Domain 1: Cloud Concepts, Architecture, and Design Flashcards

1
Q

Matthew is reviewing a new cloud service offering that his organization plans to adopt. In this offering, a cloud provider will create virtual server instances under the multitenancy model. Each server instance will be accessible only to Matthew’s company. What cloud deployment model is being used?

A. Hybrid cloud
B. Public cloud
C. Private cloud
D. Community cloud

A

Answer: B. Public cloud

The key to answering this question is recognizing that the multitenancy model involves many different customers accessing cloud resources hosted on shared hardware. That makes this a public cloud deployment, regardless of the fact that access to a particular server instance is limited to Matthew’s company.

In a private cloud deployment, only Matthew’s company would have access to any resources hosted on the same physical hardware. This is
not multitenancy.

There is no indication that Matthew’s organization is combining resources
of public and private cloud computing, which would be a hybrid cloud, or that the resource
use is limited to members of a particular group, which would be a community cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zeke is responsible for sanitizing a set of solid-state drives (SSDs) removed from servers in his organization’s data center. The drives will be reused on a different project. Which one of
the following sanitization techniques would be most effective?

A. Cryptographic erasure
B. Physical Destruction
C. Degaussing
D. Overwriting

A

Answer: A. Cryptographic erasure

Cryptographic erasure is a strong sanitization technique that involves encrypting the data with a strong encryption engine and then taking the keys generated in that process, encrypting-
ing them with a different encryption engine, and destroying the resulting keys of the second round of encryption. This technique is effective on both magnetic and solid-­ state drives.

Degaussing and overwriting are not effective on SSDs. Physical destruction would effectively sanitize the media but would prevent Zeke from reusing the drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tina would like to use a technology that will allow her to bundle up workloads and easily move them between different operating systems. What technology would best meet this need?

A. Virtual machines
B. Serverless computing
C. Hypervisors
D. Containers

A

Answer: A. Virtual machines

Containers do not provide easy portability because they are dependent upon the host operating system. Hypervisors are used to host virtual machines on a device, so that is another incorrect answer. Serverless computing is a platform-as-a-service (PaaS) model that allows cloud customers to run their own code on the provider’s platform without provisioning
servers, so that is also incorrect. Virtual machines are self-­ contained and have their own internal operating system, so it is possible to move them between different host operating
systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Under the cloud reference architecture, which one of the following activities is not generally part of the responsibilities of a customer?

A. Monitor services
B. Prepare systems
C. Perform business administration
D. Handle problem reports

A

Answer: B. Prepare systems

Under the cloud reference architecture, the activities of customers are to use cloud services, perform service trials, monitor services, administer service security, provide billing and usage reports, handle problem reports, administer tenancies, perform business administration, select and purchase services, and request audit reports. Preparing systems is one of the responsibilities of cloud service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Seth is helping his organization move their web server cluster to a cloud provider. The goal of this move is to provide the cluster with the ability to grow and shrink based on changing
demand. What characteristic of cloud computing is Seth hoping to achieve?

A. Scalability
B. On-­ demand self service
C. Elasticity
D. Broad network access

A

Answer: C. Elasticity

The reality is that Seth will likely achieve all of these goals, but the most relevant one is elasticity. Elasticity refers to the ability of a system to dynamically grow and shrink based on the current level of demand. Scalability refers to the ability of a system to grow as demand increases but does not require the ability to shrink.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sherry is deploying a zero-trust network architecture for her organization. In this approach, which one of the following characteristics would be least important in validating a login
attempt?

A. User identity
B. IP address
C. Geolocation
D. Nature of requested access

A

Anser: B. IP address

The defining characteristic of zero-­ trust network architecture is that trust decisions are not based on network location, such as IP address. It is appropriate to use other characteristics, such as a user’s identity, the nature of the requested access, and the user’s geographic (not network!) location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which one of the following hypervisor models is the most resistant to attack?

A. Type 1
B. Type 2
C. Type 3
D. Type 4

A

Answer: A. Type 1

If a cloud provider is able to choose between types of hypervisors, the bare-­ metal (Type 1) hypervisor is preferable to the hypervisor that runs off the OS (Type 2) because it will offer less attack surface. Type 3 and 4 hypervisors do not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Joe is using a virtual server instance running on a public cloud provider and would like to restrict the ports on that server accessible from the internet. What security controls would best allow him to meet this need?

A. Geofencing
B. Traffic inspection
C. Network firewall
D. Network security groups

A

Answer: D. Network Security Groups

Network security groups provide functionality equivalent to network firewalls for cloud-hosted server instances. They allow the restriction of traffic that may reach a server instance.
Joe would not be able to modify the network firewall rules because those are only available to the cloud provider. Geofencing would restrict the geographic locations from which users may access the servers, which is not Joe’s requirement. Traffic inspection may be used to examine the traffic reaching the instance but is not normally used to create port-­ based
restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which one of the following cybersecurity threats is least likely to directly affect an object storage service?

A. Disk failure
B. User error
C. Ransomware
D. Virus

A

D. Virus

Object storage services are susceptible to disk failures and user errors that may unintentionally destroy or modify data. They are also vulnerable to ransomware attacks that infect systems with access to the object store and then encrypt data stored on the service.

They are unlikely to be affected by traditional viruses because they do not have a runtime environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vince would like to be immediately alerted whenever a user with access to a sensitive cloud service leaves a defined physical area. What type of security control should he implement?

A. Intrusion prevention system
B. Geofencing
C. Firewall rule
D. Geotagging

A

Answer: B. Geofencing

Geofencing may be used to trigger actions, such as an alert, when a user or device leaves a defined geographic area. Firewalls and intrusion prevention systems may incorporate geographic information into their decision-­ making processes but would not provide the immediate notification that Vince desires. Geotagging simply annotates log records or other data with the geographic location of the user performing an action but does not directly provide alerting based on geographic location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which one of the following characteristics is not a component of the standard definition of cloud computing?

A. Broad network access
B. Rapid provisioning
C. Multitenancy
D. On-­demand self-service

A

Answer: C. Multitenancy

Cloud computing is a model for enabling ubiquitous, convenient, on-­ demand network access to a shared pool of configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This definition does not include
multitenancy, which is a characteristic of public cloud computing but not all cloud computing models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which one of the following sources provides a set of vendor-­ neutral design patterns for cloud security?

A. Cloud Security Alliance
B. Amazon Web Services
C. Microsoft
D. (ISC)2

A

Answer: A. Cloud Security Alliance

The Cloud Security Alliance (CSA) provides an enterprise architecture reference guide that offers vendor-­ neutral design patterns for cloud security. Amazon Web Services (AWS) and Microsoft do provide cloud design patterns but they are specific to the service offerings of those vendors. (ISC)2 does not provide cloud design patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lori is using an API to access sensitive information stored in a cloud service. What cloud-secure data lifecycle activity is Lori engaged in?

A. Store
B. Use
C. Destroy
D. Create

A

Answer: B. Use

The use of an API is an example of accessing data programmatically during the Use phase of the lifecycle. If Lori were simply placing data into a cloud service or maintaining data there, that would be an example of the Store phase. Lori is not creating or destroying data; she is simply using the data that is already stored in the cloud service.

