chapter 8 Flashcards
Audits of cloud service providers should:
A. be done by the customer only
B. be done by an external third-party only
C. be done regardless of the provider’s certifications
D. be waived, if the provider has adequate certifications
C. be done regardless of the provider’s certifications
According to the Cloud Security Alliance (CSA), all cloud providers should demonstrate compartmentalization of all the following, EXCEPT: A. systems B. provisioning C. personnel D. resources
D. resources
Improvements in which of the following areas would lead to improvements for all cloud service customers? A. tools B. policies C. processes D. all of the above
D. all of the above
The nature of cloud computing means that it is more difficult to:
A. ensure adequate resource division.
B. determine who to contact in case of a security incident or data breach.
C. make commitments to customers regarding security.
D. all of the above.
B. determine who to contact in case of a security
SOC refers to: A. strategic overview card B. standard operations credentials C. security operations center D. service office catalogue
C. security operations center
In a cloud environment, the number of sources that must be monitored:
A. are the same as in any other computing environment.
B. increase minimally.
C. decrease substantially.
D. increase exponentially.
D. increase exponentially.
In a cloud environment, the number of security notifications:
A. are the same as in any other computing environment.
B. increase minimally.
C. decrease substantially.
D. increase exponentially.
D. increase exponentially.
Suspicious intrusion detection alerts would be defined as: A. events B. incidents C. risks D. none of the above
D. none of the above
Data breaches would be defiend as: A. incidents B. disasters C. events D. none of the above
D. none of the above
SIEM refers to:
A. Security Information and Event Management
B. Strategic Implementation of Electronic Management
C. Service Improvement in End-user Markets
D. Software Intrusion and External Models
A. Security Information and Event Management
A well-maintained SIEM process can assist the: A. SOC B. RTO C. VSP D. all of the above
A. SOC
According to the Cloud Security Alliance (CSA), incident containment is a race between:
A. litigation and settlement
B. damage control and evidence gathering
C. evidence gathering and security improvement
D. crowd control and image manufacturing
B. damage control and evidence gathering
According to the Cloud Security Alliance (CSA), effective containment approaches focus on:
A. legislation and regualtions
B. best practices
C. the confidentiality-integrity-availability triad
D. physical controls
C. the confidentiality-integrity-availability triad
Cloud computing affects which of the following aspects of the software development lifecycle (SDLC)? A. application architecture B. development C. quality assurance D. all of the above
D. all of the above
SOA refers to: A. service-oriented architecture B. strategic objective application C. secondary overview ability D. security-orientation application
A. service-oriented architecture