Certified Cloud Security Professional Study Guide Chapter 11 Review Questions (Ben Masilow) Flashcards
What is the lowest level of the CSA Star program?
A. Continuous Monitoring
B. Self-Assessment
C. Hybridization
D. Attestation
B. Self-Assessment
Explanation:
The lowest level is Level 1, which is self-assessment.
Level 2 is an external third-party attestation, and Level 3 is a continuous-monitoring program
Hybridization does not exist as part of the CSA STAR Program
Which of the following is a valid risk management metric?
A. CSA
B. KRI
C. SLA
D. SOC
B. KRI
Explanation:
KRI stands for key risk indicator
KRIs help the organization identify and recognize changes to risk
Which of the following frameworks focuses specifically on design implementation and oversight of risk management?
A. ISO 31000:2018
B. HIPAA
C. ISO 27017
D. NIST 800-92
A. ISO 31000:2018
Explanation:
ISO 31000:2018 specifically focuses on design implementation and management
HIPAA refers to health care regulations, NIST 800-92 is about log management, and ISO 27017 is about cloud-specific security controls
Which of the following identifies the top eight security risks based on likelihood and impact?
A. NIST 800-53
B. ISO 27000
C. ENISA
D. COBIT
C. ENISA
Explanation:
ENISA specifically identifies the top eight security risks based on likelihood and impact
The CSA STAR Program consist of three levels
Which of the following is not one of the CSA STAR levels?
A. Self-assessment
B. Third party assessment-based certification
C. SOC 2 Audit Certification
D. Continuous monitoring-based certification
C. SOC 2 Audit Certification
Explanation:
The SOC 2 report is not a part of the CSA Star program.
It is totally different audit reporting standard developed by the AICPA
Which ISO standard refers to addressing security risks in a supply chain?
A. ISO 27001
B. ISO/IEC 28000:2007
C. ISO 9000
D. ISO 31000:2018
B. ISO/IEC 28000:2007
Explanation:
ISO/IEC 28000:2007 specifically applies to security controls in supply chains.
The others address other matters
Which of the following is not a risk management framework?
A. NIST SP 800-37
B. ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security
C. Key Risk Indicators (KRI)
D. ISO 31000:2018
C. Key Risk Indicators (KRI)
Explanation:
Key risk indicators are useful, but they are not a framework
ISO 31000:2018 is an international standard that focuses on designing, implementing and reviewing risk management processes and practices.
NIST SP 800-37 is the Guide for Implementing the Risk Management Framework (RMF), a methodology for handling all organizational risk in a holistic, comprehensive and continual manner
The European Union Agency for Network and Information Security (ENISA) Cloud Computing: Benefits, Risks, and Recommendations for Information Security identifies the top eight cloud security risks
What is an impossible level of risk?
A. Condition Alpha
B. Maximum
C. Reduced
D. Zero
D. Zero
Explanation:
There is no such t hing as zero risk.
All the other answers are distractors
Which of the following is not a part of ENISA’s top eight security risks of cloud computing?
A. Vendor lock-in
B. Isolation failure
C. Insecure or incomplete data deletion
D. Availability
D. Availability
Explanation:
ENISA’s top eight security risks of cloud computing do not include availability, even though it is certainly a risk that could be realized
Which of the following is a risk management option that halts a business function?
A. Mitigation
B. Acceptance
C. Transference
D. Avoidance
D. Avoidance
Explanation:
Avoidance halts the business process, mitigation entails using controls to reduce risk, acceptance involves taking on the risk, and transference usually involves insurance
Which of the following best describes a cloud carrier?
A. A person or entity responsible for making a cloud service available to consumer
B. The intermediary who provides connectivity and transport of cloud services between cloud providers and cloud consumers
C. The person or entity responsible for keeping cloud services running for customers
D. The person or entity responsible for transporting data across the Internet
B. The intermediary who provides connectivity and transport of cloud services between cloud providers and cloud consumers
Explanation:
A cloud carrier is the intermediary who provides connectivity and transport of cloud services between cloud providers and cloud customers
Which of the following methods of addressing risk is most associated with insurance?
A. Transference
B. Avoidance
C. Acceptance
D. Mitigation
A. Transference
Explanation:
Transference usually involves insurance
Avoidance halts the business process, acceptance involves taking on the risk, and mitigation entails using controls to reduce risk
Which of the following components is part of what a CCSP should review when looking at contracting with a cloud service provider?
A. The physical layout of the data center
B. Background checks for the providers personnel
C. Use of subcontractors
D. Redundant uplink grafts
C. Use of subcontractors
Explanation:
The use of subcontractors can add risk to the supply chain and should be considered; determining how much you can trust the providers management of their vendors and suppliers (including subcontractors) is not important
Conversely, the customer is not likely to be allowed to review the physical design of the data center (or, indeed, even know the exact location of the data center) or the personnel security specifics for the providers staff.
Redundant uplink grafts is a nonsense term used as a distractor
The difference between KPIs and KRIs is which of the following?
A. KPIs no longer exist, having been replaced by KRIs
B. KRIs no longer exist, having been replaced by KPIs
C. KRIs are forward looking, while KPIs are backward looking
D. There is no difference between KPIs and KRIs
C. KRIs are forward looking, while KPIs are backward looking
Explanation:
Key risk indicators (KRIs) try to predict future risk, while key performance indicators (KPIs) examine events that have already happened.
the other answers are just distractors
Which of the following is not a way to manage risk?
A. Enveloping
B. Mitigating
C. Accepting
D. Transferring
A. Enveloping
Explanation:
Enveloping is a nonsense term, unrelated to risk management.
The rest are valid ways to manage risk