Candidates need to understand the six phases in the secure cloud data lifecycle: create, store, use, share, archive and destroy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Helen would like to provision a disk volume in the cloud that is mountable from a server.What cloud capability does she want?

A. Virtualized server
B. Object storage
C. Network capacity
D. Block storage

A

Answer: D. Block storage

This is an example of block storage, storage that is available as disk volumes. Object storage maintains files in buckets. Virtualized servers are compute capabilities, not storage
capabilities. Network capacity is used to connect servers to each other and the internet and is not used for the storage of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ben is using the sudo command to carry out operations on a Linux server. What type of access is he using?

A. Service access
B. Unauthorized access
C. User access
D. Privileged access

A

Answer: D. Privileged access

The sudo command allows a normal user account to execute administrative commands and is an example of privileged access, not standard user access. There is no indication in the
scenario that Ben lacks proper authorization for this access. Service access is the access to resources by system services, rather than individual people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which one of the following cryptographic goals protects against the risks posed when a device is lost or stolen?

A. Nonrepudiation
B. Authentication
C. Integrity
D. Confidentiality

A

Answer: D. Confidentiality

The greatest risk when a device is lost or stolen is that sensitive data contained on the device will fall into the wrong hands.

Confidentiality protects against this risk. Nonrepudia-
tion is when the recipient of a message can prove the originator’s identity to a third party.

Authentication is a means of proving one’s identity. Integrity demonstrates that information has not been modified since transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which type of business impact assessment tool is most appropriate when attempting to evaluate the impact of a failure on customer confidence?

A. Quantitative
B. Qualitative
C. Annualized loss expectancy
D. Single loss expectancy

A

Answer: B. Qualitative

Qualitative tools are often used in business impact assessment to capture the impact on intangible factors such as customer confidence, employee morale, and reputation.

Quantitative tools, such as the computation of annualized loss expectancies and single loss expectancies, are only appropriate for easily quantifiable risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Robert is reviewing a system that has been assigned the EAL2 evaluation assurance level under the Common Criteria. What is the highest level of assurance that he may have about the system?

A. It has been functionally tested.
B. It has been structurally tested.
C. It has been formally verified, designed, and tested.
D. It has been semi-­ formally designed and tested.

A

Answer: B. It has benn structurall tested

EAL2 assurance applies when the system has been structurally tested. It is the second-­ to-lowest level of assurance under the Common Criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Jake would like to use a third-­ party platform to automatically move workloads between cloud service providers. What type of tool would best meet this need?

A. Cloud access service broker
B. Database
C. Virtualization
D. Orchestration

A

Answer: D. Orchestration

Orchestration tools are designed to manage workloads and seamlessly shift them between cloud service providers. Virtualization platforms allow a cloud provider to host virtual
server instances, but they do not provide the ability to migrate workloads between different providers.

Databases are a cloud service offering that allows for the organized storage of relational data. Cloud access service brokers (CASBs) allow for the consistent enforcement of security policies across cloud providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Robert is responsible for securing systems used to process credit card information. What security control framework should guide his actions?

A. HIPAA
B. PCI DSS
C. SOX
D. GLBA

A

Answer: B. PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) governs the storage, processing, and transmission of credit card information.

The Health Insurance Portability and Accountability Act (HIPAA) governs protected health information. The Sarbanes–Oxley (SOX) Act regulates the financial reporting of publicly traded corporations.

The Gramm–Leach–Bliley Act (GLBA) protects personal financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of effort attempts to bring all of an organization’s cloud activities under more centralized control?

A. Cloud access service broker
B. Cloud orchestration
C. Cloud governance
D. Cloud migration

A

Answer: C. Cloud governance

Cloud governance programs try to bring all of an organization’s cloud activities under more centralized control. They serve as a screening body helping to ensure that cloud services used by the organization meet technical, functional, and security requirements. They also provide a centralized point of monitoring for duplicative services, preventing different business units from spending money on similar services when consolidation would reduce both costs and the complexity of the operating environment. Cloud orchestration tools are designed to manage workloads and seamlessly shift them between cloud service providers.

Cloud access service brokers (CASBs) allow for the consistent enforcement of security policies across cloud
providers. Cloud migration is the transition from an on-­ premises environment to a cloud environment or between two cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Chris is designing a cryptographic system for use within his company. The company has 1,000 employees, and they plan to use an asymmetric encryption system. They would like the system to be set up so that any pair of arbitrary users may communicate privately. How many total keys will they need?

A. 500
B. 1,000
C. 2,000
D. 4,950

A

Answer: C. 2,000

Asymmetric cryptosystems use a pair of keys for each user. In this case, with 1,000 users, the system will require 2,000 keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Erin is concerned about the risk that a cloud provider used by her organization will fail, so she is creating a strategy that will combine resources from multiple public cloud providers.
What term best describes this strategy?

A. Community cloud
B. Multicloud
C. Private cloud
D. Hybrid cloud

A

Answer: B. Multicloud

The use of multiple public cloud providers to achieve diversity is known as a multicloud trategy. That is the scenario that Erin is creating.

Community clouds are shared cloud resources open to members of an affinity group. Private cloud resources are limited to the use of a single organization. Hybrid cloud strategies combine public and private cloud resources,
not resources from multiple public cloud providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which one of the following would normally be considered an application capability of a cloud service provider?

A. Network capacity
B. Hosted email
C. Block storage
D. Serverless computing

A

Answer: B. Hosted Email

Email is an application-­ level service that is offered by cloud providers as a software as a service (SaaS) capability.

