Chapter 2 Domain 2: Cloud Data Security (Ben Malisow) Flashcards
In which of these options does the encryption engine reside within the application accessing the database?
A. Transparent encryption
B. Symmetric-key encryption
C. Application-level encryption
D. Homomorphic encryption
C. Application-level encryption
Explanation:
In application-level encryption, the application will encrypt data before it is placed in the database. In transparent encryption, the entire database is encrypted. Symmetric-key encryption is a kind of encryption and not truly indicative of a strategy used in database encryption. Homomorphic encryption is an experimental, theoretical process that might allow processing encrypted information without the need to decrypt it first.
You are the security team leader for an organization that has an infrastructure as a service (IaaS) production environment hosted by a cloud provider. You want to implement an event monitoring (security information and event management [SIEM]/security information management [SIM]/security event management [SEM]) solution in your production environment in order to acquire better data for security defenses and decisions. Which of the following is probably your most significant concern about implementing this solution in the cloud?
A. The solution should give you better analysis capability by automating a great deal of the associated tasks.
B. Dashboards produced by the tool are a flawless management benefit.
C. You will have to coordinate with the cloud provider to ensure that the tool is acceptable and functioning properly.
D. Senior management will be required to approve the acquisition and implementation of the tool.
C. You will have to coordinate with the cloud provider to ensure that the tool is acceptable and functioning properly.
Explanation:
Because the tool will require at least some installation and reporting capability within the cloud environment, it is essential to coordinate with the cloud provider to ensure that the solution you choose will function properly and is allowed by the provider. Option A is true, but not a major concern; that is a benefit of SIEM/SEM/SIM tools. Option B is not true because dashboards can often misconstrue pertinent reporting data when they are used to chase management goals instead of distilling raw data appropriately. Option D is not true because management should not be involved in such granular decisions.
Which of the following is not a step in the crypto-shredding process?
A. Encrypt data with a particular encryption engine.
B. Encrypt first resulting keys with another encryption engine.
C. Save backup of second resulting keys.
D. Destroy original second resulting keys.
C. Save backup of second resulting keys.
Explanation:
In crypto-shredding, the purpose is to make the data unrecoverable; saving a backup of the keys would attenuate that outcome because the keys would still exist for the purpose of recovering data. All other steps outline the crypto-shredding process.
Which of the following sanitization methods is feasible for use in the cloud?
A. Crypto-shredding
B. Degaussing
C. Physical destruction
D. Overwriting
A. Crypto-shredding
Explanation:
Cloud customers are allowed to encrypt their own data and manage their own keys; crypto-shredding is therefore possible. Degaussing is not likely in the cloud because it requires physical access to the storage devices and because most cloud providers are using solid-state drives (SSDs) for storage, which are not magnetic. Physical destruction is not feasible because the cloud customer doesn’t own the hardware and therefore won’t be allowed to destroy it. Overwriting probably won’t work because finding all data in all aspects of the cloud is difficult and the data is constantly being backed up and securely stored, so a thorough process would be very tricky.
Which of the following is not a method for enhancing data portability?
A. Crypto-shredding
B. Using standard data formats
C. Avoiding proprietary services
D. Favorable contract terms
A. Crypto-shredding
Explanation:
Crypto-shredding is for secure sanitization, not portability. The other methods all enhance portability.
When implementing a digital rights management (DRM) solution in a cloud environment, which of the following does not pose an additional challenge for the cloud customer?
A. Users might be required to install a DRM agent on their local devices.
B. DRM solutions might have difficulty interfacing with multiple different operating systems and services.
C. DRM solutions might have difficulty interacting with virtualized instances.
D. Ownership of intellectual property might be difficult to ascertain.
D. Ownership of intellectual property might be difficult to ascertain.
Explanation:
The owner of intellectual property will not change whether the material is stored in the cloud or in a legacy environment. Moving into the cloud will probably result in more use of personal devices, requiring users to install local DRM agents, so option A is true, making it not a suitable answer to this question. Options B and C are also true, due to the nature of cloud computing, and are therefore also not suitable for this question.
When implementing cryptography in a cloud environment, where is the worst place to store the keys?
A. With the cloud provider
B. Off the cloud, with the data owner
C. With a third-party provider, in key escrow
D. Anywhere but with the cloud provider
A. With the cloud provider
Explanation:
Option A creates a conflict of interest and does not enforce separation of duties. The best practice is to not store cryptographic keys with the data they encrypt, to avoid a potential conflict of interest and to enforce separation of duties. Each of the other choices is a reasonable choice and therefore not the answer to this question.
Which of the following is not a security concern related to archiving data for long-term storage?
A. Long-term storage of the related cryptographic keys
B. Format of the data
C. Media the data resides on
D. Underground depth of the storage facility
D. Underground depth of the storage facility
Explanation:
A long-term storage facility may or may not be located underground; the security of that facility (and the data contained therein) is not dependent on this aspect. Option A is a security concern because loss of the keys may result in losing the data (by losing access to the data), and keeping the keys with the data they protect increases risk. Both the format of the data and the media on which it resides (options B and C) are important to bear in mind, as either (or both) may be outmoded by the time the data might need to be retrieved from the archive; data and formats do not age well.
Data dispersion is a cloud data security technique that is most similar to which legacy implementation?
A. Business continuity and disaster recovery (BC/DR)
B. Redundant Array of Inexpensive Disks (RAID)
C. Software-defined networking (SDN)
D. Content delivery network (CDN)
B. Redundant Array of Inexpensive Disks (RAID)
Explanation:
Data dispersion is basically RAID in the cloud, with data elements parsed and stored over several areas/devices instead of stored as a unit in a single place. RAID (and data dispersion) does aid in BC/DR activities by increasing the robustness and resiliency of stored data, but BC/DR is a much more general discipline, so it is not the optimum answer for the question. SDN is used for abstracting network control commands away from production data, and CDN is usually used for ensuring quality of streaming media.
Data dispersion uses _______________, where the traditional implementation is called “striping.”
A. Chunking
B. Vaulting
C. Lumping
D. Grouping
A. Chunking
Explanation:
Where RAID used data striping across multiple drives, with data dispersion this technique is referred to as “chunking,” or sometimes “sharding” when encryption is also used. The other options are not common data dispersion terms used in cloud computing and have no meaning in this context.
Data dispersion uses _______________, where the traditional implementation is called “parity bits.”
A. Smurfing
B. Snarfing
C. Erasure coding
D. Real-time bitlinking
C. Erasure coding
Explanation:
Erasure coding is the practice of having sufficient data to replace a lost chunk in data dispersion, protecting against the possibility of a device failing while it holds a given chunk; parity bits serve the same purpose in a traditional RAID configuration. The other options are not common data dispersion terms used in cloud computing and have no meaning in this context.
Data dispersion provides protection for all the following security aspects except _______________.
A. Protecting confidentiality against external attack on the storage area
B. Loss of availability due to single-storage-device failure
C. Loss due to seizure by law enforcement in a multitenant environment
D. Protecting against loss due to user error
D. Protecting against loss due to user error
Explanation:
Data dispersion can’t aid in inadvertent loss caused by an errant user; if the user accidentally deletes/corrupts a file, that file will be deleted/corrupted across all the storage spaces where it is dispersed. The technique does, however, protect against the other risks. It enhances confidentiality because an attacker gaining illicit access to a single storage space will only get a chunk of the data, which is useless without the other chunks. This same aspect also protects loss when law enforcement seizes a specific storage device/space when they are investigating another tenant at the same cloud provider your organization uses. And loss of availability due to single device failure is probably the primary reason for having data dispersion (like RAID before it).
Your organization is migrating the production environment to an infrastructure as a service (IaaS) cloud implementation. Your users will need to be able to get access to their data, install programs, and partition memory space for their own purposes. You should configure the cloud memory as _______________.
A. Object
B. Volume
C. Synthetic
D. Database
B. Volume
Explanation:
Volume storage allows all the functions described in the question. Object storage has data arranged in a file structure, and databases arrange data in tables and relational schemes; neither of these options offers the functions described in the question. Synthetic is not a cloud memory configuration option.
Your organization is migrating the production environment to an infrastructure as a service (IaaS) cloud implementation. Your users will need to be able to get access to their data and share data with other users in a defined way, according to a hierarchy. You should configure the cloud memory as _______________.
A. Object storage
B. Volume storage
C. Synthetic storage
D. Databases
A. Object storage
Explanation:
Object storage is usually arranged in a file hierarchy. Volume storage has data with no defined structure (only memory space), and databases ar-range data in tables and relational schemes; neither of these options offers the functions described in the question. Synthetic is not a cloud memory con-figuration option.
What is one of the benefits of implementing an egress monitoring solution?
A. Preventing distributed denial of service (DDoS) attacks
B. Inventorying data assets
C. Interviewing data owners
D. Protecting against natural disasters
B. Inventorying data assets
Explanation:
Egress monitoring solutions (often referred to as DLP tools, where DLP stands for data loss protection or data leak prevention, or some combination of these terms) require the organization to appropriately inventory and classify data assets so the tool knows what to protect. DLP does not aid in protections for DDoS or natural disasters, which affect availability, not confidentiality (DLP only enhances confidentiality efforts). Option C is not a benefit of implementing an egress monitoring solution.
Egress monitoring solutions usually include a function that _______________.
A. Arbitrates contract breaches
B. Performs personnel evaluation reviews
C. Discovers data assets according to classification/categorization
D. Applies another level of access control
C. Discovers data assets according to classification/categorization
Explanation:
Egress monitoring solutions (often referred to as DLP tools, where DLP stands for data loss protection or data leak prevention, or some combination of these terms) will often include a discovery function, which will locate data assets according to criteria defined by the organization. DLP solutions cannot arbitrate contract breaches or perform personnel evaluations. Usually, DLPs also do not apply additional access controls; that is typically a characteristic of a digital rights management (DRM) solution.
Egress monitoring solutions usually include a function that _______________.
A. Uses biometrics to scan users
B. Inspects incoming packets
C. Resides on client machines
D. Uses stateful inspection
C. Resides on client machines
Explanation:
Egress monitoring solutions (often referred to as DLP tools, where DLP stands for data loss protection or data leak prevention, or some combination of these terms) will often include an agent that resides on client devices in order to inspect data being shared/sent by end users. DLP tools do not inspect incoming packets, with or without stateful inspection; this is the job of firewalls. DLP solutions do not typically use biometrics in any way.
Digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM) can be used to protect all sorts of sensitive data but are usually particularly designed to secure ____________.
A. Personally identifiable information (PII)
B. Intellectual property
C. Plans and policies
D. Marketing material
B. Intellectual property
Explanation:
DRM is mainly designed to protect intellectual property. It can also sometimes be used for securing PII, but intellectual property is a better answer here. Plans and policies aren’t usually protected in this manner, and marketing material is usually meant to be disseminated, so it does not require protection.
Digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM) often protect unauthorized distribution of what type of intellectual property?
A. Patents
B. Trademarks
C. Personally identifiable information (PII)
D. Copyright
D. Copyright
Explanation:
DRM is often deployed to ensure that copyrighted material (frequently software) is only delivered to and used by licensed recipients. Patents are more complicated and not often distributed to a mass market, so DRM does not assist in that way. Trademarks are representations of a brand and meant to be distributed, so DRM does not protect them. PII is not typically a type of intellectual property.
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
A. Persistence
B. Influence
C. Resistance
D. Trepidation
A. Persistence
Explanation:
Persistence is the trait that allows DRM protection to follow protected files wherever they might be stored/copied. The other options are not characteristics associated with DRM solutions.
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
A. Automatic expiration
B. Multilevel aggregation
C. Enhanced detail
D. Broad spectrum
A. Automatic expiration
Explanation:
Automatic expiration is the trait that allows DRM tools to prevent access to objects when a license expires or to remove protections when intellectual property moves into the public domain. The other options are not characteristics associated with DRM solutions.
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
A. Transparent encryption modification
B. Bilateral enhancement
C.Continuous audit trail
D .Encompassing flow
C.Continuous audit trail
Explanation:
Continuous audit trail is the trait that allows DRM tools to log and exhibit all access to a given object. The other options are not characteristics associated with DRM solutions.
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
A. Mapping to existing access control lists (ACLs)
B. Delineating biometric catalogs
C. Preventing multifactor authentication
D. Prohibiting unauthorized transposition
A. Mapping to existing access control lists (ACLs)
Explanation:
Mapping to existing access control lists (ACLs) is the trait that allows DRM tools to provide additional access control protections for the organization’s assets. The other options are not characteristics associated with DRM solutions.
According to the (ISC)2 Cloud Secure Data Lifecycle, which phase comes soon after (or at the same time as) the Create phase?
A. Store
B. Use
C. Deploy
D.Archive
A. Store
Explanation:
The Cloud Secure Data Lifecycle phases are, in order, Create, Store, Use, Share, Archive, Destroy (a good mnemonic might be CSU-SAD). Options B and D are phases of CSU-SAD but do not immediately follow Create. Option C is not a phase of CSU-SAD.
According to the (ISC)2 Cloud Secure Data Lifecycle, which phase comes immediately before the Share phase?
A. Create
B. Destroy
C. Use
D. Encrypt
C. Use
Explanation:
The Cloud Secure Data Lifecycle phases are, in order, Create, Store, Use, Share, Archive, Destroy (a good mnemonic might be CSU-SAD). Options B and D are phases of CSU-SAD but do not immediately follow Create. Option C is not a phase of CSU-SAD.
Why is the term (ISC)2 Cloud Secure Data Lifecycle actually somewhat inaccurate?
A. The term is not used only by (ISC)2.
B. Not all phases are secure.
C. Not all phases take place in the cloud.
D. It’s not actually a cycle.
D. It’s not actually a cycle.
Explanation:
The Cloud Secure Data Lifecycle phases are, in order, Create, Store, Use, Share, Archive, Destroy (a good mnemonic might be CSU-SAD). This is not truly a cycle because data does not continue after the destroy phase (that is to say, the same data or process does not go back to create after destroy).
Option A might be considered true because the CSU-SAD cycle is not unique to (ISC)2, but this is not the best answer; option D is preferable because it is not truly a cycle. Options B and C are incorrect because activity in each of the phases involves security aspects and all phases relate to how data is involved in the cloud.
According to the (ISC)2 Cloud Secure Data Lifecycle, in which phase should the process of categorization/classification of data occur?
A. Create
B. Store
C. Define
D. Use
A. Create
Explanation:
The Cloud Secure Data Lifecycle phases are, in order, Create, Store, Use, Share, Archive, Destroy (a good mnemonic might be CSU-SAD). The best practice for categorizing/classifying data is to do so when it is first created/collected so that the proper security controls can be applied to it throughout the rest of the cycle. Options B and D are phases of the CSU-SAD but are not the proper times to be applying classification/categorization; that would be too late in the cycle. Option C is not a phase of CSU-SAD.
Which of the following should occur during the final phase of the Cloud Secure Data Lifecycle?
A. Data dispersion
B. Crypto-shredding
C. Cryptoparsing
D .Cryptosporidium
B. Crypto-shredding
Explanation:
The Cloud Secure Data Lifecycle phases are, in order, Create, Store, Use, Share, Archive, Destroy (a good mnemonic might be CSU-SAD). Crypto-shredding (also called cryptographic erasure) is the preferred method of data sanitization for a cloud environment; this should take place in the final phase of the cycle, destroy. Option A is incorrect because data dispersion is a means of making data more resilient and secure; in the final phase of the cycle, we want to get rid of the data, not make it resistant to loss. Option C is incorrect because cryptoparsing is a made-up term and used here as a distractor. Option D is incorrect because cryptosporidium is a microorganism and is not associated with InfoSec.
At what phase of the Cloud Secure Data Lifecycle does data enter long-term storage?
A. The first
B. The second
C. The fourth
D. The fifth
D. The fifth
Explanation:
The Cloud Secure Data Lifecycle phases are, in order, Create, Store, Use, Share, Archive, Destroy (a good mnemonic might be CSU-SAD). Archiving (the fifth phase) is the process of moving data out of the production environment and into long-term storage. The other phases in the options are create, store, and share and are therefore incorrect.
What is a form of cloud storage where data is stored as objects, arranged in a hierarchal structure, like a file tree?
A. Volume storage
B. Databases
C. Content delivery network (CDN)
D .Object storage
D .Object storage
Explanation:
Object storage stores data as objects (hence the name), often arranged in a hierarchical structure. Volume storage is not a hierarchal cloud storage structure and is therefore an incorrect answer for this question. Option B is incorrect because databases are applications in both traditional and cloud computing. A CDN is a geographically distributed network of proxy servers and their data centers. Option C is incorrect because it is not a form of cloud storage.
What is a form of cloud storage where data is stored in a logical storage area assigned to the user but not necessarily physically attached or even geographically proximate to the compute node the user is utilizing?
A. Volume storage
B. Databases
C. Content delivery network (CDN)
D. Object storage
A. Volume storage
Explanation:
In volume storage, the user is assigned a logical drive space into which anything (such as raw data, objects, or applications) may be saved or installed, similar to a mounted drive on a traditional network. Databases store data in an arrangement of characteristics and values, not in an unstructured drive space, so option B is incorrect.
CDNs are for distributing data with less chance of quality loss, so option C is incorrect. Object storage arranges data as objects in a structured hierarchy, so option D is incorrect.
What is a form of cloud storage often used for streaming multimedia data to users?
A. Volume storage
B. Databases
C. Content delivery network (CDN)
D. Neutral storage
C. Content delivery network (CDN)
Explanation:
CDNs are often used to place large stores of multimedia data in a location geographically near to the end users who will consume that data; this approach is designed mostly to accomplish a reduction in data degradation due to distance between resource and user. Volume storage assigns a logical, unstructured drive space to the user, so option A is incorrect. Databases store data in an arrangement of characteristics and values, so option B is incorrect. Neutral storage is not a form of cloud storage, so option D is incorrect.
What type of data storage is often used in platform as a service (PaaS) arrangements?
A. Ephemeral
B. Database
C. Long-term
D. Nefarious
B. Database
Explanation:
The PaaS model allows the cloud customer to install and run applications in the cloud environment. With a database, the cloud customer can store data in a database administered by the cloud provider but can then tailor applications and services for reaching into and manipulating that database. Ephemeral and long-term storage take place in the software as a service (SaaS) model, and there is no such thing as “nefarious data storage,” so the other options are incorrect.
What is a form of cloud data protection where data is spread across multiple storage devices/locations, similar to RAID in the legacy environment?
A. Infringing
B. Data dispersion
C. Voiding
D. Crypto-shredding
B. Data dispersion
Explanation:
Data dispersion is the cloud version of using RAID arrays, protecting data by spreading it across multiple volumes/devices. Options A and C are terms that have no meaning in this context. Crypto-shredding is a form of device/media sanitization utilizing cryptography and has nothing to do with RAID, so option D is incorrect.
Erasure coding, in the cloud, is similar to what element of RAID implementations in a traditional IT environment?
A. Deltas
B. Inversion
C. Parity bits
D. Transposition
C. Parity bits
Explanation:
Similar to parity bits in RAID, erasure coding is used in cloud data dispersion implementations to create a situation where data can still be recovered even if a segment or portion of the dispersed data is lost (due to drive failure, disaster, etc.). Options A and B have no meaning in this context.
Transposition is a cryptographic technique and does not relate to RAID in any way, so option D is also incorrect.
DLP (data loss prevention or data leak protection) solutions are implemented in the hopes of securing _______________.
A. Sensitive data that may leave the organization’s control
B. All data within the organization’s control
C. Data being processed by the organization’s users
D. Data that could be intercepted while out of the organization’s control
A. Sensitive data that may leave the organization’s control
Explanation:
DLP, also referred to as egress monitoring, is used to detect and prevent sensitive data from leaving the organization’s control without proper approval. Because it is designed to prevent the egress of only certain data sets, options B and C are not correct. Controlling data outside the reach of the organization is difficult at best. While there are some mechanisms that might accomplish this, DLP is not specifically designed for that purpose, so option D is incorrect.
Which of the following will DLP (data loss prevention or data leak protection) solutions most likely not inspect?
A. Email content
B. FTP traffic
C. Material saved to portable media
D. Voice over Internet Protocol (VoIP) conversations
D. Voice over Internet Protocol (VoIP) conversations
Explanation:
Commercial DLP products that monitor speech in real time and censor conversations are not yet widely available. A proper DLP solution will monitor all the technologies in the other options, so those are incorrect.
DLP (data loss prevention or data leak protection) solutions may use all of the following techniques to identify sensitive data except _______________.
A. Pattern matching
B. Inference
C. Keyword identification
D. Metadata tags
B. Inference
Explanation:
Inference is an attack technique that derives sensitive material from an aggregation of innocuous data; DLP tools, thus far, do not have this capability. All the other techniques listed may be used by DLP solutions to detect sensitive data before it leaves the control of the owner.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. In which of the following cases would you not have to get permission from the cloud provider to install and implement the tool?
A. If it’s hardware-based and your production environment is in an infrastructure as a service (IaaS) model
B. If you purchased it from a vendor other than the cloud provider
C. If it’s software-based and your production environment is in a platform as a service (PaaS) model
D. If it affects all guest instances on any given host device
C. If it’s software-based and your production environment is in a platform as a service (PaaS) model
Explanation:
A cloud customer can install applications on a PaaS environment, usually as they see fit and without prior coordination with the provider. If you are introducing hardware into the cloud environment, you will need permission from your cloud provider, regardless of the deployment model you use. Therefore, option A is incorrect (and unlikely to occur, as permission is probably not going to be granted). Although the provider may offer an egress monitoring function as an add-on service, which would be permissible for you to use, the use of an outside vendor’s product may have to be reviewed by the provider before implementation, based on a number of other variables (such as the other possible answers). Option C is preferable, so option B is incorrect. Affecting all images on a host may impact other customers in a multitenant environment, so option D is not the correct answer.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. Before implementing the solution, what should you explain to senior management?
A. The additional risks of external attack associated with using the tool
B. The production impact it will have on the environment
C. What the price of the tool was
D. How the solution works
B. The production impact it will have on the environment
Explanation:
All security functions come with an attendant negative productivity effect: the most secure environment will be the least productive, and the most productive will be the least secure. Egress monitoring tools will have an overhead cost in terms of production impact and loss of efficiency and speed. This may affect the cost savings that were realized in a cloud migration from the legacy environment, and senior management needs to understand this trade-off. Implementing an egress monitoring solution should not incur any additional risks of external attack, so option A is incorrect. Because the tool has already been purchased, explaining the purchase price is irrelevant at this point, so option C is incorrect. If it was germane (and it was likely not), you should have explained how the tool works before purchasing it; explaining at this point might be interesting but is not as important as option B, so option D is incorrect.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. Which of these activities should you perform before deploying the tool?
A. Survey your company’s departments about the data under their control.
B. Reconstruct your firewalls.
C. Harden all your routers.
D. Adjust the hypervisors.
A. Survey your company’s departments about the data under their control.
Explanation:
In order to “train” the egress monitoring solution properly, you’ll need to inform it as to which data in your organization is sensitive…and, in order to do that, you’ll need to determine what information your data owners deem sensitive; a survey is a way to do that. A proper egress monitoring solution should not affect or be affected by the firewalls, routers, or hypervisors, so options B, C, and D are incorrect.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. What should you expect immediately following the implementation of the tool?
A. Immediate decrease in lost data
B. A series of false-positive indications
C. Increase in morale across the organization
D. Increase in gross revenue
B. A series of false-positive indications
Explanation:
It will take a while for the tool to “learn” the particulars of your environment and to be conditioned properly. A significant number of false-positive indications will be expected in the near term, until you can hone the responses to properly meet your organization’s needs. The tool will not work optimally immediately upon implementation, so option A is incorrect.
Egress monitoring tools do not affect morale or revenues, so options C and D are incorrect.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. What should you not expect the tool to address?
A. Sensitive data sent inadvertently in user emails
B. Sensitive data captured by screenshots
C. Sensitive data moved to external devices
D. Sensitive data in the contents of files sent via File Transfer Protocol (FTP)
B. Sensitive data captured by screenshots
Explanation:
It’s unlikely that any egress monitoring tools will be able to detect sensitive data captured, stored, and/or sent as graphic image files, which is the usual form of screenshots.
A proper egress monitoring tool should be able to detect all the other types of activity, so the other options are incorrect.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. In order to get truly holistic coverage of your environment, you should be sure to include ____________ as a step in the deployment process.
A. Getting signed user agreements from all users
B. Installation of the solution on all assets in the cloud data center
C. Adoption of the tool in all routers between your users and the cloud provider
D. Ensuring that all your customers install the tool
A. Getting signed user agreements from all users
Explanation:
This is a tricky question. In the cloud environment, we know that all users will be entering the environment through remote access; in many cases, this will include the use of their personal devices. In order for egress monitoring solutions to function properly, all devices accessing the production environment must have local agents installed, and that requires signed user agreements. It would be unnecessary (and intrusive, and cumbersome) to install agents on all assets in the cloud data center, which includes not only your organization’s assets but also those of all the other cloud tenants in that data center. This might even be illegal. Option B is incorrect. Assuming you could install (or even know) all the routers between your users and the cloud data center is ridiculous; option C is incorrect. Getting your customer to install an egress monitoring client would be nice, in theory…but also pointless. Your customers don’t work for you; they are outside your organization. Egress monitoring tools are used to prevent sensitive data from leaving your environment; by the time it has reached a customer, sensitive information is far outside your control and the egress monitoring tool would be of no use. Option D is therefore incorrect.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. In order to increase the security value of the tool, you should consider combining it with _______________.
A. Digital rights management (DRM) and security event and incident management (SIEM) tools
B. An investment in upgraded project management software
C. Digital insurance policies
D. The Uptime Institute’s Tier certification
A. Digital rights management (DRM) and security event and incident management (SIEM) tools
Explanation:
Egress monitoring tools combined with DRM and SIEM enhance the security value of each because you create in-depth/layered defense. Project management software does not really have anything to do with security, so option B is incorrect.
Insurance is a risk transfer mechanism and does not aid in risk mitigation efforts; egress monitoring is for risk mitigation, so option C is incorrect. The Tier certification program is for the cloud provider and is not used by the cloud customer, so option D is incorrect.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. You are interested in fielding the solution as an awareness tool to optimize security for your organization through conditioning user behavior. You decide to set the solution to _______________.
A. Suspend user accounts and notify the security office when it detects possible sensitive data egress attempted by a user
B. Halt the transaction and notify the user’s supervisor when the user attempts to transfer sensitive data
C. Query the user as to whether they intend to send sensitive data upon detection of an attempted transfer
D. Sever remote connections upon detection of a possible sensitive data transfer
C. Query the user as to whether they intend to send sensitive data upon detection of an attempted transfer
Explanation:
These are all possible settings for a modern egress monitoring solution. However, the best option, in light of the question, is to query the user as to their intent; this aids the user in understanding and knowing when sensitive data might be leaving the organization accidentally, through a mistake on the user’s part. The other options are more severe and restrictive; these will enhance security but reduce productivity and are management and technological controls instead of awareness tools, so they are incorrect answers for this question.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud-based production environment. You understand that all of the following aspects of cloud computing may make proper deployment of the tool difficult or costly except _______________.
A. Data will not remain in one place or form in the cloud
B. The cloud environment will include redundant and resilient architecture
C. There will be a deleterious impact on production upon installing the tool
D. You might not have sufficient proper administrative rights in the cloud infrastructure
B. The cloud environment will include redundant and resilient architecture
Explanation:
The fact that cloud data centers are designed with multiple redundancies of all systems and components won’t really have any bearing on your decision and implementation of your egress monitoring solution.
Because data will move across nodes in the data center and will take different forms (such as live data in a virtualized instance or snapshotted data saved in a file store when a virtual machine is not being used at a specific moment), you will have to determine how the tool will function in that environment, and whether it was designed for cloud usage. Option A is incorrect. Option C is true for any environment, not just the cloud; all security functions necessarily negatively impact operations and production. Option B is a better answer. Option D is also correct; without administrative privileges to the underlying hardware (which customers should not have), the customer may not be able to install monitoring agents everywhere necessary for those tools to work properly.
Egress monitoring solutions can aid all of the following security-related efforts except _______________.
A. Access control
B. Data exfiltration
C. E-discovery/forensics
D. Data categorization/classification
A. Access control
Explanation:
Egress monitoring solutions do not facilitate access control efforts in any way. Egress monitoring tools do, however, provide all the functions listed in the other options, so those are incorrect.
The cloud security professional should be aware that encryption would most likely be necessary in all the following aspects of a cloud deployment except _______________.
A. Data at rest
B. Data in motion
C. Data in use
D. Data of relief
D. Data of relief
Explanation:
The term data of relief doesn’t really mean anything and is therefore the correct answer for this question. Encryption is used in all other aspects of cloud data.
As with the traditional IT environment, cloud data encryption includes all the following elements except _______________.
A. The user
B. The data itself
C. The encryption engine
D. The encryption keys
A. The user
Explanation:
The user is not really an aspect of an encryption deployment, although it may be argued that the user will need to refrain from disclosing their own key(s) to anyone else. The other three options are the components of an encryption deployment.
Volume storage encryption in an infrastructure as a service (IaaS) arrangement will protect against data loss due to all of the following activities except _______________.
A. Physical loss or theft of a device
B. Disgruntled users
C. Malicious cloud administrators accessing the data
D. Virtual machine snapshots stolen from storage
B. Disgruntled users
Explanation:
An authorized user will still be able to access and decrypt the data for which they’ve been granted permissions, so encryption will not offer any protections for that threat. Volume storage encryption will, however, protect against all the other threats, because any outsider (that is, a person who does not have access to the volume operating system) will be able to steal only encrypted data, which they should not be able to decrypt in a timely fashion. Therefore, all the other options are incorrect.
