CCSK Practice Exam 3 (WhizLabs) Flashcards
Virtualization security in cloud computing is the responsibility of cloud provider
A. True
B. False
B. False
Explanation:
Virtualization security in cloud computing follows the shared responsibility model
The cloud provider will always be responsible for securing the physical infrastructure and the virtualization platform itself.
Meanwhile, the cloud customer is responsible for properly implementing the available virtualized security controls and understanding the underlying risks, based on what is implemented and managed by the cloud provider.
For example, deciding when to encrypt virtualized storage, properly configuring the virtual network and firewalls, or deciding when to use dedicated hosting vs a shared host
Which of the following statements regarding SDN (Software Defined Networking) is not true?
A. Segregates and isolates the traffic properly
B. Supports orchestration and agility
C. Does not overlay the overlapping addresses
D. Is defined using software settings and API calls
E. Abstracts the network management plane from physical infrastructure
C. Does not overlay the overlapping addresses
Explanation:
You can overlay multiple virtual networks using SDN, even the ones that completely overlap their address ranges.
SDN abstracts the network management plane from the underlying physical infrastructure, removing many typical networking constraints.
For example, you can overlay multiple virtual networks, even ones that completely overlap their address ranges, over the same physical hardware, with all traffic properly segregated and isolated.
SDNs are also defined using software settings and API calls, which supports orchestration and agility
Containers provide full security isolation and task segregation
A. True
B. False
B. False
Explanation:
Containers dont necessarily provide full security isolation, but they do provider task segregation
That said, virtual machines typically do provide security isolation.
Thus, you can put tasks of equivalent security context on the same set of physical or virtual hosts in order to provide greater security segregation
Which of the following essential characteristics of a cloud allows customers to closely match resource consumption with demand?
A. Resource Pooling B. On-demand Self-Service C. Broad Network Access D. Rapid Elasticity E. Measured Service
D. Rapid Elasticity
Explanation:
Rapid elasticity allows consumers to expand or contract the resources they use from the pool (provisioning and deprovisioning), often completely automatically.
This allows them to more closely match resource consumption with demand (for example, adding virtual servers as demand increases, then shutting them down when demand drops)
Which of the following statements regarding cloud platform architecture is true?
A. Single cloud assets are typically less resilient than the traditional infrastructure
B. Single cloud assets are typically more resilient than the traditional infrastructure
C. Single cloud assets are equally resilient as traditional infrastructure
D. Single cloud assets and traditional infrastructure should be combined together to provide a more resilient infrastructure
A. Single cloud assets are typically less resilient than the traditional infrastructure
Explanation:
Cloud platforms can be incredibly resilient, but single cloud assets are typically less resilient than in the case of traditional infrastructure.
This is due to the inherently greater fragility of virtualized resources running in highly-complex environments.
This mostly applies to compute, networking and storage, since those allow closer to raw access, and cloud providers can leverage additional resiliency techniques for their platforms and applications that run on top of IaaS
Infrastructure in the cloud cannot be defined and implemented through templates and automation
A. True
B. False
B. False
Explanation:
Infrastructure is more often in scope for application testing due to infrastructure as code, where the infrastructure itself is defined and implemented through templates and automation
Security testing should be integrated into the deployment process and pieline.
Testing tends to span this and the Secure Deployment phase, but leans towards security unit tests, security functional tests.
Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST).
Due to the overlap, we cover the cloud infrastructure is more often in scope for application testing due to infrastructure as code, where the infrastructure itself is defined and implemented through templates and automation
CI/CD pipelines can enhance security through support of which of the following?
A. Restricted logging on application
B. Restricted logging on Infrastructure
C. Manual Security Testing
D. Immutable Infrastructure
D. Immutable Infrastructure
Explanation:
CI/CD pipelines can enhance security through support of immutable infrastructure (fewer manual changes to production environments), automating security testing, and extensive logging of application and infrastructure changes when those changes run through the pipeline.
When configured properly, logs can track every code, infrastructure, and configuration change and tie them back to whoever submitted the change and whoeever approved it; they will also include any testing results
You do not trust your SaaS provider and have chosen to encrypt all of your data. Which of the following is true is this situation?
A. You have ensured the security of your data by encrypting it
B. Encrypting everything may lead to false sense of security
C. You do not have to ensure the security of the device if you have encrypted the data
D. You can continue with the provider as encrypting all the data will take care of trust issues
B. Encrypting everything may lead to false sense of security
Explanation:
Encrypting everything in SaaS because you do not trust that provider at all likely means that you shouldnt be using the provider in the first place.