Block storage and network capacity are infrastructure as a service(IaaS) offerings and are infrastructure capabilities. Serverless computing is a platform as a service (PaaS) offering and is a platform capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What activity are cloud providers able to engage in because not all users will access the full capacity of their service offering simultaneously? A. Oversubscription B. Overprovisioning C. Underprovisioning D. Under subscription
**Answer: A. Oversubscription** Oversubscription means that cloud providers can sell customers a total capacity that exceeds the actual physical capacity of their infrastructure because, in the big picture, cus- tomers will never use all of that capacity simultaneously. Undersubscription would be when a cloud provider does not sell all of their available capacity and this would not require that users not access services simultaneously. Overprovisioning occurs when a customer (not a service provider) purchases more capacity than they need. Similarly, underprovisioning occurs when a customer does not purchase enough capacity to meet their needs.
26
Brian recently joined an organization that runs the majority of its services on a virtualization platform located in its own data center but also leverages an IaaS provider for hosting its web services and an SaaS email system. What term best describes the type of cloud environment this organization uses? A. Public cloud B. Dedicated cloud C. Private cloud D. Hybrid cloud
**Answer: D. Hybird Cloud** The scenario describes a mix of public cloud and private cloud services. This is an example of a hybrid cloud environment.
26
In an infrastructure as a service (IaaS) environment where a vendor supplies a customer with access to storage services, who is normally responsible for removing sensitive data from drives that are taken out of service? A. Customer’s security team B. Customer’s storage team C. Customer’s vendor management team D. Vendor
**Anser: D. Vendor** In an infrastructure as a service environment, security duties follow a shared responsibility model. Since the vendor is responsible for managing the storage hardware, the vendor would retain responsibility for destroying or wiping drives as they are taken out of service. However, it is still the customer’s responsibility to validate that the vendor’s sanitization procedures meet their requirements prior to utilizing the vendor’s storage services.
27
Lucca is reviewing his organization’s disaster recovery process data and notes that the MTD for the business’s main website is two hours. What does he know about the RTO for the site when he does testing and validation? A. It needs to be less than two hours. B. It needs to be at least two hours. C. The MTD is too short and needs to be longer. D. The RTO is too short and needs to be longer.
**Answer: A. It need to be less than two hours** When Lucca reviews the recovery time objective (RTO) data, he needs to ensure that the organization can recover from an outage in less than two hours based on the **maximum tolerable downtime (MTD)** of two hours.
28
Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority. When Bob receives an encrypted message from Alice, what key does he use to decrypt the plaintext message’s contents? A. Alice’s public key B. Alice’s private key C. Bob’s public key D. Bob’s private key
**Answer: D. Bob's private key** The recipient of a message that was encrypted using asymmetric cryptography always decrypts that message using their own private key. The sender of the message would have previously encrypted it using the recipient’s public key. The sender’s public and private keys are not used in this process.
29
Jen works for an organization that assists other companies in moving their operations from on-premises data centers to the cloud. Jen’s company does not operate their own cloud services but assists in the use of services offered by other organizations. What term best describes the role of Jen’s company? A. Cloud service customer B. Cloud service partner C. Cloud service provider D. Cloud service broker
**Answer: B. Cloud Service Parner** Jen’s organization is a cloud service partner- an organization that helps cloud service customers use the services offered by cloud service providers. In this case, Jen’s clients are cloud service customers and they are moving to services offered by cloud service providers. Cloud service brokers are cloud service providers who offer a managed identity and access management service to cloud customers that integrates security requirements across cloud services.
30
Carla is selecting a hardware security module (HSM) for use by her organization. She is employed by an agency of the U.S. federal government and must ensure that the technology she chooses meets applicable federal standards for cryptographic systems. What publication would best help her determine these requirements? A. NIST 800-53 B. NIST 800-171 C. Common Criteria D. FIPS 140-2
**Answer: D. FIPS 140-2** This is a tricky question because all of these publications may have some relevance to Carla’s work. **,NIST 800-­ 53 provides general cybersecurity standards for federal agencies** whereas NIST 800-­ 171 applies specifically to the use of controlled unclassified information (CUI). The Common Criteria (CC) provide a certification process for hardware and software products. However, the most relevant standards are **FIPS 140-­ 2, the Security Requirements for Cryptographic Modules**. This guidance is specific to the cryptographic requirements of systems such as HSMs and would have the most directly relevant guidance.
31
Ryan is reviewing the design of a new service that will use several offerings from a cloud service provider. The design depends on some unique features offered only by that provider. What should concern Ryan the most about the fact that these service features are not available from other providers? A. Vendor lock-In B. Interoperability C. Auditability D. Confidentiality
**Answer: A. Vendor Lock In** The greatest risk in this situation is that the service offering will depend on features provided only by a single vendor, preventing Ryan’s organization from moving to a differ1ent vendor and locking them into their current provider. **Interoperability** is the concern that services should be able to integrate and work well together. There is no indication that interoperability is at risk in this scenario. There is also no indication that the use of this vendor creates any special auditability or confidentiality concerns.
32
Colin is reviewing a system that has been assigned the EAL7 evaluation assurance level under the Common Criteria. What is the highest level of assurance that he may have about the system? A. It has been functionally tested. B. It has been methodically tested and checked. C. It has been methodically designed, tested, and reviewed. D. It has been formally verified, designed, and tested.
**Answer: D. It has been formally verified, designed, and tested** **EAL7 is the highest level of assurance under the Common Criteria**. It applies when a system has been formally verified, designed, and tested.
33
Which one of the following technologies provides the capability of creating a distributed, immutable ledger? A. Quantum computing B. Blockchain C. Edge computing D. Confidential computing
**Answer: B. Blockchain** **The blockchain is technology that uses cryptography to create a distributed immutable ledger**. It is the technical foundation behind cryptocurrency and many other applications. Quantum computing is an emerging technology that uses principles of particle physics to perform computing. Edge computing moves compute power to Internet of Things (IoT) devices located at the “edge” of the network. Confidential computing is an area of research into methods for protecting data in use through the protection provided by a trusted execution environment (TEE).
34
Which one of the following systems assurance processes provides an independent third-party evaluation of a system’s controls that may be trusted by many different organizations? A. Planning B. Definition C. Verification D. Accreditation
**Anser: C. Verfication** The verification process is similar to the certification process in that** it validates security controls**. Verification may go a step further by involving a third-­ party testing service and compiling results that may be trusted by many different organizations. Accreditation is the act of management formally accepting an evaluating system, not evaluating the system itself.
35
Which one of the following would be considered an example of infrastructure as a service cloud computing? A.Payroll system managed by a vendor and delivered over the web. B. Application platform managed by a vendor that runs customer code. C. Servers provisioned by customers on a vendor-managed virtualization platform. D. Web-based email service provided by a vendor
**Answer: C. Server provisioned by customers on a vendor-managed virtualization platform** One of the core capabilities of infrastructure as a service is providing servers on a vendor-managed virtualization platform. Web-based payroll and email systems are examples of software as a service (SaaS). An application platform managed by a vendor that runs customer code is an example of platform as a service.
36
Which of the following is not a factor an organization might use in the cost–benefit analysis when deciding whether to migrate to a cloud environment? A. Pooled resources in the cloud. B.Shifting from IT investment as capital expenditures to operational expenditures. C. The time savings and efficiencies offered by the cloud service. D. Branding associated with which cloud provider might be selected.
**Answer: D. Branding associated with which could rovider might be selected** The brand associated with the cloud provider should not influence the cost–benefit anal-ysis; the cloud provider’s brand (and even which cloud provider an organization uses) will most likely not even be known to the consumers who have a business relationship with the organization. The provider does not absorb the cost when the customer requests a modification of the SLA. Though an even split of the cost between customer and provider may seem fair, the cus- tomer pays for all costs associated with modifications to the SLA by the customer. Finally, customer modifications to their SLA are chargeable expenses that will almost certainly be paid for by the customer.
37
Barry has a temporary need for massive computing power and is planning to use virtual server instances from a cloud provider for a short period of time. What term best describes the characteristic of Barry’s workload? A. Quantum computing B. Confidential computing C. Ephemeral computing D. Parallel computing
**Answer: C. Ephemeral Computing** Ephemeral computing means that you can create computing resources, such as servers and storage spaces, to solve a particular problem and then get rid of them as soon as you no longer need them. There is no indication in the scenario that Barry will be using confidential computing, quantum computing, or parallel processing.
38
You are reviewing a service-­ level agreement (SLA) and find a provision that guarantees 99.99% uptime for a service you plan to use. What term best describes this type of provision? A. Availability B. Security C. Privacy D. Resiliency
**Answer: Availability** This type of provision is best described as an availability commitment because the service provider is guaranteeing that the service will be available 99.9% of the time. It could also be described as a security provision because availability is a subset of security, but availability is a more specific term and, therefore, a better answer. Resiliency is the ability of a system to withstand failures and, while related to availability, is not what is guaranteed in this agreement. There is no discussion of privacy-related concerns.
39
Carlton is selecting a cloud environment for an application run by his organization. He needs an environment where he will have the most control over the application’s performance. What service category would be best suited for his needs? A. SaaS B. FaaS C. IaaS D. PaaS
**Answer: C. IaaS** Users have the most control over environments hosted on an IaaS platform because they are able to manually adjust the resources assigned to the application. Users do not have this configurability in the SaaS, FaaS, or PaaS environment.
40
Gavin is looking for guidance on how his organization should approach the evaluation of cloud service providers. What ISO document can help him with this work? A. ISO 27001 B. ISO 27701 C. ISO 27017 D. ISO 17789
41
Ed has a question about the applicability of PCI DSS requirements to his organization’s credit card processing environment. What organization is the regulator in this case? A. SEC B. FDA C. FTC D. PCI SSC
**Answer: PCI SSC** The Payment Card Industry Data Security Standard (PCI DSS) is overseen by the Payment Card Industry Security Standards Council (PCI SSC). This is not the responsibility of the Securities and Exchange Commission (SEC), the Food and Drug Administration (FDA), or the Federal Trade Commission (FTC).
42
Rick is an application developer who works primarily in Python. He recently decided to evaluate a new service where he provides his Python code to a vendor who then executes it on their server environment. What cloud service category includes this service? A. SaaS B. PaaS C. IaaS D. CaaS
**Answer: B. PaaS** Cloud computing systems where the customer only provides application code for execution on a vendor-supplied computing platform are examples of platform as a service (PaaS) computing. Software as a service (SaaS) offerings provide a fully functional application to customers as a cloud service. Infrastructure as a service (IaaS) offerings provide basic infrastructure building blocks to customers. CaaS is a subcategory of IaaS for computing resources provided as a service.
43
Gordon is developing a business continuity plan for a manufacturing company’s IT operations. The company is located in North Dakota and currently evaluating the risk of earthquakes. They choose to pursue a risk acceptance strategy. Which one of the following actions is consistent with that strategy? A. Purchasing earthquake insurance B. Relocating the datacenter to a safer area C. Documenting the decision-making process D. Reengineering the facility to withstand the shock of an earthquake
**Answer: C. Documenting the decision-making process** In a risk acceptance strategy, the organization chooses to take no action other than documenting the risk. Purchasing insurance would be an example of risk transference. Relocating the datacenter would be risk avoidance. Reengineering the facility is an example of a risk mitigation strategy.
44
Matthew is a data scientist looking to apply machine learning and artificial intelligence techniques in his organization. He is developing an application that will analyze a potential customer and develop an estimate of how likely it is that they will make a purchase. What typeof analytic technique is he using? A. Optimal analytics B. Descriptive analytics C. Prescriptive analytics D. Predictive analytics
**Answer: D. Predictive analysis** **Predictive analytics seek to use our existing data to predict future events**. In this case, Matthew is seeking to predict the likelihood that a customer will place an order, so he is performing predictive analytics. Descriptive analytics simply seeks to describe our data. Prescriptive analytics seek to optimize our behavior by simulating many scenarios. Neither prescriptive nor descriptive analytics are being used in this scenario. Optimal analytics is not a class of analytics techniques.
45
Which one of the following statements correctly describes resource pooling? A. Resource pooling allows customers to add computing resources as needed. B. Resource pooling allows the cloud provider to achieve economies of scale. C. Resource pooling allows customers to remove computing resources as needed. D. Resource pooling allows customers to provision resources without service provider interaction.
**Answer: B. Resource pooling allows the cloud provider to achieve economies of scale** **Resource pooling is the characteristic that allows the cloud provider to meet various demands from customers while remaining financially viable**. The cloud provider can make capital investments that greatly exceed what any single customer could provide on their own and can apportion these resources as needed so that the resources are not underutilized (which would mean a wasteful investment) or overtaxed (which would mean a decrease in level of service). Elasticity and scalability allows the customer to grow or shrink the IT footprint (number of users, number of machines, size of storage, and so on) as necessary to meet operational needs without excess capacity. On-demand self-service refers to the model that allows customers to scale their compute and/or storage needs with little or no intervention from or prior communication with the provider.
45
The Domer Industries risk assessment team recently conducted a qualitative risk assessment and developed a matrix similar to the one shown here. Which quadrant contains the risks that require the most immediate attention? Probability II I III IV Impact A. I B. II C. III D. IV
**Answer: A I ** The Domer Industries risk assessment team recently conducted a qualitative risk assessment and developed a matrix similar to the one shown here. Which quadrant contains the risks that require the most immediate attention?
46
Which one of the following types of agreements is the most formal document that contains expectations about availability and other performance parameters between a service provider and a customer? A. Service-level agreement (SLA) B. Operational-level agreement (OLA) C. Memorandum of understanding (MOU) D. Statement of work (SOW)
**Answer: A. Servie-Level Agreements (SLA)** The risk assessment team should pay the most immediate attention to those risks that appear in quadrant I. These are the risks with a high probability of occurring and a high impact on the organization if they do occur.
47
Bianca is preparing for her organization’s move to a cloud computing environment. She is concerned that issues may arise during the change and would like to ensure that they can revert back to their on-premises environment in the case of a problem. What consideration is Bianca is concerned about? A. Reversibility B. Portability C. Regulatory D. Resiliency
**Answer: A. Reversibility** Bianca’s concern in this situation is **reversibility** - the ability to back out the change if it does not go well. Portability is the capability to move workloads easily between environments but would only apply after the services are up and running. Similarly, resiliency is the ability of an environment to withstand disruptions and is not a primary concern in the middle of a migration. There are no regulatory concerns raised in this scenario.
48
