chapter6 Flashcards

1
Q

According to the Cloud Security Alliance (CSA), the cloud services agreement must allow the client or third party to:
A. have reasonable security that data breaches will not happen.
B. monitor the service provider’s performance and test for system vulnerabilities.
C. retain ownership of the data in original format.
D. adjust the process for responding to legal requests at any time.

A

B. monitor the service provider’s performance and test for system vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to the Cloud Security Alliance (CSA), the cloud customer must understand:
A. the provider’s ability to produce evidence needed for compliance.
B. the division of compliance responsibilities between consumer and provider.
C. the customer’s role in bridging the gap between auditor and service provider.
D. all of the above.

A

D. all of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
According to the Cloud Security Alliance (CSA), which of the following clauses should be obtained whenever possible?
A. Right to Audit Clause
B. Right to Withdraw Clause
C. Security Breach Clause
D. Data Transferability Clause
A

A. Right to Audit Clause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Over time, the right to audit clause should be:
A. increased
B. reduced
C. replaced with the compliance and monitoring clause
D. both B and C

A

B. reduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Cloud service customers should develop evidence-collecting processes for which of the following areas?
A. system configurations
B. audit logs
C. change management reports
D. all of the above
A

D. all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following audits ensures that controls are implemented and documented?
A. SAS 70 Type I
B. SAS 70 Type II
C. SAS 70 Type III
D. CSA SaaS v.2
A

B. SAS 70 Type II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
According to the Cloud Security Alliance (CSA), cloud service providers should use which of the following as a guideline?
A. ISO/IEC 27000
B. ISO/IEC 27001
C. ISO/IEC 27002
D. ISO/IEC 35000
A

B. ISO/IEC 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
. Cloud providers that have not achieved ISO/IEC 27001 certification should align themselves with:
A. ISO/IEC 27000
B. ISO/IEC 27002
C. SAS 70 practices
D. CSA SaaS v.2
A

B. ISO/IEC 27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The Data Security Lifecycle is made up of:
A. four phases
B. six phases
C. ten phases
D. twelve phases
A

B. six phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
All of the following are challenges relating to data lifecycle security in the cloud, EXCEPT:
A. authentication
B. non-repudiation
C. anonymity
D. availability
A

C. anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following is NOT a phase of the Data Security Lifecycle?
A. use
B. distribute
C. create
D. archive
A

B. distribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following phases in the Data Security Lifecycle would involve assigning rights?
A. create
B. destroy
C. share
D. all of the above
A

A. create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following phases in the Data Security Lifecycle would involve crypto-shredding?
A. archive
B. store
C. use
D. destroy
A

D. destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
14. Which of the following phases in the Data Security Lifecycle would involve rights management?
A. store and use
B. create and destroy
C. use and share
D. archive and destroy
A

A. store and use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following phases in the Data Security Lifecycle would involve encryption?
A. store
B. share
C. archive
D. all of the above
A

D. all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
According to the Cloud Security Alliance (CSA), there must be some form of assurance that the data is only being stored in locations permitted by:
A. contract
B. SLA
C. regulation
D. all of the above
A

D. all of the above

17
Q
According to the Cloud Security Alliance (CSA), data must not be commingled with other customer data without:
A. compliance certification
B. compensating controls
C. customer compensation
D. client permission
A

B. compensating controls

18
Q
Commingling of data is a challenge when concerns are raised regarding:
A. data security
B. backup and recovery strategies
C. geo-location
D. both A and C
A

D. both A and C

19
Q
Effective data backup and recovery schemes prevent all of the following, EXCEPT:
A. data destruction
B. data loss
C. data commingling
D. unwanted overwrite
A

C. data commingling

20
Q
Data remanence is most closely related to which of the following concepts?
A. data commingling
B. data discovery
C. data aggregation
D. data persistence
A

D. data persistence

21
Q
Data aggregation is most closely related to which of the following concepts?
A. data inference
B. data discovery
C. data commingling
D. data persistence
A

A. data inference

22
Q
Data owners should maintain which of the following fundamental policies?
A. SLA Notification
B. Default Deny All
C. Data Breach Rejection
D. E-Discovery Writ
A

B. Default Deny All

23
Q
  1. According to the Cloud Security Alliance (CSA), data must be encrypted:
    A. at rest
    B. in transit
    C. both at rest and in transit
    D. it depends on the policies of the customer and service provider
A

C. both at rest and in transit

24
Q

Within the Data Security Lifecycle, compartmentalization techniques separate:
A. cloud service providers from customers
B. cloud service providers from other third parties
C. third parties from one another
D. cloud service customers from each other

A

D. cloud service customers from each other

25
Q

Which of the following statements is NOT true?
A. Data destruction is extremely difficult in a multi-tenant environment.
B. Encryption is impossible to manage with multi-tenant storage.
C. Backed-up data should not be commingled with other customers’ data.
D. Both A and B.

A

B. Encryption is impossible to manage with multi-tenant storage.