But encrypting everything is not a cure-all and may lead to a false sense of security, ie encrypting data traffic without ensuring the security of the devices themselves.
Which of the following regarding customer managed keys is true?
A. Cloud customer manages the encryption key and the provider manages the encryption engine
B. Provider manages the encryption key and cloud customer manages the encryption engine
C. Cloud customer manages both the encryption key and the encryption engine
D. Cloud customer and provider jointly manage the encryption key and encryption engine
E. Cloud customer and provider jointly manage the encryption engine and cloud customer manages their own encryption key
A. Cloud customer manages the encryption key and the provider manages the encryption engine
Explanation:
A customer managed key allows a cloud customer to manage their own encryption key while the provider manages the encryption engine.
For example, using your own key to encrypt SaaS data witihin the SaaS platform.
Many providers encrypt data by default, using keys completely in their control.
Some may allow you to substitute your own key, which integrates with their encryption system.
Make sure your vendors practices align with your requirements.
Which of the following is the most obvious form of provider lock-in?
A. Data Lock-In
B. Application Lock-In
C. Infrastructure Lock-In
D. Meta-Data Lock-In
B. Application Lock-In
Explanation:
Application lock-in is the most obvious form of lock in (although it is not specific to cloud services)
SaaS providers typically develop a custom application tailored to the needs of their target market.
SaaS customers with a large user-base can incur very high switching costs when migrating to another SaaS provider as the end-user experience is impact (ie re-training is necessary)
Where the customer has developed programs to interact with the providers API directly (ie for integration with other applications), these will also need to be re-written to take into account the new providers API
“Cloud Provider Acquisition” is which form of risk?
A. Legal Risk
B. Technical Risk
C. Policy and Organizational Risk
D. Compliance Risk
C. Policy and Organizational Risk
Explanation:
Policy and Organization risks cover the following:
- LOCK IN
- LOSS OF GOVERNANCE
- COMPLIANCE CHALLENGES
- LOSS OF BUSINESS REPUTATION DUE TO CO-TENANT ACTIVITIES
- CLOUD SERVICE TERMINATIONS OF FAILURE
- CLOUD PROVIDER ACQUISITION
- SUPPLY CHAIN FAILURES
Inability to provide sufficient capacity to a customer can lead to which of the following?
A. Isolation Failure B. Abuse of High Privileged Roles C. Resource Exhaustion D. Denial of Service (DoS) E. Data Leakage
C. Resource Exhaustion
Explanation:
Resource Exhaustion (Under or Over Provisioning)
There is a level of calculated risk in allocation all the resources of a cloud service, because resources are allocated according to statistical projections.
Inaccurate modelling of resources usage - common resources allocation algorithms are vulnerable to distortions of fairness - or inadequate resource provisioning and inadequate investments in infrastructure can lead, from the CP perspective to:
Service unavailability: failure in certain highly specific application scenarios which use a particular resource very intensively (ie CPU/Memory intensive number crunching or simulation (ie forecasting stock prices)
Access Control Compromised: In some cases it may be possible to force a system to fail open in the event of resource exhaustion
Economic and reputational losses; due to failure to meet customer demand
The opposite consequences of inaccurate estimation of resource needs cloud lead to
Infrastructure oversize: Excessive provisioning leading to economic losses and loss of profitability
Which of the following defines the amount of risk that the leadership and stakeholders of an organization are willing to accept?
A. Risk Acceptance
B. Risk Tolerance
C. Residual Risk
D. Risk Target
B. Risk Tolerance
Explanation:
Risk tolerance is the amount of risk that the leadership and stakeholders of an organization are willing to accept.
It varies based on asset and you shouldnt make a blanket risk decision about a particular provider; rather, assessments should align with the value and requirements of the assets involved.
Just because a public cloud provider is external and a consumer might be concerned with shared infrastructure for some assets doesnt mean it isnt within risk tolerance for all assets.
Over time this means that, practically speaking, you will build out a matrix of cloud services along with which types of assets are allowed in those services.
Moving to the cloud doesnt change your risk tolerance, it just changes how risk is managed.
In addition to providing better server utilization, and data center consolidation, virtualization also reduces the security threats significantly
A. True
B. False
B. False
Explanation:
Virtualization brings with it all the security concerns of the operating system running as a guest, together with new security concerns about the hypervisor layer, as well as new virtualization specific threats, inter-VM attacks and blind spots, performance concerns arising from CPU and memory used for security, and operational complexity from “VM Sprawl” as a security inhibitor.