Which one of the following organizations is not known for producing cloud security guidance? A. SANS Institute B. FBI C. Cloud Security Alliance D. Microsoft
**Answer: B. FBI** The FBI does not produce cloud security guidance documents. The SANS Institute, Cloud Security Alliance, and vendors such as Microsoft all produce cloud security guidance documents.
49
Vince is using a new cloud service provider and is charged for each CPU that he uses, every bit of data transferred over the network, and every GB of disk space allocated. What characteristic of cloud services does this describe? A. Elasticity B. On-demand self service C. Scalability D. Measured service
**Answer: D. Measured Service** Measured service means that **almost everything you do in the cloud is metered**. Cloud providers measure the number of seconds you use a virtual server, the amount of disk space you consume, the number of function calls you make, and many other measures. This allows them to charge you for precisely the services you use—no more and no less. Elasticity and scalability allows the customer to grow or shrink the IT footprint (number of users, number of machines, size of storage, and so on) as necessary to meet operational needs without excess capacity. On-demand self-service refers to the model that allows customers to scale their compute and/or storage needs with little or no intervention from or prior communication with the provider.
50
Who is responsible for performing scheduled maintenance of server operating systems in a PaaS environment? A. The customer. B. Both the customer and the service provider. C. No operating system maintenance is necessary in a PaaS environment. D. The service provider.
**Answer: D. The Service Provider** Operating systems do exist in PaaS environments where they are maintained by the service provider. **The customer has no access to or ability to maintain the operating system in a PaaS environment.**
51
When considering a move from a traditional on-premises environment to the cloud, organizations often calculate a return on investment. Which one of the following factors should you expect to contribute the most to this calculation? A. Utility costs B. Licensing fees C. Security expenses D. Executive compensation
**Answer: A. Utility Costs** Organizations moving from an on-premises datacenter to the cloud should **expect to see a reduction in utility expenses due to the reduction in on-site equipment.** Software licensing fees are unlikely to change. Security expenses may increase or decrease depending on the nature of the transition. There is no reason to believe that executive compensation will change.
52
Devon is using an IaaS environment and would like to provision storage that will be used as a disk attached to a server instance. What type of storage should he use? A. Archival storage B. Block storage C. Object storage D. Database storage
**Answer: B. Block Storage** **Block storage is used to provide disk volumes and is the appropriate choice in this situation**. Object storage is used to store individual files but cannot be mounted as a disk. There is no indication that Devon needs to use a database in this scenario. Archival storage should only be used in cases where data does not need to be frequently accessed and is not appropriate for a disk attached to a server instance.
53
During a system audit, Casey notices that the private key for her organization’s web server has been stored in a public Amazon S3 storage bucket for more than a year. What should she do? A. Remove the key from the bucket. B. Notify all customers that their data may have been exposed. C. Request a new certificate using a new key. D. Nothing, because the private key should be accessible for validation.
**Answer: C. Request a new certificate using a new key** The first thing Casey should do is notify her management, but after that, replacing the certificate and using proper key management practices with the new certificate’s key should be at the top of her list.
54
Glenda would like to conduct a disaster recovery test and is seeking a test that will allow a review of the plan with no disruption to normal information system activities and as minimal a commitment of time as possible. What type of test should she choose? A. Tabletop exercise B. Parallel test C. Full interruption test D. Checklist review
**Answer: D. Checklist review** The checklist review is the least disruptive type of disaster recovery test. During a checklist review, team members each review the contents of their disaster recovery checklists on their own and suggest any necessary changes. During a tabletop exercise, team members come together and walk through a scenario without making any changes to the information systems. During a parallel test, the team actually activates the disaster recovery site for testing but the primary site remains operational. During a full interruption test, the team takes down the primary site and confirms that the disaster recovery site is capable of handling regular operations. The full interruption test is the most thorough test but also the most disruptive.
55
Mark is considering replacing his organization’s customer relationship management (CRM) solution with a new product that is available in the cloud. This new solution is completely managed by the vendor, and Mark’s company will not have to write any code or manage any physical resources. What type of cloud solution is Mark considering? A. IaaS B. CaaS C. PaaS D. SaaS
**Answer: D. SaaS** In a software as a service solution (SaaS), **the vendor manages both the physical infrastructure and the complete application stack**, providing the customer with access to a fully managed application. Infrastructure as a service (IaaS) offerings provide customers with basic technology building blocks. Platform as a service (PaaS) offerings provide customers with an environment where they can execute their own code. CaaS is a subcategory of IaaS for computing resources provided as a service.
56
Ben has been tasked with identifying security controls for systems covered by his organization’s information classification system. Why might Ben choose to use a security baseline? A. They apply in all circumstances, allowing consistent security controls. B. They are approved by industry standards bodies, preventing liability. C. They provide a good starting point that can be tailored to organizational needs. D. They ensure that systems are always in a secure state.
**Answer: C. They provide a good starting point that can be tailored to organization's needs** Security baselines provide a starting point to scope and tailor security controls to your organization’s needs. They aren’t always appropriate to specific organizational needs, they cannot ensure that systems are always in a secure state, and they do not prevent liability.
57
What approach to technology management integrates the three components of technology management is shown in this illustration? Software Development Quality Assurance Operations A. Agile B. Lean C. DevOps D. ITIL
**Answer: C. DevOps** The DevOps approach to technology management seeks to integrate software development, operations, and quality assurance in a seamless approach that builds collaboration between the three disciplines. Agile is a development methodology often used in DevOps environments. Lean is a process improvement strategy. The IT Infrastructure Library (ITIL) is a collection of best practices for managing IT organizations.
58
Stacey is configuring a PaaS service for use in her organization. She would like to get SSH access to the servers that will be executing her code and contact the vendor to request this access. What response should she expect? A. Immediate approval of the request. B. Immediate denial of the request. C. The vendor will likely request more information before granting the request. D. The vendor will likely ask for executive-­level approval of the request.
**Answer: B. Immediate denial of the request** In all likelihood, the vendor will immediately deny this request because customers should not have access to underlying infrastructure in a PaaS environment. If Stacey truly needs this access, she should consider an IaaS offering instead of a PaaS offering.
59
Tom enables an application firewall provided by his cloud infrastructure as a service provider that is designed to block many types of application attacks. When viewed from a risk management perspective, what metric is Tom attempting to lower by implementing this countermeasure? A. Impact B. RPO C. MTO D. Likelihood
**Answer: D. Likelihood** **Installing a device that will block attacks is an attempt to lower risk by reducing the likelihood of a successful application attack**. Controls that lower the impact of a risk attempt to reduce the amount of damage caused when a risk materializes. The recovery point objective (RPO) addresses the amount of data loss that is acceptable due to an incident. The maximum tolerable outage (MTO) is the amount of downtime that the business can safely withstand.
60
Lisa wants to integrate with a cloud identity provider that uses OAuth 2.0, and she wants to select an appropriate authentication framework. Which of the following best suits her needs? A. OpenID Connect B. SAML C. RADIUS D. Kerberos
**Answer: A. OpenID Connect** OpenID Connect is an authentication layer that works with OAuth 2.0 as its underlying authorization framework. It has been widely adopted by cloud service providers and is widely supported. SAML, RADIUS, and Kerberos are alternative authentication technologies but do not have the same level of seamless integration with OAuth.
61
