Chapter 4 Implementing Cloud Security Flashcards

1
Q

The process of organizing information into different tiers or categories is referred to as ___ ___ ?

A

Data Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dividing your cloud fleet of servers into smaller discrete areas for the purpose of applying a granular security policy is known as ___ ?

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data that is obfuscated on a RAID 5 storage is ___ ___ encryption.

A

At rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multifactor authentication includes something you ___ and something you ___.

A

know, have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hands-off programmatically driven cloud configuration change is commonly referred to as ___.

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ allow for a defined machine-to-machine software interaction to enable automation.

A

API (application programming interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ___ ___ ___ is a user-friendly front end interface to a service’s APIs.

A

Graphical User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network-based ___ ___ ___ take active security breach counter-measures.

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud-based security places a load on a virtual machine’s ___?

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security ___ can allow code to replace many processes that had to be performed manually in the past

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Robert has been asked to create a security implementation that segments his employer's e-commerce design to allow for policy enforcement.  What are some of the the areas that he is investigating? (Choose three).
A.  Network
B.  Automation
C.  Storage
D. Compute
E.  APIs
F.  JSON/XML
A

Network, Storage, Compute

Cloud segmentation is the process of dividing up your cloud deployment into sections that allow for granular security. Common segments include compute, network, and storage.
APIs, JSON, and XML are software constructs to enable automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
MFA tokens can be obtained where?
(Choose two)
A.  Python app
B.  Smartphone app
C.  Automation systems
D.  Keyfob
E.  Cloud vendor management dashboard
A

Smartphone app, Keyfob

One-time numerical tokens are generated on keyfob hardware devices and smartphone soft-token applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Hank just completed running some security automation scripts on his new fleet of application virtual machines.  After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his management dashboard?
A.  DMA
B.  BIOS
C.  CPU
D.  IPSec
E.  I/O
A

CPU

Applying security applications on a virtual server will cause an increase in CPU usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What technology was instrumental in the growth of cloud services?
A.  XML
B.  Python
C.  Automation
D.  Authentication
E.  Scripting
F.  workflow services
G.  Encryption
A

Automation

Automation of cloud deployments was instrumental in the growth of cloud-based services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Carl is planning his cloud migration and must meet HIPPA requirements for confidential storage of cloud data at rest and in use in the cloud.  What services must be addressed by Carl?  (Choose two.)
A.  Virtual private network
B.  Storage
C.  Client-side
D.  Database
A

Storage, Database

Storage systems and database applications are both examples of data at rest or being processed in the cloud. While VPNs and client encryption are valid security systems, they are not associated with your internal cloud security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
What is a common cloud-based GUI used to get an overview of your security operations?
A.  Puppet automation
B.  Gemalto system
C.  Dashboard
D.  Vendor-based security appliance
A

Dashboard

A dashboard is a graphical portal that provides updates and an overview of operations.

17
Q
Who does responsibility for stored data integrity in the cloud belong to?
A.  Cloud provider
B.  Compliance agency
C.  Cloud customer
D.  Shared responsibility
A

Cloud customer

Ultimately the responsibility for data in the cloud belongs to the organization that owns the data.

18
Q
What are complex software systems that automate cloud operations and are offered by companies such as Chef and Puppet called?
A.  Authentication
B.  Federations
C.  Orchestration
D.  Ephemeral
A

Orchestration

Orchestration systems are software packages or services that automate cloud operations.

19
Q
RESTful APIs using XML and JSON on southbound interfaces can be used to orchestrate and automate what cloud-based services? (Choose all that apply.)
A.  Firewalls
B.  Load balancers
C.  Virtual machines
D.  DNS servers
E.  Durable storage volumes
A

All of the above

All of these cloud services have APIs that can be accessed for configuration and monitoring using standard RESTful XML and/or JSON interfaces.

20
Q
Jim has a critical server in the application tier of his cloud-based deployment.  He is looking at a device-specific security solution to add defense-in-depth capabilities to his currently deployed network-based security defenses.  He has been researching ways to mitigate potential hacking attempts.  What is a good solution for him?
A.  DMZ
B.  IDS
C.  IPS
D.  Classification automation
E.  HIDS
A

HIDS

A host intrusion detection system (HIDS) is a software that monitors the device on which it is installed to identify deviations from an established security policy.

