chapter6 Flashcards
According to the Cloud Security Alliance (CSA), the cloud services agreement must allow the client or third party to:
A. have reasonable security that data breaches will not happen.
B. monitor the service provider’s performance and test for system vulnerabilities.
C. retain ownership of the data in original format.
D. adjust the process for responding to legal requests at any time.
B. monitor the service provider’s performance and test for system vulnerabilities.
According to the Cloud Security Alliance (CSA), the cloud customer must understand:
A. the provider’s ability to produce evidence needed for compliance.
B. the division of compliance responsibilities between consumer and provider.
C. the customer’s role in bridging the gap between auditor and service provider.
D. all of the above.
D. all of the above.
According to the Cloud Security Alliance (CSA), which of the following clauses should be obtained whenever possible? A. Right to Audit Clause B. Right to Withdraw Clause C. Security Breach Clause D. Data Transferability Clause
A. Right to Audit Clause
Over time, the right to audit clause should be:
A. increased
B. reduced
C. replaced with the compliance and monitoring clause
D. both B and C
B. reduced
Cloud service customers should develop evidence-collecting processes for which of the following areas? A. system configurations B. audit logs C. change management reports D. all of the above
D. all of the above
Which of the following audits ensures that controls are implemented and documented? A. SAS 70 Type I B. SAS 70 Type II C. SAS 70 Type III D. CSA SaaS v.2
B. SAS 70 Type II
According to the Cloud Security Alliance (CSA), cloud service providers should use which of the following as a guideline? A. ISO/IEC 27000 B. ISO/IEC 27001 C. ISO/IEC 27002 D. ISO/IEC 35000
B. ISO/IEC 27001
. Cloud providers that have not achieved ISO/IEC 27001 certification should align themselves with: A. ISO/IEC 27000 B. ISO/IEC 27002 C. SAS 70 practices D. CSA SaaS v.2
B. ISO/IEC 27002
The Data Security Lifecycle is made up of: A. four phases B. six phases C. ten phases D. twelve phases
B. six phases
All of the following are challenges relating to data lifecycle security in the cloud, EXCEPT: A. authentication B. non-repudiation C. anonymity D. availability
C. anonymity
Which of the following is NOT a phase of the Data Security Lifecycle? A. use B. distribute C. create D. archive
B. distribute
Which of the following phases in the Data Security Lifecycle would involve assigning rights? A. create B. destroy C. share D. all of the above
A. create
Which of the following phases in the Data Security Lifecycle would involve crypto-shredding? A. archive B. store C. use D. destroy
D. destroy
14. Which of the following phases in the Data Security Lifecycle would involve rights management? A. store and use B. create and destroy C. use and share D. archive and destroy
A. store and use
Which of the following phases in the Data Security Lifecycle would involve encryption? A. store B. share C. archive D. all of the above
D. all of the above