Elise is helping her organization prepare to evaluate and adopt a new cloud-based human resource management (HRM) system vendor. What would be the most appropriate minimum security standard for her to require of possible vendors? A. Compliance with all laws and regulations. B. Handling information in the same manner the organization would. C. Elimination of all identified security risks. D. Compliance with the vendor’s own policies.
**Answer: B Handling information in the same manner the organization would** The most appropriate standard to use as a baseline when evaluating vendors is to determine whether the vendor’s security controls meet the organization’s own standards. Compliance with laws and regulations should be included in that requirement and are a necessary, but not sufficient, condition for working with the vendor. Vendor compliance with their own policies also fits into the category of necessary, but not sufficient, controls, as the vendor’s policy may be weaker than the organization’s own requirements. The elimination of all identified security risks is an impossible requirement for a potential vendor to meet.
62
Fran’s company is considering purchasing a web-based email service from a vendor and eliminating its own email server environment as a cost-­ saving measure. What type of cloud computing environment is Fran’s company considering? A. SaaS B. IaaS C. CaaS D. PaaS
**Answer: A. SaaS** This is an example of **a vendor offering a fully functional application as a web-based service. Therefore, it fits under the definition of software as a service (SaaS)**. In infrastructure as a service (IaaS), compute as a service (CaaS), and platform as a service (PaaS) approaches, the customer provides their own software. In this example, the vendor is providing the email software, so none of those choices is appropriate.
63
Carl is deploying a set of video sensors that will be placed in remote locations as part of a research project. Due to connectivity limitations, he would like to perform as much image processing and computation as possible on the device itself before sending results back to the cloud for further analysis. What computing model would best meet his needs? A. Serverless computing B. Edge computing C. IaaS computing D. SaaS computing
**Answer: B. Edge computing** In this case, most cloud service models (including IaaS, SaaS, and serverless/FaaS) would require transmitting most information back to the cloud. **The edge computing service model would be far more appropriate, as it places computing power at the sensor, minimizing the data that must be sent back to the cloud over limited connectivity network links.**
63
Ben is working on integrating a federated identity management system and needs to exchange authentication and authorization information for browser-­based single sign-­on. What technology is his best option? A. HTML B. XACML C. SAML D. SPML
**Answer: C. SAML** **Security Assertion Markup Language (SAML) is the best choice for providing authentication and authorization information, particularly for browser-based SSO**. HTML is primarily used for web pages, SPML is used to exchange user information for SSO, and XACML is used for access control policy markup.
64
Bert is considering the use of an infrastructure as a service cloud computing partner to provide virtual servers. Which one of the following would be a vendor responsibility in this scenario? A. Maintaining the hypervisor B. Managing operating system security settings C. Maintaining the host firewall D. Configuring server access control
**Answer: A. Maintaining the hypervisor** In an IaaS server environment, the customer retains responsibility for most server security operations under the shared responsibility model. This includes managing OS security settings, maintaining host firewalls, and configuring server access control. The vendor would be responsible for all security mechanisms at the hypervisor layer and below.
65
Nuno’s company is outsourcing its email system to a cloud service provider who will provideweb-based email access to employees of Nuno’s company. What cloud service category is being used? A. PaaS B. IaaS C. SaaS D. FaaS
**Answer: C. SaaS** This is an example of **providing a fully developed and hosted application to a customer, so it is an example of software as a service (SaaS) computing**. In a platform as a service (PaaS) offering, the customer provides application code for execution on a vendor-supplied computing platform. Infrastructure as a service (IaaS) offerings provide basic infrastructure building blocks to customers. Function as a service (FaaS) offerings are a subcategory of PaaS for serverless computing applications.
66
What software development methodology is most closely linked to the DevSecOps approach? A. Waterfall B. Spiral C. Agile D. Modified waterfall
**Answer: C. Agile** The DevOps and DevSecOps philosophies are closely linked to the Agile method of software development. The waterfall, modified waterfall, and spiral models are more traditional approaches that are not commonly used with DevOps and DevSecOps.
67
Bailey is concerned that users around her organization are using a variety of cloud services and would like to enforce security policies consistently across those services. What security control would be best suited for her needs? A. DRM B. IPS C. CASB D. DLP
**Answer: C. CASB** **Cloud access security brokers (CASBs) are designed to enforce security policies consistently across cloud services and would best meet Bailey’s needs.** Data loss prevention (DLP) and Digital Rights Management (DRM) solutions may be able to detect, block, and control some use of information in the cloud, but they would not provide a way to consistently enforce security policies across cloud platforms. Intrusion prevention systems (IPSs) are designed to detect and block malicious activity and would not be relevant in this scenario.
68
Roger recently accepted a new position as a security professional at a company that runs its entire IT infrastructure within an IaaS environment. Which one of the following would most likely be the responsibility of Roger’s firm? A. Configuring accessible network ports B. Applying hypervisor updates C. Patching operating systems D. Wiping drives prior to disposal
**Answer: C. Patching Operation Systems** In an infrastructure as a service environment, the vendor is responsible for hardware- and network-related responsibilities. These include configuring network firewalls, maintaining the hypervisor, and managing physical equipment. The customer retains responsibility for patching operating systems on its virtual machine instances.
69
In which cloud computing model does a customer share computing infrastructure with other customers of the cloud vendor where one customer may not know the other’s identity? A. Public cloud B. Private cloud C. Community cloud D. Shared cloud
** Answer: A. Public Cloud** In the public cloud computing model, the vendor builds a single platform that is shared among many different customers. This is also known as the multitenancy model.
70
Kristen wants to use multiple processing sites for her data but does not want to pay for a full data center. Which of the following options would you recommend as her best option if she wants to be able to quickly migrate portions of her custom application environment to the facilities in multiple countries without having to wait to ship or acquire hardware? A. A cloud PaaS vendor B. A hosted data center provider C. A cloud IaaS vendor D. A data center vendor that provides rack, power, and remote hands services
**Answer: C. A Cloud IaaS vendor** A cloud IaaS vendor will allow Kristen to set up infrastructure as quickly as she can deploy and pay for it. A PaaS vendor provides a platform that would require her to migrate her custom application to it, likely taking longer than a hosted datacenter provider. A datacenter vendor that provides rack, power, and remote hands assistance fails the test based on Kristen’s desire to not have to acquire or ship hardware.
71
Which one of the following statements about cloud networking is not correct? A. Security groups are the equivalent of network firewall rules. B. IaaS networking is not configurable. C. PaaS and SaaS networking are managed by the cloud service provider. D. Customers may connect to cloud service provider networks using a VPN.
**Answer: B. IaaS networking is not configurable** IaaS networking is generally configurable by the end customer through the use of net-work security groups, bandwidth provisioning, and similar mechanisms. Security groups are the equivalent of firewall rules for IaaS networking. PaaS and SaaS networking are managed by the cloud service provider. Customers may connect to cloud service provider networks using a VPN.
72
Darcy’s organization is deploying serverless computing technology to better meet the needs of developers and users. In a serverless model, who is normally responsible for configuring operating system security controls? A. Software developer B. Cybersecurity professional C. Cloud architect D. Vendor
**Answer: D. Vendor** In a serverless computing model, the vendor does not expose details of the operating system to its customers. Therefore, the vendor retains full responsibility for configuring it securely under the shared responsibility model of cloud computing.
73
What is the international standard that provides guidance for the creation of an organizational information security management system (ISMS)? A. NIST SP 800-53 B. PCI DSS C. ISO 27001 D. NIST SP 800-37
**Answer: C. ISO 27001** ISO 27001 is an international standard for the creation of an information security management system (ISMS). NIST SP 800-37 is the Risk Management Framework created by the U.S. government for assessing the security of systems. NIST SP 800-53 is the list of security controls approved for use by U.S. government agencies and a means to map them to the Risk Management Framework. The Payment Card Industry Data Security Standard (PCIDSS) is the payment card industry’s framework of compliance for all entities accepting or processing credit card payments.
73
You are the security subject matter expert (SME) for an organization considering a transition from a traditional IT enterprise environment into a hosted cloud provider’s data center. One of the challenges you’re facing is whether your current applications in the on-­ premises environment will function properly with the provider’s hosted systems and tools. This is a(n) ________________ issue. A. Interoperability B. Portability C. Stability D. Security
**Answer: A. Interoperability** This is the definition of cloud migration interoperability challenges. Portability is the measure of how difficult it might be to move the organization’s systems/data from a given cloud host to another cloud host. Stability has no specific meaning here and is just a distractor. Security might be an element of this challenge but is not the optimum answer; the question posed a concern about functionality, not disclosure or tainting the information.
74
Mike is conducting a Business Impact Assessment (BIA) of his organization’s potential move to the cloud. He is concerned about the ability to shift workloads between cloud vendors as needs change. What term best describes Mike’s concern? A. Resiliency B. Regulatory C. Reversibility D. Portability
**Answer: D.Portability** Mike’s concern in this situation is portability— the capability to move workloads easily between environments. Reversibility is the ability to back out the change if it does not go well. Resiliency is the ability of an environment to withstand disruptions and is not a primary concern in the middle of a migration. There are no regulatory concerns raised in this scenario.
75
Which one of the following statements is correct? A. Services that are scalable are also elastic. B. There is no relationship between elasticity and scalability. C. Services that are elastic are also scalable. D. Services that are either elastic or scalable are both elastic and scalable.
**Answer: C. Services that are elastic are so scalable** **Elasticity refers to the ability of a system to dynamically grow and shrink based on the current level of demand**. Scalability refers to the ability of a system to grow as demand increases but does not require the ability to shrink. Services that are elastic must also be scalable, but services that are scalable are not necessarily elastic.
76
From a customer perspective, all of the following are benefits of infrastructure as a service (IaaS) cloud services except ____________. A. Reduced cost of ownership B. Reduced energy costs C. Metered usage D. Reduced overhead of administering the operating system (OS) in the cloud environment
**Answer: D. Reduced overhead of administering the operating system (OS) in the cloud environment** In an IaaS configuration, the customer still has to maintain the OS, so option D is the only answer that is not a direct benefit for the cloud customer.
77
Encryption is an essential tool for affording security to cloud- based operations. While it is possible to encrypt every system, piece of data, and transaction that takes place on the cloud, why might that not be the optimum choice for an organization? A. Key length variances don’t provide any actual additional security. B. It would cause additional processing overhead and time delay. C. It might result in vendor lockout. D. The data subjects might be upset by this.
**Answer: B. It would cause additional processing overhead and time delay.** Encryption consumes processing power and time; as with all security controls, additional security means measurably less operational capability— there is always a trade-off between security and productivity. Option A is gibberish and only a distractor. Option C is incorrect because vendor lockout does not result from encryption; it is what might happen if the cloud provider goes out of business while holding your data. Data subjects are the individuals whose personally identifiable information (PII) an organization holds; usually, they will not know or care if something is encrypted (unless there is a breach of that PII, and then investigators will want to determine how that PII was protected) and would probably welcome total encryption, even though that might mean a decrease in operational capability.
78
__________ is an example of due care, and ___________ is an example of due diligence. A. Privacy data security policy; auditing the controls dictated by the privacy data security policy B. The European Union General Data Protection Regulation (GDPR); the Gramm–Leach–Bliley Act (GLBA) C. Locks on doors; turnstiles D. Perimeter defenses; internal defenses
**Anser: A. Privacy data security policy; auditing the controls dictated by the privacy data security policy** **Due care is the minimal level of effort necessary to perform your duty to others**; in cloud security, that is often the care that the cloud customer is required to demonstrate in order to protect the data it owns. **Due diligence is any activity taken in support or furtherance of due care.** This answer, then, is optimum: the due care is set out by the policy, and activities that support the policy (here, auditing the controls the policy requires) are a demonstration of due diligence. The General Data Protection Regulation (GDPR) and GLBA are both legislative mandates; these might dictate a standard of due care, but they are not due care or due diligence, specifically. Door locks and turnstiles are physical security controls; they both might be examples of due care efforts, but neither demonstrates due diligence. Due care and diligence can be demonstrated by either internal or external controls/processes; there is no distinction to be made based on where the control is situated.
79
Which one of the following is a critical component for confidential computing environments? A. TEE B. TPM C. HSM D. PKI
T**Answer: A. TEE** **Confidential computing protects data in use by using a trusted execution environment (TEE).** Confidential computing environments may also make use of other security technologies, including Trusted Platform Modules (TPMs), Hardware Security Modules (HSMs), and Public Key Infrastructure (PKI), but those technologies do not protect data in use and are not, therefore, required for a confidential computing environment.
79
Which one of the following programs provides a general certification process for computing hardware that might be used in a government environment? A. FedRAMP B. NIST 800-53 C. Common Criteria D. FIPS 140-2
**Answer: C. Common Criteria** **The Common Criteria provides a general certification process for computing hardware that might be used in government applications**. FIPS 140-2 provides similar guidance but is specific to cryptographic modules and is not used for generalized hardware. NIST 800-53 provides security control guidance but is not a certification process. FedRAMP provides a certification process for cloud computing services but not for hardware.
80
In a Lightweight Directory Access Protocol (LDAP) environment, each entry in a directory server is identified by a ______________. A. Domain name (DN) B. Distinguished name (DN) C. Directory name (DN) D. Default name (DN)
**Answer: B. Distinguished Name(DN)** The distinguished name (DN) is the nomenclature for all entries in an LDAP environment. A domain name is used to identify one or more IP addresses. For instance, Microsoft.com and google.com are domain names. Option A is incorrect. A directory name is typically associated with a filesystem structure and not something related to LDAP. Option C is incorrect. “Default Name” is not a common term and is made up. Option D is not the correct answer.
81
Which one of the following cloud-building block technologies is best suited for storing data that is structured into related tables? A. Storage B. Networking C. Databases D. Virtualization
**Answer: C Databases** Databases are used to store information that is collected into related tables. Storage could also be used for this purpose, but it does not provide the table structure of a database, so it would not be the best solution. Networking and virtualization technologies are not used to store data.
82
You are concerned about protecting sensitive data while it is stored in memory on a server. What emerging technology is designed to assist with this work? A. Quantum computing B. Confidential computing C. Edge computing D. Fog computing
**Answer: B. Confidential Computing** Confidential computing is an emerging technology designed to support the protection of data that is actively stored in memory.
83
Your organization has migrated into a platform as a service (PaaS) configuration. A network administrator within the cloud provider has accessed your data and sold a list of your users to a competitor. Who is required to make data breach notifications in accordance with all applicable laws? A. The network admin responsible B. The cloud provider C. The regulators overseeing your deployment D. Your organization
