Chapter 4 - Cloud Data Security Flashcards

1
Q

All of the following are terms used to describe the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except:

A. Tokenization
B. Data discovery
C. Obfuscation
D. Masking

A

B. Data discovery is a term used to describe the process of identifying information according to specific traits or categories. The rest are all methods for obscuring data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The goals of SIEM solution implementation include all of the following, except:

A. Centralization of log streams
B. Trend analysis
C. Dashboarding
D. Performance enhancement

A

D. SIEM does not intend to provide any enhancement of performance; in fact, a SIEM solution may decrease performance because of additional overhead. All the rest are goals f SIEM implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The goals of DLP solution implementation include all of the following, except:

A. Policy enforcement
B. Elasticity
C. Data discovery
D. Loss of mitigation

A

B. DLP does not have anything to do with elasticity, which is the capability of the environment to scale up or down according to demand. All the rest are goals of DLP implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DLP solutions can aid in deterring loss due to which of the following?

A. Randomization
B. Inadvertent disclosure
C. Natural disaster
D. Device failure

A

B. DLP solutions may protect against inadvertent disclosure. Randomization is a technique for obscuring data, not a risk to data. DLP tools will not protect against risks from natural disasters, or against impacts due to device failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DLP solutions can ad in deterring loss due to which of the following?

A. Malicious disclosure
B. Performance issues
C. Bad policy
D. Power failure

A

A. DLP tools can identify outbound traffic that violates the organization’s policies. DLP will not protect against losses due to performance issues or power failures. The DLP solution must be configured according to the organization’s policies, so bad policies will attenuate the effectiveness of DLP tools, not the other way around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the experimental technology that might lad to the possibility of processing encrypted data without having to decrypt it first?

A. AES
B. Link encryption
C. Homomorphic encryption
D. One-time pads

A

C. AES is an encryption standard. Link encryption is a method for protecting communications traffic. One-time pads are an encryption method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proper implementation of DLP solutions for successful function requires which of the following?

A. Accurate data categorization
B. Physical access limitations
C. USB connectivity
D. Physical presence

A

A. DLP tools need to be aware of which information to monitor and which requires categorization (usually done upon data creation, by the data owners). DLPs can be implemented with or without physical access or presence. USB connectivity has nothing to do with DLP solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tokenization required two distinct_____________.

A. Authentication factors
B. Databases
C. Encryption keys
D. Personnel

A

B. In order to implement tokenization, there will need to be two databases: the database containing the raw, original data, and the token database containing tokens that map to original data. Having two-factor authentication is nice, but certainly not required. Encryption keys are not necessary for tokenization. Two-person integrity has nothing to do with tokenization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data masking can be used to provide all of the following functionality, except:

A. Secure remote access
B. Enforcing least privilege
C. Test data in sandboxed environments
D. Authentication of privileged user

A

D. Data masking does not support authentication in any way. All the others are excellent uses cases for data masking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DLP can be combined with what other security technology to enhance data controls?

A. DRM
B. SIEM
C. Kerberos
D. Hypervisors

A

A. DLP can be combined with DRM to protect intellectual property; both are designed to deal with data that falls into special categories. SIEMs are used to monitoring even logs, not live data movement. Kerberos is an authentication mechanism. Hypervisors are used for virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the US State Department controls on technology exports knows as?

A. ITAR
B. EAR
C. EAL
D. DRM

A

B. ITAR is a Department of State program. Evaluation assurance levels are part of the Common Criteria standard from ISO. Digital rights management tools are used for protecting electronic processing of intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the US Commerce Department controls on technology exports known as?

A. ITAR
B. EAR
C. EAL
D. DRM

A

A. EAR is a Commerce Department program. Evaluation assurance levels are part of the Common Criteria standard from ISO. Digital rights management tools are used for protecting electronic processing of intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptographic keys for encrypted data stored in the cloud should be_______________.

A. At least 128 bits long
B. Not stored wit the cloud provider
C. Split into groups
D. Generated with redundancy

A

B. Cryptographic keys should not be stored along with the data they secure, regardless of key length. We don’t split crypto keys or generate redundant keys (doing so would violate the principle of secrecy necessary for keys to serve their purpose).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Best practices for key management include all of the following, except:

A. have key recovery process
B. Maintain key security
C. Pass keys out of band
D. Ensure multifactor authenitication

A

D. We should do all of these except for requiring multifactor authentication, which is pointless in key managment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptographic keys should be secured

A. To a level at least as high as the data hey can decrypt
B. In vaults
C. By armed guards
D. With two-person integrity

A

A. The physical security of crypto keys is of some concern, but guards or vaults are not always necessary. Tw-person integrity might be a good practice for protecting keys. The best answer to this questions is option A, because it is always true, whereas the remaining options depend on circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When crafting plans and policies for data archiving, we should consider all of the following, except:

A. Archive location
B. The backup process
C. The format of the data
D. Immediacy of the technology

A

D. All of these things should be considered when creating data archival policies, except option D, which is a nonsense term.

17
Q

What is the correct order of the phases of the data life cycle?

A. Create, Store, Use, Archive, Share, Destroy
B. Create, Store, Use, Share, Archive, Destroy
C. Create, Use, Store, Share, Archive, Destroy
D. Create, Archive, Store, Share, Use, Destroy

A

B. The other options are the names of the phases, but out of proper order.

18
Q

What are the third-party providers of IAM functions for the cloud environment?

A. DLPs
B. CASBs
C. SIEMs
D. AESs

A

B. Data loss, leak prevention, and protection is a family of tools used to reduce the possibility of unauthorized disclosure of sensitive information. SIEMs are tools sued to collate and manage log data. AES is an encryption standard.

19
Q

What is a cloud storage architecture that manages the data in a hierarchy of files?

A. Object-based storage
B. File-based storage
C. Database
D. CDN

A

B. Object-based storage stores data as objects in a volume, with labels and metadata. Databases store data in fields, in a relational motif. A CDN stored data in caches of copied content near location of high demand.

20
Q

What is a cloud storage architecture that manages the data in caches of copied content close to locations of high demand?

A. Object-based storage
B. File-based storage
C. Database
D. CDN`

A

D. Object-based storage stores dat as objects in a volume, with labels an metadata. File-based is a cloud storage architecture that manages the data in a hierarchy of files. Databases store data in fields, in a relational motif.

21
Q

What technique is used to obscure data in the cloud?

A. Shuffling
B. Anonymization
C. Disassembling
D. Expunging

A

B. Anonymization is a technique used to obscure data.