CCSP study FA Flashcards
What type of solutions enable enterprises or individuals to store data and computer files on the Internet using a storage service provider rather than keeping the data locally on a physical disk such as a hard drive or tape backup? A.Online backups B.Cloud backup solutions C.Removable hard drives D.Masking
B.Cloud backup solutions enable enterprises to store their data and computer files on the Internet using a storage service rather than storing data locally on a hard disk or tape backup.This has the added benefit of providing access to data should the primary business location be damaged in some way that prevents accessing or restoring data locally due to damaged infrastructure or equipment.Online backups and removable hard drives are other options but do not by default supply the customer with ubiquitous access.Masking is a technology used to partially conceal sensitive data.
What focuses on security and encryption to prevent unauthorized copying and limitations on distribution to only those who pay. A.Information rights management (IRM) B.Masking C.Bit splitting D.Degaussing
A.In an IaaS model, the customer must still maintain licenses for operating systems (OSs) and applications used in the cloud environment.In PaaS models, the licensing for OSs is managed by the cloud provider, but the customer is still responsible for application licenses; in SaaS models, the customer does not need to manage a license library.
What focuses on security and encryption to prevent unauthorized copying and limitations on distribution to only those who pay. A.Information rights management (IRM) B.Masking C.Bit splitting D.Degaussing
A.Information rights management (IRM) (often also referred to as digital rights management, or DRM) is designed to focus on security and encryption as a means of preventing unauthorized copying and limiting distribution of content to only authorized personnel (usually, the purchasers). Masking entails hiding specific fields or data in particular user views in order to limit data exposure in the production environment.Bit splitting is a method of hiding information across multiple geographical boundaries, and degaussing is a method of deleting data permanently from magnetic media.
Which of the following represents the correct set of four cloud deployment models?
A.Public, private, joint, and community
B.Public, private, hybrid, and community
C.Public, Internet, hybrid, and community
D.External, private, hybrid, and community
B.The only correct answer for this is public, private, hybrid, and community.Joint, Internet, and external are not cloud models.
What is a special mathematical code that allows encryption hardware/software to encrypt and then decipher a message? A.PKI B.Key C.Public-private D.Masking
B.An encryption key is just that: a key used to encrypt and decrypt information.It is mathematical code that supports either hardware- or software-based encryption, is used to encrypt or decrypt information, and is kept confidential by the parties involved in the communication.PKI is an arrangement for creating and distributing digital certificates.Public-private is the description of the key pairs used in asymmetric encryption (this answer is too specific for the question; option B is preferable). Masking entails hiding specific fields or data in particular user views in order to limit data exposure in the production environment.
Which of the following lists the correct six components of the STRIDE threat model?
A.Spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege
B.Spoofing, tampering, refutation, information disclosure, denial of service, and social engineering elasticity
C.Spoofing, tampering, repudiation, information disclosure, distributed denial of service, and elevation of privilege
D.Spoofing, tampering, non-repudiation, information disclosure, denial of service, and elevation of privilege
A.The letters in the acronym STRIDE represent spoofing of identity, tampering with data, repudiation, information disclosure, denial of service, and elevation (or escalation) of privilege.The other options are simply mixed up or incorrect versions of the same.
What is the term that describes the assurance that a specific author actually created and sent a specific item to a specific recipient, and that the message was successfully received? A.PKI B.DLP C.Nonrepudiation D.Bit splitting
C.Non-repudiation means that a party to a transaction cannot deny they took part in that transaction.
What is the correct term for the process of deliberately destroying the encryption keys used to encrypt data? A.Poor key management B.PKI C.Obfuscation D.Crypto-shredding
D.The act of crypto-shredding means destroying the key that was used to encrypt the data, thereby making the data very difficult to recover.
In a federated environment, who is the relying party, and what do they do?
A.The relying party is the service provider, and they consume the tokens generated by the identity provider.
B.The relying party is the service provider, and they consume the tokens generated by the customer.
C.The relying party is the customer, and they consume the tokens generated by the identity provider.
D.The relying party is the identity provider, and they consume the tokens generated by the service provider.
A.The identity provider maintains the identities and generates tokens for known users.The relying party (RP) is the service provider, which consumes tokens.All other answers are incorrect.
What is the process of replacing sensitive data with unique identification symbols/ addresses? A.Randomization B.Elasticity C.Obfuscation D.Tokenization
D.Replacing sensitive data with unique identification symbols is known as tokenization, a way of hiding or concealing sensitive data by representing it with unique identification symbols/addresses.While randomization and obfuscation are also means of concealing information, they are done quite differently.
Which of the following data storage types are associated or used with platform as a service (PaaS)? A.Databases and big data B.SaaS application C.Tabular D.Raw and block
A.PaaS uses databases and big data storage types.
What is the term used for software technology that abstracts application software from the underlying operating system on which it is executed? A.Partition B.Application virtualization C.Distributed D.SaaS
B.Application virtualization abstracts application software from the underlying operating system on which it is executed.SaaS is a cloud service model.A partition is an area of memory, usually on a drive.Distributed is a modifier usually suggesting multiple machines used for a common purpose.
Which of the following represents the US legislation enacted to protect shareholders and the public from enterprise accounting errors and fraudulent practices? A.PCI B.Gramm-Leach-Bliley Act (GLBA) C.Sarbanes–Oxley Act (SOX) D.HIPAA
C.The Sarbanes–Oxley Act (SOX) was enacted in response to corporate scandals in the late 1990s/early 2000s. SOX not only forces executives to oversee all accounting practices, it also holds them accountable for fraudulent/deceptive activity. HIPAA is a US law for medical information.PCI is an industry standard for credit/debit cards. GLBA is a US law for the banking and insurance industries.
Which of the following is a device that can safely store and manage encryption keys and is used in servers, data transmission, and log files? A.Private key B.Hardware security module (HSM) C.Public key D.Trusted operating system module (TOS)
B.A hardware security module (HSM) is a device that can safely store and manage encryption keys.These can be used in servers, workstations, and so on.One common type is called the Trusted Platform Module (TPM) and can be found on enterprise workstations and laptops.There is no such term as a trusted operating system module, and public and private keys are used with asymmetric encryption.
What is a type of cloud infrastructure that is provisioned for open use by the general public and is owned, managed, and operated by a cloud provider? A.Private cloud B.Public cloud C.Hybrid cloud D.Personal cloud
B.This is the very definition of public cloud computing.