21
Q
A constantly changing six-digit numerical token is used in what type of cloud service?
A.  XML
B.  TLS
C.  SSL
D.  MFA
E.  JSON
A

MFA

Multifactor authentication (MFA) services use a token that is generated on a schedule and can be a numerical value. The other answers offered are not valid to the question.

22
Q
Samantha has been asked to meet FedRamp compliance for her customer's new contract.  Where should she integrate compliance in her project?  (Choose four.)
A.  Hand-off
B.  Design
C.  Implementation
D.  Automation rollout
E.  Planning
F.  Validation
G.  HIDS
H.  JSON/XML scripting
A

Planning, Design, Implementation, Validation

All compliance requirements should be integrated into the complete life cycle of a project including the design, planning, implementation and validation phases of the project.

23
Q
Sharon is investigating a standards-based construct to enable automation on her load balancers.  What is a good lightweight data-interchange format standard that is easily readable and for computing systems to parse and to generate? (Choose two.)
A.  XML
B.  JSON
C.  REST
D.  Python
A

XML, JSON

Extensible Markup Language (XML) and JavaScript Object Notation (JSON) provide a flexible way to describe data and create information formats and electronically share structured data between computing systems. Both are lightweight data-interchange formats that are easily readable for computing systems to parse and to generate.

24
Q
Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro segmentation deployments. When reading the documentation, Sam notices a link to download a Java-based application to monitor and configure the IPS.  What kind of automation system is this?
A.  CLI
B.  GIU
C.  Vendor based
D.  API
E.  RESTful
A

Vendor based

Based on the information given, the description is for a vendor-based management application.

Vendors will publish a document detailing their APIs interfaces and how to interact with their products programmatically for automation and management.
(page 138)

25
Q
Hank works in his e-commerce company's IT security group and has been tasked to investigate options that will allow customers to securely access their personal records stored on the cloud deployment for their smartphones.  What is the most common in-flight e-commerce security posture on the market?
A.  MD5
B.  SSL/TLS
C.  IPSec
D.  VPN
A

SSL/TLS

SSL/TLS security is the most common remote access encryption technology and is commonly used in browsers and smartphone applications. MD5 is a hash algorithm, and IPSec is a security framework; they do not apply to the question. VPNs are not as common as SSL/TLS for the scenario given.

26
Q
Cloud segmentation enhances security for cloud-based applications.  What services is is a best practice to segment?
A.  Python
B.  Compute
C.  RAM
D. VPN
A

Compute

It is considered a best practice to group compute resources into like segments and apply security to the segment.

27
Q
What is a long-standing text-based interface that is used to configure network services both locally and remotely?
A.  GUI
B.  CLI
C.  REST
D.  SNMP
E.  API
A

CLI

The command-line interface (CLI)is a text-based interface to most network services that allows for remote and local configurations.

28
Q

Sid is a security engineer at a large public cloud company. He is implementing a new security service that tracks activity across the network and actively shuts down malicious activity. What security application is he implementing?

A

Intrusion prevention system

29
Q

Charles wants to offer his user base a selection of two-factor authentication solutions. What two options are there?

A

Key fob and smartphone

30
Q

Beth is asking you if there is a website that shows a high-level overview of her cloud deployment. What is this called?

A

Dashboard

31
Q

Trevor is implementing a security application that operates in each web server that faces the Internet. He wants to track malicious attacks. What solution is he implementing?

A

Hot intrusion detection system

32
Q

What intrusion system will monitor but not act on Internet-based attack?

A

IDS

Intrusion Detection system

33
Q

What is storage that does not survive a VM restart called?

A

Ephemeral

34
Q

What backend cloud systems allow for on-demand provisioning of services?

A

Automation

35
Q

What cloud service contains an ordered rule set that contains permit and deny statements and is used to protect cloud-based devices?

A

Firewall

36
Q

What is a software-controlled machine-to-machine interface called

A

Application programmable interface (API)