours of the company becoming aware of the breach
Explanation:
Breaches of Security: The GDPR requires companies to report that they have suffered a breach of security. The reporting requirements are risk-based, and there are different requirements for reporting the breach to the Supervisory Authority and to the affected data subjects. Breaches must be reported within 72 hours of the company becoming aware of the incident. Source: Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 Topic: General Data Protection Regulation (GDPR) Domain 3
Which document type is stored in the STAR registry for Level 1 entries?
A.CCM
B.CAIQ
C.Vendor Statements of Compliance
D.Government-issued authority to operate letter
B.CAIQ
Explanation
Providers will upload copies of filled-out CAIQ responses. Although ISO and/or SOC can be used as part of a Level 2 STAR entry, Level 1 entries use the CAIQ, not the CCM.
What must be first understood when considering governance of a private cloud?
A.Who owns and manages the private cloud
B.The automation and orchestration software used
C.The credentials of the people managing the private cloud
D.Contract clauses in place with the private cloud vendor
A.Who owns and manages the private cloud
Explanation:
The first item that must be understood when you’re dealing with a private cloud is who owns and manages the cloud infrastructure. If the infrastructure is internally owned and managed, little changes. If it’s outsourced, governance changes to reflect the fact that the supplier is in control.
What does “authentication” mean in a trial?
A.Evidence is considered genuine
B.This is the stage at which a judge is assigned and known to both parties
C.A witness is approved as an expert and their testimony will be considered
D.Both parties involved in a lawsuit are declared
A.Evidence is considered genuine
Explanation:
“Authentication” means that the data evidence is considered genuine and is therefore admissible in a court of law.
Which organization deals with privacy rights at a federal level in the United States?
A.Federal Communications Commission (FCC)
B.Federal Trade Commission (FTC)
C.Federal Office of the Attorney General
D.Homeland Security
B.Federal Trade Commission (FTC)
Explanation
The FTC is the federal organization responsible for consumer protection and privacy rights. The state attorney general performs the same activity at the state level.
If a cloud service provider receives a request to provide client information in the form of a subpoena or a court order, how can client have the ability to fight the request?
A.The cloud service provider can work with the third party and negotiate the terms of data disclosure without information the client
B.The cloud service provider can ignore the request and let the client handle the court order
C.There is no option; cloud service provider will have to provide the requested data to the third party
D.The cloud service agreement can have a clause to notify the customer and give time to fight the request for access
D.The cloud service agreement can have a clause to notify the customer and give time to fight the request for access
Explanation
Should a cloud service provider receive, from a third party, a request to provide information; this may be in the form of a subpoena, a warrant, or a court order in which access to the client data is demanded. The client may want to have the ability to fight the request for access in order to protect the confidentiality of their data. To this end, the cloud service agreement should require the cloud service provider to notify the customer that a subpoena was received and give the company time to
Which of the following comes immediately after the data creation in the data security lifecycle?
A.Provide B.Use C.Share D.Store E.Save
D.Store
Explanation
The lifecycle includes six phases from creation to destruction. Although it is shown as a linear progression, once created, data can bounce between phases without restriction, and may not pass through all stages (for example, not all data is eventually destroyed). Create- Creation is the generation of new digital content, or the alteration/ updating/modifying of existing content. Store- Storing is the act committing the digital data to some sort of storage repository and typically occurs nearly
Which of the following statement related to direct “lift and shift” of existing application to a cloud environment is CORRECT?
A. Direct “lift and shift” of existing applications to cloud without architectural change is not possible
B.Direct “lift and shift” of existing applications to cloud with or without architectural changes will take the same advantage of potential improvements from leveraging platforms
C.Direct “lift and shift” of existing applications to cloud without architectural changes are less likely to account for failures and will not take advantage of potential improvements from leveraging platforms
D.Direct “lift and shift” of existing applications to cloud without architectural changes are more likely to account for failures and will take advantage of potential improvements from leveraging platforms
C.Direct “lift and shift” of existing applications to cloud without architectural changes are less likely to account for failures and will not take advantage of potential improvements from leveraging platforms
Explanation
It is typically best to re-architect deployments when you migrate them to the cloud. Resiliency itself, and the fundamental mechanisms for ensuring resiliency, change. Direct “lift and shift” migrations are less likely to account for failures, nor will they take advantage of potential improvements from leveraging platform or service specific capabilities. Instead of lifting and shifting existing information architectures take the opportunity of the migration to the cloud to re-think and re-struc
Which of the following are the most commonly seen networks that are isolated onto dedicated hardware since there is no functional or traffic overlap?