New problems like instant-on gaps, data co-mingling, the difficulty of encrypting virtual machine images, and residual data destruction are coming into focus
Installing traditional agents designed for physical servers will not result in the same amount of efficiency and performance on a virtualized server
A. True
B. False
A. True
Explanation:
“Traditional” agents may impede performance more heavily in cloud.
Lightweight agents with lower compute requirements allow better workload distribution and efficient use of resources.
Agents not designed for cloud computing may assume underlying compute capacity that isnt aligned with how the cloud deployment is designed.
The developers on a given project might assume they are running a fleet of lightweight, single purpose virtual machines.
A security agent not attuned to this environment could significantly increase processing overhead, requiring larger virtual machine types and increasing costs
Point-in-time activities like compliance, audit, and assurance should be conducted by cloud providers to avoid creating any gaps, and thus exposures, for their customers
A. True
B. False
B. False
Explanation:
Compliance, audit and assurance should be continuous.
They should not be seen as merely point in time activities, and many standards and regulations are moving more towards this model.
This is especially true in cloud computing, where both the provider and customer tend to be in more-constant flux and are rarely ever in a static state.
Which of the following characteristics of cloud allows a consumer to unilaterally provision computing capabilities such server time and network storage as needed?
A. Resource Pooling B. On-Demand Self-Service C. Broad Network Access D. Rapid Elasticity E. Measured Service
B. On-Demand Self-Service
Explanation:
On-Demand Self-Service
A consumer can unilaterally provision computing capabilities such as server time and network storage as needed automatically without requiring human interaction with a service provider
Which of the following providers “Storage as a Service” as a sub offering?
A. IaaS
B. PaaS
C. SaaS
D. SecaaS
A. IaaS
Explanation:
Narrowing the scope or specific capabilities and functionality within each of the cloud deliver models, or employing the functional coupling of services and capabilities across them, may yield derivative classifications.
For example Storage as a Service is a specific sub-offering within the IaaS family
In a multi-tenant environment, if customers can access and modify each others assets which of the following has caused this issue?
A. Segregation Failure B. Isolation Failure C. Breach of Trust D. Data Breach E. Information leakage
B. Isolation Failure
Explanation:
Clouds are multi tenant by nature.
Multiple different consumer constituencies share the same pool of resources but are segregated and isolated from each other.
Segregation allows the cloud provider to divvy up resources to the different groups, and isolation ensures they cant see or modify each others assets.
Multitenancy doesnt only apply across different organizations; its also used to divvy up resources between different unites in a single business or organization
Which of thew following encryption will be used when object storage is used as the back end for an application?
A. Object Encryption B. Client-Side Encryption C. Server-Side Encryption D. Proxy Encryption E. Data Encryption
B. Client-Side Encryption
Explanation:
Client Side encryption when a object storage is used as the back end for an application (including mobile applications), encrypt the data using an encryption engine embedded in the application or client
Resource pooling practiced by the cloud services may especially complicate which part of the IR process?
A. Detection B. Prevention C. Monitoring D. Recovery E. Forensics
E. Forensics
Explanation:
The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures, may dramatically complicate the IR process, especially the forensic activities carried out as part of the incident analysis.
Forensics has to be carried out in a highly dynamic environment, which challenges basic forensic necessitities such as establishing the scope of an incident, the collection and attribution of data, preserving the semantic integrity of that data, and maintaining the stability of evidence overall.
These problems are exacerbated when cloud customers may attempt to carry out forensic activities, since they operate in a non-transparent environment (which underscores the necessity of support by the cloud provider as mentioned above)
Customers should view cloud services and security as -
A. Service provider security issue B. Third party security issue C. Technology security issue D. Supply chain security issue E. Enterprise security strategy
D. Supply chain security issue
Explanation:
Customers should view cloud services and security as supply chain security issues.
This means examining and assessing the providers supply chain (service provider relationships and dependencies) to the extent possible
This also means examining the providers own third party management.
Assessment of third party service providers should specifically target the providers incident management, business continuity and disaster recovery policies, and processes and procedures’ and should include review of co-location and back-up facilities
The risks identified can be classified into which of the following three categories?
A. Technical, Commercial, Operational
B. Technical, Commercial, Legal
C. Technical, Operational, Legal
D. Technical, Operational, Policy and Organizational
E. Technical, Legal, Policy and Organizational
E. Technical, Legal, Policy and Organizational
Explanation: The risks identified in the assessment are classified into three categories: - Policy and Organizational - Technical - Legal
Lock-in us under which category of risk?
A. Technical
B. Legal
C. Policy and Organizational
D. Operational
C. Policy and Organizational
Explanation: