Chapter 3 All In One Flashcards

1
Q

Which type of technology can be used within a cloud environment to quickly verify the integrity of data objects that are likely to exist in many places?

A. Hashing
B. Tokenization
C. Mapping
D. Labeling

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 131). McGraw Hill LLC. Kindle Edition.

A

A. Hashing

Explanation:
Hashing allows for taking any type of data structure and quickly producing a fingerprint or checksum value of fixed size, regardless of the size, type, or content of the original source. Due to the speed and efficiency of hashing, it is very useful for ensuring the integrity of data objects that exist in many places or across many types of storage.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 131). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term pertains to the manner in which data is stored throughout a cloud environment and dependent, in many cases, on the type of service requested or required?

A. Data distribution
B. Data dispersion
C. Data replication
D. Data redundancy

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 131). McGraw Hill LLC. Kindle Edition.

A

B. Data dispersion

Explanation:
Data dispersion is the term related to the distributed nature of data storage, within a cloud environment, that may span individual data centers or geographic regions, typically related to the level of service requested by the cloud customer.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 131). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not a type of storage used within a cloud environment?

A. Structured
B. Volume
C. Container
D. Object

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 132). McGraw Hill LLC. Kindle Edition.

A

C. Container

Explanation:
Container is not a storage type used in a cloud environment. Both the volume and object storage types are used within Infrastructure as a Service, and the structured storage type is used as part of a Platform as a Service offering.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 132). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.Which of the following is not part of the CCM domains?
A. Environmental
B. Human resources
C. Threat and vulnerability management
D. Mobile security

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 132). McGraw Hill LLC. Kindle Edition.

A

A. Environmental

Explanation:
Environmental is not an explicit domain under the CCM. The other three options, human resources, threat and vulnerability management, and mobile security, are all actual domains explicitly named in the CCM.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 132). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following logs could be exposed to a cloud customer in a Software as a Service environment, if the contract allows it?

A. Billing records
B. Management plane logs
C. Network captures
D. Operating system logs

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 132). McGraw Hill LLC. Kindle Edition.

A

A. Billing records

Explanation:
Billing records would most likely be available in a Software as a Service environment if allowed or required by the contract. The other choices, management plane logs, network captures, and operating system logs, would all be solely accessible and used by the cloud provider in a SaaS environment, as none of the systems that generate those logs falls within the responsibility of or access allowed to the cloud customer.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 132). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following storage types are used in a Platform as a Service model?

A. Volume and object
B. Structured and unstructured
C. Content and database
D. Volume and labeled

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 132). McGraw Hill LLC. Kindle Edition.

A

B. Structured and unstructured

Explanation:
Structured and unstructured storage types are used in the Platform as a Service model. The volume and object storage types are used within the Infrastructure as a Service model. The other two options, content and database as well as volume and labeled, are not used as a pair with any cloud service category, although volume is part of Infrastructure as a Service, and the use of databases would be a major component of the structured storage type offered under Platform as a Service.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 133). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where would the DLP solution be located for data-in-use monitoring?

A. On the application server
B. On the user’s device
C. On the network boundary
D. Integrated with the database server

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 133). McGraw Hill LLC. Kindle Edition.

A

B. On the user’s device

Explanation:
On the user’s device is the correct choice for data-in-use monitoring. Integrated with the database server would provide coverage for data at rest, while on the network boundary would provide coverage for data in transit. On the application server is also not appropriate because the actual use and viewing of data would occur through the client, as well as being outside the immediate security enclave of the application.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 133). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8.Which of the following data destruction methods would be available in a public cloud model?

A. Degaussing
B. Shredding
C. Encryption
D. Recycling

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 133). McGraw Hill LLC. Kindle Edition.

A

C. Encryption

Explanation:
Encryption is a data destruction method available in a public cloud model. Cryptographic erasure, in which the encryption keys are deleted as a means to protect and destroy data, is a software process that is always available in any environment. Degaussing, shredding, and recycling are all physically destructive methods that would not be available with a cloud hosting arrangement, and most certainly not with a public cloud environment.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 133). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9.Which of the following is not a feature of an SIEM solution?

A. Monitoring
B. Aggregation
C. Alerting
D. Dashboards

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (pp. 133-134). McGraw Hill LLC. Kindle Edition.

A

A. Monitoring

Explanation:
Monitoring is not a feature of an SIEM solution. SIEM solutions work by aggregating data, which can then be used for alerting on specific conditions, but not used in the sense of system monitoring. Dashboards are also a common feature of SIEM solutions to present reporting and alerting outputs to users or management.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 134). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not a key component of a data archiving strategy?

