Chapter5 Flashcards
1. According to the Cloud Security Alliance (CSA), which of the following domains deals with privacy and regulatory requirements as well as security breach disclosure law? A. compliance and audit B. legal and electronic discovery C. data center operations D. virtualization
B. legal and electronic discovery
- According to the Cloud Security Alliance (CSA), which of the following domains deals with the identification and control of data in the cloud?
A. information lifecycle management
B. portability and interoperability
C. application security
D. traditional security, business continuity and disaster recovery
A. information lifecycle management
- According to the Cloud Security Alliance (CSA), which of the following domains deals with the issues encountered when extending an organization’s identity into the cloud?
A. incident response, notification and remediation
B. application security
C. identity and access management
D. legal and electronic discovery
C. identity and access management
4. According to the Cloud Security Alliance (CSA), which of the following domains looks at the ability to move data/services from one provider to another. A. identity and access management B. encryption and key management C. application security D. portability and interoperability
D. portability and interoperability
- Which of the following is a governance recommendation for organizations considering cloud computing?
A. Metrics for determining performance and efficacy should be established before moving into the cloud.
B. Collaborative governance structures between customers and providers should be identified as necessary.
C. A portion of the savings from cloud computing should be invested into auditing the security of the service provider.
D. All of the above.
D. All of the above.
- Which of the following statements regarding governance in cloud computing is NOT true?
A. Security metrics and standards should be included in service level agreements and contracts.
B. Both customers and providers should develop robust governance if an infrastructure as service (IaaS) model is being used.
C. Deployment models define accountability and expectations of users and providers.
D. Provider’s information security controls should be risk-based.
B. Both customers and providers should develop robust governance if an
infrastructure as service (IaaS) model is being used.
With many cloud computing deployments, which of the following plays a large role in risk management? A. contract requirements B. service level agreements C. provider documentation D. all of the above
D. all of the above
8. Certain cloud service providers may restrict which of the following? A. penetration testing B. access to audit logs C. vulnerability assessments D. all of the above
D. all of the above
The risk management approach for organizations moving to the cloud should include all of the following, EXCEPT:
A. development of risk treatment plans with a universal response option
B. identification and analysis of threats and vulnerabilities
C. identification and valuation of assets
D. outcomes of risk treatment plans included in service agreements
A. development of risk treatment plans with a universal response option
Aligning exposure to risk and capability of managing it with the risk tolerance of the data owner is referred to as: A. information treatment planning B. information risk management C. information lifecycle management D. information development design
B. information risk management
The primary means of decision support for information technology resources is: A. information lifecycle management B. information risk management C. risk comparison management D. both A and B
B. information risk management
. Information risk decisions are informed by which of the following data? A. information usage B. security controls C. access controls D. all of the above
D. all of the above
When utilizing SaaS (software as a service), the majority of information is provided by: A. the user B. the service provider C. the organization D. the governance body
B. the service provider
14. Information transparency is built into the contact language when using: A. software as a service B. platform as a service C. infrastructure as a service D. both A and C
C. infrastructure as a service
15. The ability to deploy and gather information from controls is important when using: A. software as a service B. platform as a service C. infrastructure as a service D. all of the above
B. platform as a service