Chapter 3 Domain 3: Cloud Platform and Infrastructure Security (Ben Malisow) Flashcards
You are in charge of creating the business continuity and disaster recovery (BC/DR) plan and procedures for your organization. Your organization has its production environment hosted in a cloud environment. You are considering using cloud backup services for your BC/DR purposes as well. What would probably be the best strategy for this approach, in terms of redundancy and resiliency?
A. Have your cloud provider also provide BC/DR backup.
B. Keep a BC/DR backup on the premises of your corporate headquarters.
C. Use another cloud provider for the BC/DR backup.
D. Move your production environment back into your corporate premises, and use your cloud provider to host your BC/DR backup.
C. Use another cloud provider for the BC/DR backup.
Explanation:
C. It’s best to have your backup at another cloud provider in case whatever causes an interruption in service occurs throughout your primary provider’s environment; this will be more complicated and expensive, but it provides the best redundancy and resiliency. Using the same provider for production and backup is not a bad option, but it entails the risk of the same contingency affecting both copies of your data. Having either the backup or the production environment localized does not provide the best protection, so neither option B nor option D is desirable.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
You are in charge of creating the business continuity and disaster recovery (BC/DR) plan and procedures for your organization. You decide to have a tabletop test of the BC/DR activity. Which of the following will offer the best value during the test?
A. Have all participants conduct their individual activities via remote meeting technology.
B. Task a moderator well versed in BC/DR actions to supervise and present scenarios to the participants, including randomized special events.
C. Provide copies of the BC/DR policy to all participants.
D. Allow all users in your organization to participate.
B. Task a moderator well versed in BC/DR actions to supervise and present scenarios to the participants, including randomized special events.
Explanation:
A trained and experienced moderator can guide the participants through the activity, enhancing their training and noting pitfalls and areas for improvement. Option A is not preferable because having the participants gathered together ensures their full attention and provides interaction that remote participation might not yield. Option C is a baseline; all participants should have copies of the policy as a matter of course. Option D is not useful in a tabletop exercise; only critical participants in the organization should take part in the tabletop.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
You are in charge of creating the business continuity and disaster recovery (BC/DR) plan and procedures for your organization. Your organization has its production environment hosted by a cloud provider, and you have appropriate protections in place. Which of the following is a significant consideration for your BC/DR backup?
A. Enough personnel at the BC/DR recovery site to ensure proper operations
B. Good cryptographic key management
C. Access to the servers where the BC/DR backup is stored
D. Forensic analysis capabilities
B. Good cryptographic key management
Explanation:
This is a difficult question that requires a great deal of thought. Option B is correct because appropriate cloud data security practices will require encrypting a great deal of the data, and having the keys will be necessary during contingency operations in order to access the backup; without the keys, you won’t be able to access your data. Option A is not correct because using the cloud for BC/DR will allow personnel to access the backup from anywhere they can get broadband connectivity, not specifically a recovery site. Option C is not correct because the customer will rarely have physical access to servers in the cloud environment. Option D is not correct because forensic analysis is not a significant consideration in BC/DR; it is much more important for incident response.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
You are in charge of creating the business continuity and disaster recovery (BC/DR) plan and procedures for your organization. You are going to conduct a full test of the BC/DR plan.
Which of the following strategies is an optimum technique to avoid major issues?
A. Have another full backup of the production environment stored prior to the test.
B. Assign all personnel tasks to perform during the test.
C. Have the cloud provider implement a simulated disaster at a random moment in order to maximize realistic testing.
D. Have your regulators present at the test so they can monitor performance.
A. Have another full backup of the production environment stored prior to the test.
Explanation:
A full test will involve both the production environment and the backup data; it is possible to create an actual disaster during a full test by ruining the availability of both. Therefore, it is crucial to have a full backup, distinct from the BC/DR backup, in order to roll back from the test in case something goes horribly wrong. Option B is incorrect because not all personnel will have tasks to perform; most personnel will have to evacuate from the facility only during a full test. Option C is incorrect because the cloud provider should not initiate the test, and the test should not take place at a random moment. Option D is not correct because the regulators’ presence will not add any value to the test.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
A Security Assertion Markup Language (SAML) identity assertion token uses the ___________________ protocol.
A. Extensible Markup Language (XML)
B. Hypertext Transfer Protocol (HTTP) Hypertext
C. Markup Language (HTML)
D. American Standard Code for Information Interchange (ASCII)
A. Extensible Markup Language (XML)
Explanation:
Security Assertion Markup Language (SAML) is based on XML. HTTP is used for port 80 web traffic; HTML is used to present web pages. ASCII is the universal alphanumeric character set.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
The minimum essential characteristics of a cloud data center are often referred to as “ping, power, pipe.” What does this term mean?
A. Remote access for customer to racked devices in the data center; electrical utilities; connectivity to an Internet service provider (ISP)/the Internet
B. Application suitability; availability; connectivity
C. Inrastructure as a service (IaaS); software as a service (SaaS); platform as a service (PaaS)
D. Anti-malware tools; controls against distributed denial-of-service (DDoS) attacks; physical/environmental security controls, including fire suppression
A. Remote access for customer to racked devices in the data center; electrical utilities; connectivity to an Internet service provider (ISP)/the Internet
Explanation:
Option A is the definition of the term;the other answers are not.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
To support all aspects of the CIA triad (confidentiality, integrity, availability), all of the following aspects of a cloud data center need to be engineered with redundancies except ___________________.
A. Power supply
B. HVAC
C. Administrative offices
D. Internet service provider (ISP)/connectivity lines
C. Administrative offices
Explanation:
The administrative offices of a cloud data center rarely are part of the critical functions of the operation; a data center could likely endure the loss of the administrative offices for a considerable length of time, so redundancy here is probably not cost effective. All the other items are part of the critical path and need redundancies.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Who is the cloud carrier?
A. The cloud customer
B. The cloud provider
C. The regulator overseeing the cloud customer’s industry
D. The ISP between the cloud customer and provider
D. The ISP between the cloud customer and provider
Explanation:
Option D is the definition of a cloud carrier, from National Institute of Standards and Technology (NIST) Special Publication (SP) 500-292. All the other options are incorrect, as defined by NIST SP 500-292.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Which of the following terms describes a means to centralize logical control of all networked nodes in the environment, abstracted from the physical connections to each?
A. Virtual private network (VPN)
B. Software-defined network (SDN)
C. Access control lists (ACLs)
D. Role-based access control (RBAC)
B. Software-defined network (SDN)
Explanation:
The question describes a software-defined network (SDN). A VPN is used for creating an encrypted communications tunnel over an untrusted medium, so option A is incorrect. ACLs are used as centralized repositories for identification, authentication, and authorization purposes, so option C is incorrect. RBAC is an access control model used to assign permissions based on job functions within an organization, so option D is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
In software-defined networking (SDN), the northbound interface (NBI) usually handles traffic between the ___________________ and the ___________________.
A. Cloud customer; ISP
B. SDN controllers; SDN applications
C. Cloud provider; ISP
D. Router; host
B. SDN controllers; SDN applications
Explanation:
B. The NBI usually handles traffic between the SDN controllers and SDN applications. Options A and C are incorrect because neither of those options lists any of the SDN infrastructure, be that the controllers or the applications. Option D may be arguably correct, as there might be an NBI handling that traffic between those nodes, but option B is more specific and always true for this definition, so it is the better choice.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Software-defined networking (SDN) allows network administrators and architects to perform all the following functions except ___________________.
A. Reroute traffic based on current customer demand
B. Create logical subnets without having to change any actual physical connections
C. Filter access to resources based on specific rules or settings
D. Deliver streaming media content in an efficient manner by placing it closer to the end user
D. Deliver streaming media content in an efficient manner by placing it closer to the end user
Explanation:
D. Option D is really a definition of a CDN (content delivery network). All the other options are aspects of SDNs.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Which of the following is a device specially purposed to handle the issuance, distribution, and storage of cryptographic keys?
A. Key management box (KMB)
B. Hardware security module (HSM)
C. Ticket-granting ticket (TGT)
D. Trusted computing base (TCB)
B. Hardware security module (HSM)
Explanation:
The question describes an HSM. KMB is a nonsense term used as a distractor, so it is incorrect. TGT is a term associated with Kerberos single sign-on systems and is incorrect.
The TCB includes the elements of hardware and software (usually in the operating system) that ensure that a system can only be controlled by those with the proper permissions (i.e., admins with root control), so it is also incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
When discussing the cloud, we often segregate the data center into the terms compute, storage, and networking. Compute is made up of ___________________ and ___________________.
A. Routers; hosts
B. Application programming interface (APIs); northbound interface (NBIs)
C. Central processing unit (CPU); random-access memory (RAM)
D. Virtualized; actual hardware devices
C. Central processing unit (CPU); random-access memory (RAM)
Explanation:
The compute nodes of a cloud data center can be measured in terms of how many central processing units (CPUs) and how much random access memory (RAM) is available within the center. Option A is incorrect because routers would be considered a part of the networking of a data center (and because option C is a better answer). Option B involves applications and how traffic flows between them and storage controllers; it has nothing to do with the compute nodes and is therefore wrong.
Option D might obliquely be considered correct because it’s technically true (compute nodes will include both virtual and hardware machines), but option C is a much better and more accurate choice.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
All of the following can be used to properly apportion cloud resources except ___________________.
A. Reservations
B. Shares
C. Cancellations
D. Limits
C. Cancellations
Explanation:
Cancellations is not a term used to describe a resource allotment methodology. All of the other options are such terms.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Which of the following is a method for apportioning resources that involves setting guaranteed minimums for all tenants/customers within the environment?
A. Reservations
B. Shares
C. Cancellations
D. Limits
A. Reservations
Explanation:
The question is the definition of reservations. Options B and D are also resource apportioning methods, but they do not fall under the definition described in the question. Option C is incorrect because it has no meaning in this context.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Which of the following is a method for apportioning resources that involves setting maximum usage amounts for all tenants/customers within the environment?
A. Reservations
B. Shares
C. Cancellations
D. Limits
D. Limits
Explanation:
The question describes limits.
Options A and B are also resource apportioning methods, but they do not fall under the definition described in the question. Option C is because it has no meaning in this context.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Which of the following is a method for apportioning resources that involves prioritizing resource requests to resolve contention situations?
A. Reservations
B. Shares
C. Cancellations
D .Limits
B. Shares
Explanation:
The question describes shares. Options A and D are also resource apportioning methods, but they do not fall under the definition described in the question. Option C is incorrect because it has no meaning in this context.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
A bare-metal hypervisor is Type ___________________.
A. 1
B. 2
C. 3
D. 4
A. 1
Explanation:
A bare-metal hypervisor is a Type 1 hypervisor. Option B describes another type of hypervisor; the other options are incorrect because there is no such thing as a Type 3 or Type 4 hypervisor.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
A hypervisor that runs inside another operating system (OS) is a Type ___________________ hypervisor.
A. 1
B. 2
C. 3
D .4
B. 2
Explanation:
The question describes a Type 2 hypervisor.
Option A describes another type of hypervisor; the other options are incorrect because there is no such thing as a Type 3 or Type 4 hypervisor.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
A Type ___________________ hypervisor is probably more difficult to defend than other hypervisors.
A. 1
B. 2
C. 3
D. 4
B. 2
Explanation:
A Type 2 hypervisor relies on the underlying operating system (OS) to operate properly; the underlying OS offers a large attack surface for aggressors. A Type 1 hypervisor boots directly from the hardware; it’s much easier to secure a machine’s Basic Input/Output System (BIOS) than an entire OS, so option B is better than option A. Options C and D are incorrect because there is no such thing as a Type 3 or Type 4 hypervisor.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
One of the security challenges of operating in the cloud is that additional controls must be placed on file storage systems because ___________________.
A. File stores are always kept in plain text in the cloud
B. There is no way to sanitize file storage space in the cloud
C. Virtualization necessarily prevents the use of application-based security controls
D. Virtual machines are stored as snapshotted files when not in use
D. Virtual machines are stored as snapshotted files when not in use
Explanation:
VMs are snapshotted and simply stored as files when they are not being used; an attacker who gains access to those file stores could ostensibly steal entire machines in highly portable, easily copied formats. Therefore, these cloud storage spaces must include a significant amount of controls. Options A and C are simply untrue. Option B is untrue when crypto-shredding is utilized.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
What is the main reason virtualization is used in the cloud?
A. Virtual machines (VMs) are easier to administer.
B. If a VM is infected with malware, it can be easily replaced.
C. With VMs, the cloud provider does not have to deploy an entire hardware device for every new user.
D. VMs are easier to operate than actual devices.
C. With VMs, the cloud provider does not have to deploy an entire hardware device for every new user
Explanation:
While options A and B are both also true, C is the most significant reason cloud data centers use VMs. If the cloud provider had to purchase a new box for every user, the cost of cloud services would be as much as running a traditional environment (or likely cost even more), and there would be no reason for any organization to migrate to the cloud, especially considering the risks associated with disclosing data to a third party. Option D is simply untrue. VMs are not easier to operate than actual devices.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Orchestrating resource calls is the job of the ___________________.
A. Administrator
B. Router
C. VM
D .Hypervisor
D .Hypervisor
Explanation:
The question describes what the hypervisor does. (Note that the answer “operating system” would also work here but was not one of the options.) Option A is incorrect; the allocation of resources is not performed manually. The router directs traffic between networks; it does not apportion resources. Therefore, option B is incorrect. A VM makes resource calls; option C is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Which of the following terms describes a cloud storage area that uses a filesystem/hierarchy?
A. Volume storage
B. Object storage
C. Logical unit number (LUN)
D. Block storage
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 64). Wiley. Kindle Edition.
B. Object storage
Explanation:
Object storage is, literally, a means of storing objects in a hierarchy such as a file tree. All the other options are terms used to describe cloud storage areas without file structures.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Typically, which form of cloud storage is used in the near term for snapshotted virtual machine (VM) images?
A. Volume storage
B. Object storage
C. Logical unit number (LUN)
D. Block storage
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 64). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 64). Wiley. Kindle Edition.
B. Object storage
Explanation:
Snapshotted VM images are usually kept in object storage, as files. All the other options are incorrect and option C is not a type of storage.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Who operates the management plane?
A. Regulators
B. End consumers
C. Privileged users
D. Privacy data subjects
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 64). Wiley. Kindle Edition.
C. Privileged users
Explanation:
Only the most trusted administrators and managers will have access to the cloud data center’s management plane. These will usually be cloud provider employees, but some cloud customer personnel may be granted limited access to arrange their organization’s cloud resources. Regulators do not operate a customer’s management plane, so option A is incorrect. Option B is ambiguous. However, a consumer of data is unlikely to have been given the elevated privileges necessary of operate the management plane in a cloud environment. Option B is incorrect. Option D is also an ambiguous answer. Only the most trusted administrators and managers have access to the cloud data center’s management plane. A privacy data subject is neither a most trusted administrator nor a trusted manager. Therefore, option D is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
What is probably the optimum way to avoid vendor lock-in?
A. Use nonproprietary data formats.
B. Use industry-standard media.
C. Use strong cryptography.
D. Use favorable contract language.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 64). Wiley. Kindle Edition.
D. Use favorable contract language.
Explanation:
The contract is probably the cloud customer’s best tool for avoiding vendor lock-in; contract terms will establish how easy it is to migrate your organization’s data to another provider in a timely, cost-effective manner. Options A and B are also important ways to avoid vendor lock-in, but D is the best answer. Option C is incorrect and will not aid in avoiding vendor lock-in.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Who will determine whether your organization’s cloud migration is satisfactory from a compliance perspective?
A. The cloud provider
B. The cloud customer
C. The regulator(s)
D. The Internet service provider (ISP)
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 65). Wiley. Kindle Edition.
C. The regulator(s)
Explanation:
The regulator(s) overseeing your industry/organization will make the final determination as to whether your cloud configuration is suitable to meet their requirements. It is best to coordinate with your regulator(s) when first considering cloud migration. Cloud providers, cloud customers, and ISPs are not particularly concerned about whether an organization’s migration is satisfactory from a compliance perspective. The words, The regulator(s) overseeing your industry/organization will make the final determination as to whether your cloud configuration is suitable to meet their requirements. It is best to coordinate with your regulator(s) when first considering cloud migration. Cloud providers, cloud customers, and ISPs are not particularly concerned about whether an organization’s migration is satisfactory from a compliance perspective. The words, “compliance perspective” should automatically bring to mind regulators.
Options A, B, and D are therefore incorrect answers.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
What is probably the best way to avoid problems associated with vendor lock-out?
A. Use strong contract language.
B. Use nonproprietary data and media formats.
C. Use strong cryptography.
D. Use another provider for backup purposes.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 65). Wiley. Kindle Edition.
D. Use another provider for backup purposes.
Explanation:
Vendor lock-out occurs when the provider suddenly leaves the market, as during a bankruptcy or acquisition. The risks associated with lock-out include denial of service, because of total unavailability of your data. The best way to handle these risks is to have another, full backup of your data with another vendor and the ability to reconstitute your operating environment in a time frame that doesn’t exceed your recovery time objective (RTO). The other options do not aid in addressing vendor lock-out.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
In a public cloud services arrangement, who creates governance that will determine which controls are selected for the data center and how they are deployed?
A. The cloud provider
B. The cloud customer
C. The regulator(s)
D. The end user
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 65). Wiley. Kindle Edition.
A. The cloud provider
Explanation:
Because the cloud provider owns and operates the cloud data center, the provider will craft and promulgate the governance that determines the control selection and usage. This is another risk the cloud customer must consider when migrating into the cloud; the customer’s governance will no longer have direct precedence over the environment where the customer’s data is located. Both the cloud customer and the regulator(s) may have specific control mandates that might require the customer to deploy additional security controls (at the customer side, within the data, as agents on the user devices, or on the provider side or in application programming interfaces [APIs] as allowed by the service model or contract), so options B and C are also partially true, but A is a better answer as it is more general. Option D untrue because the end user does not determine which controls are selected for the cloud data center and how they are deployed. That is the responsibility of the cloud provider.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
What is the term that describes the situation when a malicious user or attacker can exit the restrictions of a virtual machine (VM) and access another VM residing on the same host?
A. Host escape
B. Guest escape
C. Provider exit
D.Escalation of privileges
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 65). Wiley. Kindle Edition.
B. Guest escape
Explanation:
The question describes a guest escape.
Options A and C are other risks of operating in the cloud. Option D can lead to A or B, but B describes the more specific situation and therefore the correct answer.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
What is the term that describes the situation when a malicious user or attacker can exit the restrictions of a single host and access other nodes on the network?
A. Host escape
B. Guest escape
C. Provider exit
D. Escalation of privileges
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 65). Wiley. Kindle Edition.
A. Host escape
Explanation:
The question describes host escape. Options B and C are other risks of operating in the cloud. Option D can lead to A or B, but A is the more specific situation and therefore the correct answer.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
___________________ is/are probably the main cause of virtualization sprawl.
A. Malicious attackers
B. Lack of provider controls
C. Lack of customer controls
D. Ease of use
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 65). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 65). Wiley. Kindle Edition.
D. Ease of use
Explanation:
D. Because most cloud users don’t see direct costs in creating new VM instances (the bills usually go to a single point of contact in the organization, not the user or the user’s office), they may tend to create additional VMs at a significant rate, without realizing the attendant cost. This is largely because it is so easy to do and has no apparent cost, from their perspective.
All the other options do not cause virtualization sprawl.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 250). Wiley. Kindle Edition.
Sprawl is mainly a(n) ___________________ problem.
A. Technical
B. External
C. Management
D. Logical
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 66). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 66). Wiley. Kindle Edition.
C. Management
Explanation:
Sprawl needs to be addressed from a managerial perspective because it is caused by allowed user actions (usually in a completely authorized capacity). Options A and D mean the same thing and could be considered as contributing to sprawl because the technological capabilities of virtualization create the ease of use that can cause sprawl. However, option C is a better answer. Option B is incorrect; sprawl occurs within the organization.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 251). Wiley. Kindle Edition.
Which of the following risks exists in the traditional environment but is dramatically increased by moving into the cloud?
A. Physical security breaches
B. Loss of utility power
C. Financial upheaval
D. Man-in-the-middle attacks
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 66). Wiley. Kindle Edition.
D. Man-in-the-middle attacks
Explanation:
Because all cloud access is remote access, the risks to data in transit are dramatically heightened in the cloud. The other options exist in both the traditional environment and the cloud but are probably actually reduced in the cloud because cloud providers can use economies of scale to invest in means to reduce those risks in ways that individual organizations would not be able to.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 251). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 251). Wiley. Kindle Edition.
A fundamental aspect of security principles, ___________________ should be implemented in the cloud as well as in traditional environments.
A. Continual uptime
B. Defense in depth
C. Multifactor authentication
D. Separation of Duties
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 66). Wiley. Kindle Edition.
B. Defense in depth
Explanation:
Defense in depth, or layered defense, is perhaps the most fundamental characteristic of all security concepts. Options A and C are security aspects of some environments, and option A is likely to be a necessary trait of managed cloud services, but they are not fundamentals—they are specifics. Option D is specifically an administrative control; the question is looking for a fundamental aspect of security. Option B is more general (it applies to all types of security, in all industries and uses) and therefore is the correct choice for this question.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 251). Wiley. Kindle Edition.
From a security perspective, automation of configuration aids in ___________________.
A. Enhancing performance
B. Reducing potential attack vectors
C. Increasing ease of use of the systems
D. Reducing need for administrative personnel
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 66). Wiley. Kindle Edition.
B. Reducing potential attack vectors
Explanation:
A secure baseline configuration, applied and maintained automatically, ensures the optimum security footprint with the least attack surface. All the other options are benefits of automated configuration but are not specifically security enhancements.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 251). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 251). Wiley. Kindle Edition.
___________________ is the most prevalent protocol used in identity federation.
A. Hypertext Transfer Protocol (HTTP)
B. Security Assertion Markup Language (SAML)
C .File Transfer Protocol (FTP)
D .WS-Federation
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 66). Wiley. Kindle Edition.
B. Security Assertion Markup Language (SAML)
Explanation:
B. The Security Assertion Markup Language (SAML) is probably the most common protocol being used for identity federation at the moment. Options A and C are not identity federation protocols. Option D is a federation specification, but it also uses SAML tokens.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 251). Wiley. Kindle Edition.
A user signs on to a cloud-based social media platform. In another browser tab, the user finds an article worth posting to the social media platform. The user clicks on the platform’s icon listed on the article’s website, and the article is automatically posted to the user’s account on the social media platform. This is an example of what?
A. Single sign-on
B. Insecure direct identifiers
C. Identity federation
D .Cross-site scripting
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 66). Wiley. Kindle Edition.
C. Identity federation
Explanation:
Single sign-on (SSO) is similar to federation, but it is limited to a single organization; federation is basically SSO across multiple organizations. Option A is incorrect. Options B and D are threats listed in the Open Web Application Security Project (OWASP) Top Ten; they are incorrect.
A group of clinics decides to create an identification federation for their users (medical providers and clinicians). If they opt to review each other, for compliance with security governance and standards they all find acceptable, what is this federation model called?
A. Cross-certification
B. Proxy
C. Single sign-on
D. Regulated
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 67). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 67). Wiley. Kindle Edition.
A. Cross-certification
Explanation:
The cross-certification federation model is also known as a web of trust. Proxy is another model for federation, so option B is incorrect.
Single sign-on is similar to federation, but it is limited to a single organization; option C is incorrect. Option D does not have relevance in this context and therefore incorrect as an answer.
A group of clinics decides to create an identification federation for their users (medical providers and clinicians). If they opt to hire a third party to review each organization, for compliance with security governance and standards they all find acceptable, what is this federation model called?
A. Cross-certification
B. Proxy
C. Single sign-on
D.Regulated
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 67). Wiley. Kindle Edition.
B. Proxy
Explanation:
In the proxy federation model, the third party acts on behalf of the member organizations, reviewing each to ensure that they are all acceptable to the others. Cross-certification is another model for federation, so option A is incorrect. Single sign-on is similar to federation, but it is limited to a single organization; option C is incorrect. Option D does not have relevance in this context and is therefore incorrect as an answer.
A group of clinics decides to create an identification federation for their users (medical providers and clinicians). If they opt to use the web of trust model for federation, who is/are the identity provider(s)?
A .Each organization
B. A trusted third party
C. The regulator overseeing their industry
D. All of their patients
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 67). Wiley. Kindle Edition.
A .Each organization
Explanation:
In a web of trust federation model, all of the participating organizations are identity providers; each organization will assign identity credentials to its own authorized users, and all the other organizations in the federation will accept those credentials. A trusted third party, regulators, and clientele are not involved in the web of trust model, so the other options are incorrect.
A group of clinics decides to create an identification federation for their users (medical providers and clinicians). If they opt to use the web of trust model for federation, who is/are the service providers?
A. Each organization
B. A trusted third party
C .The regulator overseeing their industry
D. All of their patients
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 67). Wiley. Kindle Edition.
A. Each organization
Explanation:
In a web of trust model, each member organization usually supplies both the access/identification credentials and the resources that the users want to access, so the organizations are both the identity providers and service providers in a web of trust federation model. A trusted third party, regulators, and clientele are not involved in the web of trust model, so the other options are incorrect.
A group of clinics decides to create an identification federation for their users (medical providers and clinicians). In this federation, all of the participating organizations would need to be in compliance with what U.S. federal regulation?
A. Gramm-Leach-Bliley Act (GLBA)
B. Family and Medical Leave Act (FMLA)
C .Payment Card Industry Data Security Standard (PCI DSS)
D. Health Information Portability and Accountability Act (HIPAA)
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 67). Wiley. Kindle Edition.
D. Health Information Portability and Accountability Act (HIPAA)
Explanation:
While it’s likely the participating organizations will be subject to other federal regulations, HIPAA covers electronic patient information, so it will definitely be applicable in this case. GLBA covers financial and insurance service providers, so option A is incorrect.
FMLA dictates how employers give vacation time to employees, so option B is not correct. PCI DSS is a contractual, not regulatory, standard, so option C is incorrect.
What is the process of granting access to resources?
A. Identification
B. Authentication
C. Authorization
D. Federation
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 68). Wiley. Kindle Edition.
C. Authorization
Explanation:
The question describes authorization. Options A and B are part of the overall identity and access management (IAM) process, as is option C, but they do not specifically describe granting access to resources. Federation is a means of conducting IAM across organizations; option C is more specific, so D is incorrect.
The process of identity management includes all the following elements except ___________________.
A. Provisioning
B. Maintenance
C. Deprovisioning
D. Redaction
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 68). Wiley. Kindle Edition.
D. Redaction
Explanation:
Redacting is an editorial process of excising sensitive information from disclosed data. All the other options are elements of identity management.
Which organizational entity usually performs the verification part of the provisioning element of the identification process?
A. Information technology (IT)
B. Security
C. Human resources (HR)
D.Sales
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 68). Wiley. Kindle Edition.
C. Human resources (HR)
Explanation:
This is a complicated question and requires thinking through the portions of the identification process. Identification of personnel is usually verified during the hiring process, when HR checks identification documents (such as a passport or birth certificate) to confirm the applicant’s identity, often as part of a tax registration process. Options A and B include offices that may play a role in the identification process, but it is usually HR that does the actual verification. Option D, “Sales” is untrue. If a Sales department exists in an organization, it does not perform the verification part of the provisioning element of the identification process.
Of the following options, which is a reason cloud data center audits are often less easy to verify than traditional audits?
A. Data in the cloud can’t be audited.
B. Controls in the cloud can’t be audited.
C. Getting physical access can be difficult.
D. There are no regulators for cloud operations.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 68). Wiley. Kindle Edition.
C. Getting physical access can be difficult.
Explanation:
Cloud providers may be reluctant to grant physical access, even to their customers, on the assumption that allowing access would disclose information about security controls. In some cases, cloud customers won’t even know the location(s) of the data center(s) where their data is stored. The other options are all untrue. Data in the cloud and controls in the cloud can most certainly be audited. So, options A and B are incorrect. D is untrue; there are regulators for all industries, including those that operate in the cloud.
Of the following options, which is a reason cloud data center audits are often less easy to verify than traditional audits?
A. Cryptography is present.
B. Auditors don’t like the cloud.
C. Cloud equipment is resistant to audit.
D. They often rely on data the provider chooses to disclose.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 68). Wiley. Kindle Edition.
D. They often rely on data the provider chooses to disclose.
Explanation:
In many circumstances, a cloud audit will depend on which information a cloud provider discloses, which makes auditing difficult and less trustworthy. Option A is incorrect because cryptography is sometimes present in traditional environments and audits still take place. Option B is incorrect; auditors’ opinions are not relevant. Option C is untrue; equipment does not resist auditing—it is inanimate and unfeeling.
Of the following options, which is a reason cloud data center audits are often less easy to verify than audits in standard data centers?
A. They frequently rely on third parties.
B. The standards are too difficult to follow.
C. The paperwork is cumbersome.
D .There aren’t enough auditors.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 68). Wiley. Kindle Edition.
A. They frequently rely on third parties.
Explanation:
Because cloud audits are often the result of third-party assertions, recipients of cloud audit reports may be more skeptical of the results than they would have been of traditional audits, in which the recipients may have performed firsthand. Option B is untrue. The difficulty of standards is not a hindrance to audit. Option C is untrue. Paperwork does not hinder audits.
Option D is not only untrue, but also hilarious. If you have ever been involved in an audit, you know that there are plenty of auditors to go around.
The cloud customer will usually not have physical access to the cloud data center. This enhances security by ___________________.
A. Reducing the need for qualified personnel
B. Limiting access to sensitive information
C. Reducing jurisdictional exposure
D. Ensuring statutory compliance
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 69). Wiley. Kindle Edition.
B. Limiting access to sensitive information
Explanation:
B. The “sensitive information,” in this case, is whatever knowledge of the data center’s security controls and processes might be gathered by physically visiting the data center. Even though a cloud customer cannot get access to the facility, this also means that other cloud customers (some of whom may be inimical to another customer’s interests) also will not have access, so none would have advantage over the other(s). Option A is incorrect because qualified personnel are still required whether a cloud environment has limited access to their data center or not. In fact, security may be degraded by having unqualified personnel rather than qualified personnel working in the cloud data center. Option C is incorrect because reducing jurisdictional exposure does not enhance security. There may be a correlation between ensuring statutory compliance and enhancing security as it applies to limiting access to the cloud data center. However, option B is a better answer because it is certainly true. Therefore, option D is not the best answer to the question.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 253). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 253). Wiley. Kindle Edition.
Which of the following controls would be useful to build into a virtual machine baseline image for a cloud environment?
A. GPS tracking/locator
B. Automated vulnerability scan on system startup
C. Access control list (ACL) of authorized personnel
D .Write protection
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 69). Wiley. Kindle Edition.
B. Automated vulnerability scan on system startup
Explanation:
Because VMs don’t take updates when they are not in use (snapshotted and saved as image files) and updates may be pushed while the VMs are saved, it’s important to ensure that they receive updates when they are next instantiated. A physical tracking mechanism won’t be of much aid for virtual devices because they aren’t physically stolen like hardware boxes, so option A is incorrect. Having an ACL in the image baseline would create a situation where every user from every cloud customer could access every VM in the data center; option C is incorrect. Write protection is used in forensic analysis of machines (virtual or otherwise); it would not be useful in an operational baseline. Option D is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 253). Wiley. Kindle Edition.
Which of the following controls would be useful to build into a virtual machine baseline image for a cloud environment?
A. Automatic registration with the configuration management system
B. Enhanced user training and awareness media
C. Mechanisms that prevent the file from being copied
D .Keystroke loggers
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 69). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 69). Wiley. Kindle Edition.
A. Automatic registration with the configuration management system
Explanation:
Version control can be difficult in a virtual environment because saved VMs don’t receive updates. Ensuring that each VM is the correct version is a function of configuration management (CM), and CM controls can be built into the baseline. Each organization will have its own training and awareness program, and there is no one-size-fits-all solution that is appropriate; this does not belong in the baseline. Option B is incorrect. Having a baseline that cannot be copied is pointless; option C is incorrect. Keystroke loggers will create a huge volume of detailed, stored data that will pose more of a security risk (and may actually be a violation of customer privacy regulations) than any benefit it offers; option D is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 254). Wiley. Kindle Edition.
Virtual machine (VM) configuration management (CM) tools should probably include ___________________.
A. Biometric recognition
B. Anti-tampering mechanisms
C. Log file generation
D. Hackback capabilities
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 69). Wiley. Kindle Edition.
C. Log file generation
Explanation:
Event logging is essential for incident management and resolution; this can be set as an automated function of the CM tools. Not all systems need or can utilize biometrics; option A is incorrect. Usually, tampering refers to physical intrusion of a device; since the question is about VMs, it is probably not applicable. Option B is incorrect. Hackback is illegal in many jurisdictions; option D is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 254). Wiley. Kindle Edition.
Using a virtual machine baseline image could be very useful for which of the following options?
A. Physical security
B. Auditing
C. Training
D. Customization
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 69). Wiley. Kindle Edition.
B. Auditing
Explanation:
A specified configuration built to defined standards and with a controlled process can be used to demonstrate that all VMs within an environment include certain controls; this can greatly enhance the efficiency of an audit process.
The VM’s image has very little to do with physical security or training; options A and C are incorrect. Baseline images are the opposite of customization; option D is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 254). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 254). Wiley. Kindle Edition.
What can be revealed by an audit of a baseline virtual image, used in a cloud environment?
A. Adequate physical protections in the data center
B. Potential criminal activity before it occurs
C. Whether necessary security controls are in place and functioning properly
D. Lack of user training and awareness
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 69). Wiley. Kindle Edition.
C. Whether necessary security controls are in place and functioning properly
Explanation:
The baseline will contain the suite of security controls applied uniformly throughout the environment. A VM image audit is unlikely to involve any form of physical security; A is incorrect. Baselines won’t predictively show malicious activity; B is incorrect. Baselines also do not have anything to do with user training and awareness; option D is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 254). Wiley. Kindle Edition.
Using one cloud provider for your operational environment and another for your BC/DR backup will also give you the additional benefit of ___________________.
A. Allowing any custom VM builds you use to be instantly ported to another environment
B. Avoiding vendor lock-in/lock-out
C. Increased performance
D. Lower Cost
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 70). Wiley. Kindle Edition.
B. Avoiding vendor lock-in/lock-out
Explanation:
Having an additional backup with a different provider means that if your primary provider becomes unusable for any reason (including bankruptcy or unfavorable contract terms), your data is not held hostage or lost. Custom VMs may or may not work in a new environment; this is actually a risk when porting data out of the production environment; option A is incorrect. Performance probably will not increase if data is replicated to another cloud provider; in fact, you will probably lose some load balancing capability you might have had if you kept the data and backups together. Option C is incorrect. Having two providers will always be more costly than a
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 254). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 254). Wiley. Kindle Edition.