Certified Cloud Security Professional Study Guide Chapter 1 Review Questions (Ben Masilow) Flashcards
Which of the following is not a common cloud service model?
A. Software as a Service (SaaS)
B. Programming as a Service (PaaS)
C. Infrastructure as a Service (IaaS)
D. Platform as a Service (PaaS)
B. PaaS
Explanation:
Programming as a Service is not a common offering; the others are ubiquitous throughout the industry
All of these technologies have made cloud service viable except ________
A. Virtualization
B. Widely available broadband
C. Encrypted connectivity
D. Smart hubs
D. Smart hubs
Explanation:
Virtualization allows scalable resource allocation; broadband connections allow users to have remote access from anywhere; encrypted connections allow for secure remote access. Smart hubs arent widely used in cloud offerings
Cloud vendors are held to contractual obligations with specified metrics by __________
A. Service-level Agreements (SLAs)
B. Regulations
C. Law
D. Discipline
A. Service-level Agreements (SLAs)
Explanation:
An SLA specify objective measures that define what the cloud provider will deliver to the customer
_________ drive(s) security decisions.
A. Customer service responses
B. Surveys
C. Business Requirements
D. Public Opinion
C. Business Requirements
Explanation:
Security is usually not a profit center and is therefore beholden to business drivers; the purpose of security is to support business
If a cloud customer cannot get access to the cloud provider, this affects what portion of the CIA triad?
A. Integrity
B. Authentication
C. Confidentiality
D. Availability
D. Availability
Explanation:
Lack of access in an availability issue
Cloud access security brokers (CASBs) might offer all the following services except ________
A. Single Sign On
B. Business Continuity/Disaster Recovery/ Continuity of Operations (BC/DR/COOP)
C. Identity and Access Management (IAM)
D. Key Escrow
B. Business Continuity/Disaster Recovery/ Continuity of Operations (BC/DR/COOP)
Explanation:
CASBs usually don’t offer BC/DR/COOP services; that’s something offered by cloud providers
Encryption can be used in various aspects of cloud computing, including all of these except ______
A. Storage
B. Remote Access
C. Secure Sessions
D. Magnetic Swipe Cards
D. Magnetic Swipe Cards
Explanation:
The data on magnetic swipe cards isnt usually encrypted
All of these are reasons an organization may want to consider cloud migration except _______
A. Reduced personnel costs
B. Elimination of Risks
C. Reduced Operational Expenses
D. Increased Efficiency
B. Elimination of Risks
Explanation:
Risks, in general, can be reduced but never eliminated; cloud service, specifically, does not eliminate risk to the cloud customer because the customer retains a great deal of risk after migration
The generally accepted definition of cloud computing includes all of the following characteristics except _____________
A. On-demand self-service
B. Negating the need for backups
C. Resource Pooling
D. Measured or Metered Service
B. Negating the need for backups
Explanation:
Backups are still just as important as ever, regardless of where your primary data and backups are stored
A gamer is part of the PlayStation Network community cloud.
Who owns the Playstation console in the gamers home?
A. Sony
B. The community as a whole
C. The company that made the game that the gamer is playing at the time
D. The gamer
D. The gamer
Explanation:
The gamer owns the console in their home.
The gamer can turn it on and off at their discretion, sell it, or smash it with a hammer.
The various members of a community cloud can all share the udnerlying resources of the community cloud as they choose.
In thise case, Sony, the game maker, the gamer, and the other players are all members of the community, and all share different underlying componets as they choose
The risk that a cloud provider might go out of business and the cloud customer might not be able to recover data is known as ______
A. Vendor Closure
B. Vendor Lock-Out
C. Vendor Lock-in
D. Vending Route
B. Vendor Lock-Out
Explanation:
This is the definition of vendor lock-out
All of these are features of cloud computing except ______
A. Broad Network Access
B. Reversed Charging Configuration
C. Rapid Scaling
D. On-Demand Self-Service
B. Reversed Charging Configuration
Explanation:
This is a nonsense term used as a red herring
When a cloud customer uploads personally identifiable information (PII) to a cloud provider, who is ultimately responsible for the security of that PII?
A. Cloud provider
B. Regulators
C. Cloud customer
D. The individuals who are the subjects of the PII
C. Cloud customer
Explanation:
Under current laws in most jurisdictions, the data owner is responsible for any breaches that result in unauthorized disclosure of PII; this includes breaches caused by contracted parties and outsources services. The data owner is the cloud customer
We use which of the following to determine the critical paths, processes and assets of an organization?
A. Business Requirements
B. Business Impact Analysis (BIA)
C. Risk Management Framework (RMF)
D. Confidentiality, Integrity, Availability (CIA) triad
B. Business Impact Analysis (BIA)
Explanation:
The business impact analysis is designed to ascertain the value of the organizations assets and learn the critical paths and processes
If an organization owns all of the hardware and infrastructure of a cloud data center that is used only by members of that organizations, which cloud model would this be?
A. Private
B. Public
C. Hybrid
D. Motive
A. Private
Explanation:
Because ownership and usage is restricted to only the one organization, this is private cloud