A.Server, network, storage
B.Server, Application, Storage
C.Management, server, application
D.Management, service, storage
D.Management, service, storage
Explanation
If you are a cloud provider (including managing a private cloud), physical segregation of networks composing your cloud is important for both operational and security reasons. We most commonly see at least three different networks which are isolated onto dedicated hardware since there is no functional or traffic overlap: • The service network for communications between virtual machines and the Internet. This builds the network resource pool for the cloud users. • The storage network to connect v
CSA’s Software Defined Perimeter includes:
A.SDP client, SDP Controller, SDP Gateway
B.SDP Client, SDP Handler, SDP Gateway
C.SDP Node, SDP Handler, SDP Gateway
D.SDP Node, SDP COntroller, SDP Gateway
A.SDP client, SDP Controller, SDP Gateway
Explanation
The CSA Software Defined Perimeter Working Group has developed a model and specification that combines device and user authentication to dynamically provision network access to resources and enhance security. SDP includes three components: • An SDP client on the connecting asset (e.g. a laptop). • The SDP controller for authenticating and authorizing SDP clients and configuring the connections to SDP gateways. • The SDP gateway for terminating SDP client network traffic and enforcing policies in`
The most fundamental security control for any multitenant network is-policies?
A.Secure image creation process
B.Logging and monitoring controls
C.Segregation and Isolation network traffic
D.Hypervisor security
C.Segregation and Isolation network traffic
Explanation
The cloud provider is primarily responsible for building a secure network infrastructure and configuring it properly. The absolute top security priority is segregation and isolation of network traffic to prevent tenants from viewing another’s traffic. This is the most foundational security control for any multitenant network. Source: Security Guidance for Critical Areas of Focus in Cloud Computing Topic: Cloud Provider Responsibilities Domain 8 // VIRTUALIZATION AND CONTAINERS
Which of the following is the most important aspects of incident response for cloud-based resources?
A.Expectations around what the customer does versus what the provider does and Service Level Agreements
B.Service Level Agreements and Non Disclosure Agreement
C.Non Disclosure Agreement
D. Service Level Agreements
E.Expectations around what the customer does versus what the provider does
A.Expectations around what the customer does versus what the provider does and Service Level Agreements
Explanation
SLAs and setting expectations around what the customer does versus what the provider does are the most important aspects of incident response for cloud-based resources. Clear communication of roles/responsibilities and practicing the response and hand-offs are critical. Source: Security Guidance for Critical Areas of Focus in Cloud Computing Topic: Recommendations Domain 8// INCIDENT RESPONSE
Which of the following is the key difference between cloud and traditional computing?
A.Applistructure
B.Infostructure
C.Metastructure
D.Infrastructure
C.Metastructure
Explanation
The key difference between cloud and traditional computing is the metastructure. The key difference between cloud and traditional computing is the metastructure. Cloud metastructure includes the management plane components, which are network-enabled and remotely accessible. At a high level, both cloud and traditional computing adhere to a logical model that helps identify different layers based on functionality. This is useful to illustrate the differences between the different computing models
The data security lifecycle includes six phases from creation to destruction, which of the following are these stages and in the correct order?
A.Create, Process, Store, Archive, Share, Destroy
B.Create, Processm Store, Share, Archive, Destroy
C.Create, Use, Store, Archive, Share, Destroy
D.Create, Store, Use, Share, Archive, Destroy
E.Create, Use, Store, Share, Archive, Destroy
D.Create, Store, Use, Share, Archive, Destroy
Explanation
The life cycle includes six phases from creation to destruction. Although it is shown as a linear progression, once created, data can bounce between phases without restriction, and may not pass through all stages (for example, not all data is eventually destroyed). Create - Creation is the generation of new digital content, or the alteration/updating/modifying of existing content. Store - Storing is the act committing the digital data to some sort of storage repository and typically occurs nearl
What are the three main aspects of business continuity and disaster recovery in the cloud?
A.Ensuring continuity and recovery within a given cloud provider, Preparing for and managing cloud provider services, COnsidering options for availability, in case you need to migrate providers or platforms
B.Ensuring continuity and recovery within a given cloud provider, Preparing and managing cloud provider services, COnsidering options for portability, in case you need to migrate providers or platforms
C.Ensuring continuity and recovery within a given cloud provider, Preparing for and managing cloud provider services, Considering options for scalability, in case you need to expand your services
D.Ensuring continuity and recovery within a given cloud provider, Preparing for and managing cloud provider outages, Considering options for portability, in case you need to migrate providers or platforms
D.Ensuring continuity and recovery within a given cloud provider, Preparing for and managing cloud provider outages, Considering options for portability, in case you need to migrate providers or platforms
Explanation
Business Continuity and Disaster Recovery (BC/DR) is just as important in cloud computing as it is for any other technology. Aside from the differences resulting from the potential involvement of a third-party provider (something we often deal with in BC/DR), there are additional considerations due to the inherent differences when using shared resources. The three main aspects of BC/DR in the cloud are: • Ensuring continuity and recovery within a given cloud provider.