CCSP Domain 3: Network and System Security in Cloud Flashcards

1
Q

What cloud datacenter functions have to be performed on isolated networks?

A
  1. storage controller access
  2. management system control interface
  3. customer access provision
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of a network security group in cloud?

A

control and govern network traffic to and from virtual machines (VMs), network interfaces, and subnets within a virtual network (VNet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the traffic filtering enforced in network security groups?

A

by NSGs acting as a virtual firewall, which allows to enforce inbound/outbound traffic rules based on specific criteria - source and destination IP addresses, source and destination ports, and protocol types (e.g., TCP, UDP, ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can NSGs aid logging and auditing?

A

by monitoring traffic that matches defined rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to capture packets within customer tenant?

A

with specilized CSP tools like Network Watcher (Azure) or VPC Traffic Mirroring (AWS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Geofencing use to define geographical boundaries?

A

GPS or RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is Geofencing used?

A
  1. restrict access to systems and services based on where the access attempt is being generated from
  2. prevent devices from being removed from the company’s premises
  3. identify unusual traffic and prevent misuse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Virtual Private Cloud (VPC)?

A

allows users to create isolated and logically segmented private networks within a public cloud environment; enable organizations to have control over network configuration, IP address allocation, routing, and security settings while leveraging the benefits of cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What CSPs use the Virtual Private Cloud (VPC) terminology?

A

AWS, GCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is Virtual Private Cloud (VPC) called in Azure?

A

vnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can virtual networks be connected to other networks?

A
  1. VPN (transit) gateway - S2S connectivity
  2. network peering - used in private networks within cloud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to think of a VPC?

A

as a logically separated piece of a cloud; like a private data center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPC is the foundation for what resources?

A

compute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do VPCs belong to?

A

a region; span across all availability zones within the region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can a VPC contain?

A
  • Internet Gateway (IGW) or Virtual Private Gateway (VGW)
  • Route Tables
  • Network ACLs (NACLs):
  • Security Groups or Network Security Groups (NSGs)
  • Peering Connections
  • VPN Connections or Direct Connect
  • Elastic IP Addresses (EIPs)
  • DNS Resolution and Hostnames
  • Flow Logs and Monitoring
  • VPC Endpoints (Service Endpoints)
  • NAT Gateway or NAT Instance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A subnet in a VPC is tight to how many availability zones?

A

a single one

17
Q

How are external IP addresses assigned?

A
  • upon a compute resource creation, it needs to be specified, whether public IP is required - these IPs are assigned by CSP
  • these IPs change when the instance is stopped and started again; IP that sticks can be assigned through Elastic IP (AWS)
18
Q

What is a screened subnet?

A

subnet that is placed between two routers or firewalls; bastion hosts are located within that subnet

19
Q

What is message authentication code (MAC) used for?

A

to verify non-repudiation by using a session key; electronic financial transfers requently use MACs to preserve data integrity

20
Q

What is hash-based message authentication code (HMAC)?

A

special type of MAC with a cryptographic hash function AND a secret crypto key

21
Q

What does HMAC simultaneously verify?

A

data integrity and message authenticity

22
Q

What’s the Azure’s and AWS’s name for bastion?

A
  • Azure - Azure Bastion
  • AWS - AWS Transit Gateway
23
Q

When hardening a system, what should be done with the registry?

A

access should be restricted, and updates controlled through policy, where possible; backup should be created before changes are made

24
Q

What tool is used for disk encryption in Linux?

A

dm-crypt