In an infrastructure as a service (IaaS) arrangement, all of the following are examples of object storage encryption except _______________.
A. File-level encryption
B. Digital rights management (DRM)
C. Application-level encryption
D .Transport Layer Security (TLS)
D .Transport Layer Security (TLS)
Explanation:
TLS is encryption used in a communication session, not a storage volume. All the other options are examples of object storage encryption options, so they are incorrect.
All of the following are database encryption options that could be used in a platform as a service (PaaS) implementation except _______________.
A. File-level encryption
B. Secure Sockets Layer (SSL)
C. Transparent encryption
D .Application-level encryption
B. Secure Sockets Layer (SSL)
Explanation:
SSL is encryption used in a communication session, not a storage volume. All the other options are examples of database encryption options, so they are incorrect.
In application-level encryption, where does the encryption engine reside?
A. In the application accessing the database
B. In the operating system on which the application is run
C. Within the database accessed by the application
D. In the volume where the database resides
A. In the application accessing the database
Explanation:
The application contains the encryption engine used in application-level encryption. The operating system is responsible for providing the resources an application needs and for running the applications. The operating system does not do application-level encryption, so option B is incorrect. Option C is incorrect because application-level encryption is performed by the application that interfaces with the database.
The application-level encryption engine may or may not reside in the same volume as the database engine, so option D is incorrect.
Which of the following database encryption techniques can be used to encrypt specific tables within the database?
A. File-level encryption
B. Transparent encryption
C. Application-level encryption
D. Object-level encryption
B. Transparent encryption
Explanation:
Encrypting specific tables within the database is one of the options of transparent encryption; this is not true of the other options, so they are incorrect.
Which of the following database encryption techniques makes it difficult to perform database functions (searches, indexing, etc.)?
A. File-level encryption
B. Transparent encryption
C. Application-level encryption
D. Volume encryption
C. Application-level encryption
Explanation:
Application-level encryption involves encrypting the data before it enters the fields of the database; it is much more difficult to search and review data that has been encrypted, so this reduces the functionality of the database. All the other options are incorrect because they are not database encryption techniques.
According to (ISC)2, where should the cloud customer’s encryption keys be stored?
A. With the cloud customer
B. With a third-party provider
C. At the cloud provider data center
D. Anywhere but with the cloud provider
D. Anywhere but with the cloud provider
Explanation:
Best practice is to not keep the encryption keys alongside the data they’ve been used to encrypt. Options A and B are both viable but not as good as option D, which is more general and includes them both. Option C is clearly incorrect because it is counter to the best practice advice offered by (ISC)2
Which of the following is not used to determine data retention requirements?
A. Legislation
B. Business needs
C. Average media longevity
D .Contracts
C. Average media longevity
Explanation:
Data retention periods should be established in policy regardless of the projected lifetime of the media the data resides on. All the other options do/should influence data retention periods.
Event monitoring tools (security information and event management [SIEM]/security information management [SIM]/security event management [SEM]) can aid in which of the following efforts?
A. External hacking detection
B. Prediction of physical device theft
C. Data classification/categorization issues
D. Social Engineering Attacks
A. External hacking detection
Explanation:
Event monitoring tools can help detect external hacking efforts by tracking and reporting on common hack-related activity, such as repeated failed login attempts and scanning. It is unlikely that these tools could predict physical device theft; they could, of course, report on a device that is no longer connected to the environment after it has been removed by noting a lack of event activity, but that’s not quite the same thing. Event monitoring tools don’t aid in data classification/categorization; egress monitoring and digital rights management tools might provide that function, though. Social engineering attacks are mostly transparent to the majority of logical tools (the exception being social engineering efforts combined with IT traffic, such as phishing, which might be detected by email filters and sophisticated firewalls).
Event monitoring tools (security information and event management [SIEM]/security information management [SIM]/security event management [SEM]) can aid in which of the following efforts?
A. Detecting untrained personnel
B. Predicting system outages
C. Sending alerts for conflicts of interest
D. Enforcing mandatory vacation
B. Predicting system outages
Explanation:
Event monitoring tools can be used to predict system outages by noting decreases in performance; repeated performance issues can be an indicator a device is failing. While an event monitoring tool might be able to detect a user who continually conducts unproductive activity or fails to complete certain functions, it is impossible to determine if the source of the problem is lack of training. These tools in no way serve to detect conflict of interest or enforce mandatory vacation, which are managerial/administrative controls.