Certified Cloud Security Professional Study Guide Chapter 3 Review Questions (Ben Masilow) Flashcards
All of these are methods of data discovery, except:
A. Content-based
B. User-based
C. Label-based
D. Metadata-based
B. User-based
Explanation:
All the others are valid methods of data discovery; user-based is a red herring with no meaning
Data labels could include all the following, except:
A. Date data was created
B. Data Owner
C. Data Value
D. Date of scheduled destruction
C. Data Value
Explanation:
All the others might be included in data labels, but we do not usually include data value since it is prone to change frequently and because it might not be information we want to disclose to anyone who does not have need to know
Data labels could include all the following except:
A. Source
B. Delivery Vendor
C. Handling Restrictions
D. Jurisdiction
B. Delivery Vendor
Explanation:
All the others might be included in data labels, but we do not include delivery vendor, which is nonsense in this context
Data labels could include all the following, except:
A. Confidentiality level
B. Distribution limitations
C. Access Restrictions
D. MFA
D. MFA
Explanation:
All the others might be included in data labels, but multifactor authentication is a procedure used for access control, not a label
All of the following are data analytic modes except:
A. Real-time analytics
B. Datamining
C. Agile Business Intelligence
D. Refractory iterations
D. Refractory iterations
Explanation:
All the others are data analytics methods, but refractory iterations is a nonsense term thrown in as a distractor
In the cloud, the data owner is usually:
A. In another jurisdiction
B. The cloud customer
C. The cloud provider
D. The cloud access security broker
B. The cloud customer
Explanation:
The data owner is usually considered the cloud customer in a cloud configuration; the data in question is the customers information, being processed in the cloud.
The cloud provider is only leasing services and hardware to the customer.
The cloud access security broker (CASB) only handles access control on behalf of the cloud customer and is not in direct contact with the production data
In the cloud, the data processor is usually:
A. The party that assigns access rights
B. The cloud customer
C. The cloud provider
D. The cloud access security broker
C. The cloud provider
Explanation:
In legal terms, when data processor is defined, it refers to anyone who stores, handles, moves or manipulates data on behalf of the data owner or controller.
In the cloud computing realm, this is the cloud provider
Which of the following is not an acceptable means of sanitizing hardware?
A. Burning
B. Deletion
C. Industrial Shredding
D. Drilling
B. Deletion
Explanation:
Hardware cannot be sanitized by deleting data.
Deleting, as an operation, does not erase the data; it simply removes the logical pointers to the data for processing purposes.
Burning, deletion and drilling can all be used to sufficiently destroy the hardware to the point where data becomes irrecoverable
All policies within the organization should include a section that includes all the following, except:
A. Policy maintenance
B. Policy monitoring
C. Policy enforcement
D. Policy transference
D. Policy transference
Explanation:
All the elements except transference need to be addressed in each policy.
Transference is not an element of policy
The most pragmatic option for data disposal in the cloud is which of the following?
A. Melting
B. Crypto-shredding
C. Cold-fusion
D. Overwriting
B. Crypto-shredding
Explanation:
We do not have physical ownership, control, or even access to the hardware devices holding the data, so physical destruction, including melting, is not an option.
Overwriting is a possibility, but it is complicated by the difficulty of locating all the sectors and storage areas that might have contained our data and by the likelihood that constant backups in the cloud increase the chance we will miss something as it’s being overwritten.
Crypto-shredding is the only reasonable alternative.
Cold fusion is a distractor
What is the intellectual property protection for the tangible expression of a creative idea?
A. Copyright
B. Patent
C. Trademark
D. Trade Secret
A. Copyright
Copyrights are protected tangible expressions of creative works.
The other options listed are answers to subsequent questions
What is the intellectual property protection for a useful manufacturing innovation?
A. Copyright
B. Patent
C. Trademark
D. Trade Secret
B. Patent
Explanation:
Patents protect processes (as well as inventions, new plant life, and decorative patterns)
The other options listed are answer to other questions
What is the intellectual property protection for a very valuable set of sales leads?
A. Copyright
B. Patent
C. Trademark
D. Trade Secret
D. Trade Secret
Explanation:
Confidential sales and marketing materials unique to the organization are trade secrets.
The other options listed are answers to other questions
What is the intellectual property protection for a confidential recipe for muffins?
A. Copyright
B. Patent
C. Trademark
D. Trade Secrets
D. Trade Secrets
Explanation:
Confidential recipes unique to the organization are trade secrets.
The other options listed are answers to the other questions
What is the intellectual property protection for the logo of a new video game?
A. Copyright
B. Patent
C. Trademark
D. Trade Secret
C. Trademark
Explanation:
Logos, symbols, phrases, and color schemes that describe brands and trademarks.
The other options listed are answers to other questions