**Answer: D. Your organization** The cloud customer is ultimately responsible for all legal repercussions involving data security and privacy; the cloud provider might be liable for financial costs related to these responsibilities, but those damages can only be recovered long after the notifications have been made by the cloud customer. All the other options are incorrect because they do not correctly identify who is required to make data breach notifications in accordance with all applicable laws. That responsibility rests with the cloud customer.
84
If an organization wants to retain the most control of their assets in the cloud, which service and deployment model combination should they choose? A. Platform as a service (PaaS), community B. Infrastructure as a service (IaaS), hybrid C. Software as a service (SaaS), public D. Infrastructure as a service (IaaS), private
**Answer: D. Infrastructure as a service (IaaS), private** **An IaaS service model allows an organization to retain the most control of their IT assets in the cloud**; the cloud customer is responsible for the operating system, the applications, and the data in the cloud. The private cloud model allows the organization to retain the greatest degree of governance control in the cloud; all the other deployment models would necessitate giving up governance control in an environment with pooled resources.
85
Henry’s company has deployed an extensive IoT infrastructure for building monitoring that includes environmental controls, occupancy sensors, and a variety of other sensors and controllers that help manage the building. Which of the following security concerns should Henry report as the most critical in his analysis of the IoT deployment? A. There is a lack of local storage space for security logs, which is common to IoT devices. B. The IoT devices may not have a separate administrative interface, allowing anybody on the same network to attempt to log in to them and making brute-force attacks possible. C. The IoT devices may not support strong encryption for communications, exposing the log and sensor data to interception on the network. D. The long-term support and patching model for the IoT devices may create security and operational risk for the organization.
**Answer: D. The long-term support and patching model for the IoT devices may create security and operational risk for the organization.** Henry’s biggest concern should be the long-term security and supportability of the IoT devices. As these devices are increasingly embedded in buildings and infrastructure, it is important to understand the support model and the security model. Both the lack of separate administrative access and the lack of strong encryption can be addressed by placing the IoT devices on a dedicated subnet or network that prevents other users from accessing the devices directly. This will help limit the risk without undue expense or complexity and is a common practice. Finally, lack of storage space can be a concern, but it is not the most important when looking at the risks IoT devices can create.
86
In what cloud computing model does the customer build a cloud computing environment in their own datacenter,or build an environment in another datacenter that is for the customer’s exclusive use? A. Public Cloud B. Private Cloud C. Hybrid Cloud D. Shared Cloud
**Answer: B. Private Cloud** **In the private cloud computing model, the cloud computing environment is dedicated to a single organization and does not follow the shared tenancy model.** The environment may be built by the company in its own data center or built by a vendor at a colocation site. Public cloud computing makes use of vendor data centers. Hybrid cloud computing combines the use of public and private cloud resources. Shared cloud computing is not a cloud service model.
87
What cloud computing component is most susceptible to an escape attack? A. Hypervisor B. Hardware security module C. Trusted platform module D. Database
**Answer: A. Hypervisor** Hypervisors enforce isolation between virtual machines and are, therefore, most susceptible to escape attacks. Hardware security modules and trusted platform modules store and manage cryptographic keys and are not vulnerable to escape attacks. Databases may be hosted on a virtual platform that is vulnerable to an escape attack, but the database itself is not vulnerable to that attack.
88
Steve is concerned that users of his organization’s cloud environment may be sending sensitive information over HTTPS connections. What technology would best help him detect this activity? A. Traffic inspection B. Port blocking C. Patching D. Geofencing
**Answer: A. Traffic inspection** Traffic inspection technology would allow Steve to examine the contents of encrypted HTTPS traffic and detect sensitive information. Port blocking may be used to stop HTTPS traffic entirely, but that would not detect a security violation. Patching and geofencing technologies would play no role in this scenario.
88
Which one of the following disaster recovery approaches is generally the most cost-effective for an organization? A. Hot site B. Cloud site C. Cold site D. Warm site
**Answer: B. Cloud site** Hot sites, cold sites, and warm sites all require a significant investment in physical facilities. Hot sites and warm sites also require investments in hardware and/or software. **Using the cloud provides a way to minimize costs by configuring but not activating resources until they are actually needed.**
89
An essential element of access management, ____________ is the practice of confirming that an individual is who they claim to be. A. Authentication B. Authorization C. Nonrepudiation D. Regression
**Answer: A. Authentication** **Authentication is verifying that the user is who they claim to be and assigning them an identity assertion (usually a user ID) based on that identity.** Authorization is granting access based on permissions allocated to a particular user/valid identity assertion. Nonrepudiation is the security concept of not allowing a participant in a transaction to deny that they participated. Regression is a statistical concept not relevant to the question in any way.
90
Which one of the following cloud service categories places the most security responsibility with the cloud service provider? A. SaaS B. PaaS C. FaaS D. IaaS
**Answer: A. SaaS** Software-as-a-service (SaaS) models place the primary burden of security (and other administration) on the service provider. Platform as a service (PaaS) and infrastructure as a service (IaaS) shift some responsibility from the provider to the customer under the shared responsibility model. Function as a service (FaaS) is a subcategory of PaaS.
91
Alice and Bob are using a symmetric encryption algorithm to exchange sensitive information. How many total encryption keys are necessary for this communication? A. 1 B. 2 C. 3 D. 4
**Answer: A. 1** In a symmetric encryption algorithm, all data is encrypted and decrypted with the same shared secret key. This key is the only key required for the communication.
92
Mike and Renee would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority. When Mike receives Renee’s digital certificate, what key does he use to verify the authenticity of the certificate? A. Renee’s public key B. Renee’s private key C. CA’s public key D. CA’s private key
**Answer: C. CA’s public key** When an individual receives a copy of a digital certificate, the person verifies the authenticity of that certificate by using the CA’s public key to validate the digital signature contained on the certificate.
93
What computing technology, if fully developed, has the potential to undermine the security of modern encryption algorithms? A. Confidential computing B. Ephemeral computing C. Quantum computing D. Parallel computing
**Answer: C. Quantum computing** **Quantum computing uses advanced particle physics to perform computing tasks in a revolutionary manner that might render modern encryption algorithms insecure.** Ephemeral computing refers to the use of computing assets on a temporary basis. Confidential computing uses trusted execution environments (TEE) to protect data in use. Parallel computing uses multiple processors to perform different parts of a calculation simultaneously.
94
What is usually considered the difference between business continuity (BC) efforts and disaster recovery (DR) efforts? A. BC involves a recovery time objective (RTO), and DR involves a recovery point objective (RPO). B. BC is for events caused by humans (like arson or theft), whereas DR is for natural disasters. C. BC is about maintaining critical functions during a disruption of normal operations, and DR is about recovering to normal operations after a disruption. D. BC involves protecting human assets (personnel, staff, users), whereas DR is about protecting property (assets, data).
**Answer: C. BC is about maintaining critical functions during a disruption of normal operations, and DR is about recovering to normal operations after a disruption.** Technically, BC efforts are meant to ensure that critical business functions can continue during a disruptive event, and DR efforts are supposed to support the return to normal operations. However, in practice, the efforts often coincide, use the same plans/personnel, and have many of the same procedures. Option A is incorrect; both BC and DR use the RTO and RPO as metrics to determine success. Option B is incorrect; BC and DR efforts are not specific to the cause of a disruptive event. Option D is incorrect; health and human safety should be paramount in all security efforts, with very few exceptions.