chapter 8 Flashcards

1
Q

Audits of cloud service providers should:
A. be done by the customer only
B. be done by an external third-party only
C. be done regardless of the provider’s certifications
D. be waived, if the provider has adequate certifications

A

C. be done regardless of the provider’s certifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
According to the Cloud Security Alliance (CSA), all cloud providers should demonstrate compartmentalization of all the following, EXCEPT:
A. systems
B. provisioning
C. personnel
D. resources
A

D. resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Improvements in which of the following areas would lead to improvements for all cloud service customers?
A. tools
B. policies
C. processes
D. all of the above
A

D. all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The nature of cloud computing means that it is more difficult to:
A. ensure adequate resource division.
B. determine who to contact in case of a security incident or data breach.
C. make commitments to customers regarding security.
D. all of the above.

A

B. determine who to contact in case of a security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
SOC refers to:
A. strategic overview card
B. standard operations credentials
C. security operations center
D. service office catalogue
A

C. security operations center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a cloud environment, the number of sources that must be monitored:
A. are the same as in any other computing environment.
B. increase minimally.
C. decrease substantially.
D. increase exponentially.

A

D. increase exponentially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a cloud environment, the number of security notifications:
A. are the same as in any other computing environment.
B. increase minimally.
C. decrease substantially.
D. increase exponentially.

A

D. increase exponentially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Suspicious intrusion detection alerts would be defined as:
A. events
B. incidents
C. risks
D. none of the above
A

D. none of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Data breaches would be defiend as:
A. incidents
B. disasters
C. events
D. none of the above
A

D. none of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SIEM refers to:
A. Security Information and Event Management
B. Strategic Implementation of Electronic Management
C. Service Improvement in End-user Markets
D. Software Intrusion and External Models

A

A. Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A well-maintained SIEM process can assist the:
A. SOC
B. RTO
C. VSP
D. all of the above
A

A. SOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to the Cloud Security Alliance (CSA), incident containment is a race between:
A. litigation and settlement
B. damage control and evidence gathering
C. evidence gathering and security improvement
D. crowd control and image manufacturing

A

B. damage control and evidence gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

According to the Cloud Security Alliance (CSA), effective containment approaches focus on:
A. legislation and regualtions
B. best practices
C. the confidentiality-integrity-availability triad
D. physical controls

A

C. the confidentiality-integrity-availability triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Cloud computing affects which of the following aspects of the software development lifecycle (SDLC)?
A. application architecture
B. development
C. quality assurance
D. all of the above
A

D. all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
SOA refers to:
A. service-oriented architecture
B. strategic objective application
C. secondary overview ability
D. security-orientation application
A

A. service-oriented architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
When looking at software development lifecycle (SDLC) security in a cloud environment, there are:
A. two main areas of differentiation.
B. three main areas of differentiation.
C. four main areas of differentiation.
D. five main areas of differentiation.
A

B. three main areas of differentiation.

17
Q
17. The presence of trusted virtual machine images is a key success factor for:
A. software as a service
B. platform as a service
C. infrastructure as a service
D. all of the above
A

C. infrastructure as a service

18
Q
The ability to segment ESBs (enterprise service buses) is not available in which of the following environments?
A. software as a service
B. platform as a service
C. infrastructure as a service
D. both B and C
A

B. platform as a service

19
Q

Encrypting data while in transit over networks:
A. is only possible in SaaS environments
B. is far simpler in SaaS and PaaS environments than in IaaS environments
C. is only possible in IaaS environments
D. can be implemented with equal ease in SaaS, PaaS and IaaS environments

A

D. can be implemented with equal ease in SaaS, PaaS and IaaS environments

20
Q

Encrypting data at rest is most common within which of the following environments?

A. software as a service
B. platform as a service
C. infrastructure as a service
D. all of the above

A

C. infrastructure as a service

21
Q
Ideally, cloud service providers should implement which of the following transparently?
A. encrypting data in transit
B. encrypting data at rest
C. encrypting data on backup media
D. encrypting dynamic data
A

C. encrypting data on backup media

22
Q

In terms of key management, an entity that uses a given key:
A. should also be the entity that stores the key.
B. should not be the entity that stores the key.
C. should be responsible for creating and storing the key.
D. should destroy it as soon as possible.

A

B. should not be the entity that stores the key.

23
Q
Which of the following standards cover storage encryption?
A. IEEE 1619.3
B. OASIS
C. KMIP
D. both B and C
A

A. IEEE 1619.3

24
Q

Built-in authentication services are generally provided in which of the following environments?

A. software as a service
B. platform as a service
C. infrastructure as a service
D. both A and B

A

D. both A and B

25
Q
One-time passwords, biometrics and Kerberos are all examples of:
A. weak authentication
B. limited authentication
C. strong authentication
D. impenetrable authentication
A

C. strong authentication