chapter6 Flashcards
According to the Cloud Security Alliance (CSA), the cloud services agreement must allow the client or third party to:
A. have reasonable security that data breaches will not happen.
B. monitor the service provider’s performance and test for system vulnerabilities.
C. retain ownership of the data in original format.
D. adjust the process for responding to legal requests at any time.
B. monitor the service provider’s performance and test for system vulnerabilities.
According to the Cloud Security Alliance (CSA), the cloud customer must understand:
A. the provider’s ability to produce evidence needed for compliance.
B. the division of compliance responsibilities between consumer and provider.
C. the customer’s role in bridging the gap between auditor and service provider.
D. all of the above.
D. all of the above.
According to the Cloud Security Alliance (CSA), which of the following clauses should be obtained whenever possible? A. Right to Audit Clause B. Right to Withdraw Clause C. Security Breach Clause D. Data Transferability Clause
A. Right to Audit Clause
Over time, the right to audit clause should be:
A. increased
B. reduced
C. replaced with the compliance and monitoring clause
D. both B and C
B. reduced
Cloud service customers should develop evidence-collecting processes for which of the following areas? A. system configurations B. audit logs C. change management reports D. all of the above
D. all of the above
Which of the following audits ensures that controls are implemented and documented? A. SAS 70 Type I B. SAS 70 Type II C. SAS 70 Type III D. CSA SaaS v.2
B. SAS 70 Type II
According to the Cloud Security Alliance (CSA), cloud service providers should use which of the following as a guideline? A. ISO/IEC 27000 B. ISO/IEC 27001 C. ISO/IEC 27002 D. ISO/IEC 35000
B. ISO/IEC 27001
. Cloud providers that have not achieved ISO/IEC 27001 certification should align themselves with: A. ISO/IEC 27000 B. ISO/IEC 27002 C. SAS 70 practices D. CSA SaaS v.2
B. ISO/IEC 27002
The Data Security Lifecycle is made up of: A. four phases B. six phases C. ten phases D. twelve phases
B. six phases
All of the following are challenges relating to data lifecycle security in the cloud, EXCEPT: A. authentication B. non-repudiation C. anonymity D. availability
C. anonymity
Which of the following is NOT a phase of the Data Security Lifecycle? A. use B. distribute C. create D. archive
B. distribute
Which of the following phases in the Data Security Lifecycle would involve assigning rights? A. create B. destroy C. share D. all of the above
A. create
Which of the following phases in the Data Security Lifecycle would involve crypto-shredding? A. archive B. store C. use D. destroy
D. destroy
14. Which of the following phases in the Data Security Lifecycle would involve rights management? A. store and use B. create and destroy C. use and share D. archive and destroy
A. store and use
Which of the following phases in the Data Security Lifecycle would involve encryption? A. store B. share C. archive D. all of the above
D. all of the above
According to the Cloud Security Alliance (CSA), there must be some form of assurance that the data is only being stored in locations permitted by: A. contract B. SLA C. regulation D. all of the above
D. all of the above
According to the Cloud Security Alliance (CSA), data must not be commingled with other customer data without: A. compliance certification B. compensating controls C. customer compensation D. client permission
B. compensating controls
Commingling of data is a challenge when concerns are raised regarding: A. data security B. backup and recovery strategies C. geo-location D. both A and C
D. both A and C
Effective data backup and recovery schemes prevent all of the following, EXCEPT: A. data destruction B. data loss C. data commingling D. unwanted overwrite
C. data commingling
Data remanence is most closely related to which of the following concepts? A. data commingling B. data discovery C. data aggregation D. data persistence
D. data persistence
Data aggregation is most closely related to which of the following concepts? A. data inference B. data discovery C. data commingling D. data persistence
A. data inference
Data owners should maintain which of the following fundamental policies? A. SLA Notification B. Default Deny All C. Data Breach Rejection D. E-Discovery Writ
B. Default Deny All
- According to the Cloud Security Alliance (CSA), data must be encrypted:
A. at rest
B. in transit
C. both at rest and in transit
D. it depends on the policies of the customer and service provider
C. both at rest and in transit
Within the Data Security Lifecycle, compartmentalization techniques separate:
A. cloud service providers from customers
B. cloud service providers from other third parties
C. third parties from one another
D. cloud service customers from each other
D. cloud service customers from each other