A. Format
B. Technologies
C. Testing
D. Size

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 134). McGraw Hill LLC. Kindle Edition.

A

D. Size

Explanation:
The size of archives is not a key component of a data archiving strategy. The main driving components of a data archiving strategy deal with the format of the archives, the technologies used with the archiving, and the ongoing and successful testing of restoration capabilities.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 134). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following laws in the United States governs the protection of health data?

A. SOX
B. HIPAA
C. Dodd–Frank
D. ACA

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 134). McGraw Hill LLC. Kindle Edition.

A

B. HIPAA

Explanation:
HIPAA governs the protection of healthcare-related data. While the ACA is related to healthcare as well, it is focused on the delivery of healthcare and health insurance coverage, not the specific security and privacy concerns with the data. SOX is focused on financial systems and the security controls and reporting necessary for them, while Dodd–Frank is focused on corporate reforms and consumer protection.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 134). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

12.Which of the following is the sole responsibility of the cloud customer in a PaaS environment?

A. Physical security
B. Data
C. Infrastructure
D. Platform

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 134). McGraw Hill LLC. Kindle Edition.

A

B. Data

Explanation:
B. Data is the sole responsibility of the cloud customer in all environments. Physical security is always the responsibility of the cloud provider. With PaaS, the cloud provider is also responsible for both the infrastructure and platform aspects of the environment.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 135). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not a key feature of an IRM solution?

A. Expiration
B. Policy control
C. Chain of custody
D. Auditing

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 135). McGraw Hill LLC. Kindle Edition.

A

C. Chain of custody

Explanation:
Chain of custody is not part of an IRM solution, as it is central to eDiscovery and other legal mechanisms. With an IRM solution, and the protection of data assets, the concepts of expiration, policy control, and the auditing of acceptable and authorized use are all key components.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 135). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

14.Encryption that is part of a database and not noticeable by the user is called what?

A. Transparent
B. Embedded
C. Passive
D. Active

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 135). McGraw Hill LLC. Kindle Edition.

A

A. Transparent

Explanation:
A. Transparent encryption is part of the database and not known to the user; it is integrated with the actual database processes and works as part of the ongoing workflow. The other choices—embedded, passive, and active—are general IT terms that are not applicable to this specific question.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 135). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three methods of data discovery?

A. Metadata, labels, content analysis
B. Metadata, categories, content analysis
C. Categories, labels, structure
D. Volumes, labels, metadata

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 135). McGraw Hill LLC. Kindle Edition.

A

A. Metadata, labels, content analysis

Explanation:
Metadata, labels, and content analysis are the three methods of data discovery. Metadata is looking at the “data on data” aspects, such as the creator, timestamps, software used, column headers, field names, and so on. Labels are subjective and applied to the data by systems or actual staff members, and they are only good if they are consistently and correctly applied. Content analysis involves making subjective determinations about the data from the actual content of it, either through technological or personnel efforts. The other terms used with the other responses are either not parts of data discovery or are not applicable here.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 135). McGraw Hill LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16.Which cloud model gives responsibility for the physical environment to the cloud customer?

A. IaaS
B. PaaS
C. SaaS
D. None of the above

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 136). McGraw Hill LLC. Kindle Edition.

A

D. None of the above

Explanation:
D. None of these environments gives responsibility for physical security to the cloud customer. In all cloud hosting environments, the cloud provider has sole responsibility for the physical infrastructure and the security of it.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 136). McGraw Hill LLC. Kindle Edition.

17
Q

Which type of storage is used for nodes and services and is only active as long as they are in use and then destroyed after?

A. Temporary
B. Transient
C. Ephemeral
D. Dynamic

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 136). McGraw Hill LLC. Kindle Edition.

A

C. Ephemeral

Explanation:
C. Ephemeral storage is temporary storage that is used for nodes and services only while they are in use, and then it is destroyed immediately after they are no longer in use.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 136). McGraw Hill LLC. Kindle Edition.

18
Q

Which of the following involves replacing data in a data set with random values that can then be mapped back to the actual data via a separate index?

A. Anonymization
B. Tokenization
C. Encryption
D. Obfuscation

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 136). McGraw Hill LLC. Kindle Edition.

A

B. Tokenization

Explanation:
B. Tokenization is the mapping of random values to the actual data via a separate index. Anonymization and obfuscation also involve replacing sensitive data fields with random or opaque data, but the replacing of data is not done in a way that it can be mapped back to the actual data fields as with tokenization. Encryption is the protection of the confidentiality of sensitive data by altering the actual contents of the data.

Carter, Daniel. CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (p. 136). McGraw Hill LLC. Kindle Edition.