Domain 3 Flashcards

1
Q

What is the primary requirement for cloud functionality?

A

ISP connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What provides immediate, battery-driven power for a short period of time?

A

UPS - uninterruptible power supplies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the best option for providing backup power for a sustained period of time?

A

Generators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Redundant arrays of inexpensive disks (RAID) and redundant servers are examples of what kind of controls?

A

high-availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What identifies sensitive information stored on endpoint systems or in transit over a network?

A

DLP systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a duplicate of your system – including lines of communication and network devices – that can act as your business’s main operating system if your primary server goes down for any reason?

A

Redundant server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What creates a single usable data disk, where several physical disks are combined into an array for better speed and fault tolerance.

A

Redundant arrays of inexpensive disks (RAID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the following key concepts for:
* Mirroring: copying data to more than one disk
* Striping: splitting data across more than one disk
* Error correction (fault tolerance): redundant data is stored to allow problems to be detected and possibly fixed

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is RAID a backup solution?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a network encryption protocol used to protect sensitive information?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can TLS identify sensitive information?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: The management plane of a cloud service provider’s datacenter should be reserved for use by the provider’s own engineers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does traffic on the management plane control?

A

Operation of the infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s a cost-effective way to track items in a facility?

A

RFID - Radio frequency identification technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of site includes the basic capabilities required for datacenter operations, like space, power, HVAC, and communications?

A

Cold site, but it lacks hardware required to restore operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most simplistic type of disaster recovery site consisting of elements providing power, networking capability, and cooling

A

Cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of DR site has storage hardware such as tape or disk drives, servers, and switches but has to have data transported for use in recovery?

A

Warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of DR site is ideal but challenging to attain that is a fully functional backup site that already has important data mirrored to it?

A

Hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the maximum acceptable delay between the interruption of service and restoration of service. This determines an acceptable length of time for service downtime.

A

RTO - recovery time objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the maximum acceptable amount of time since the last data recovery point. This determines what is considered an acceptable loss of data.

A

RPO - recovery point objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Every region consists of multiple __________.

A

Availability zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What DR strategy is when data is live, services are idle, and some resources are provisioned and scaled after event?

A

Pilot light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What DR strategy is always running, business critical, and scales AWS resources after event?

A

Warm standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What DR strategy has real-time RPO and RTO, zero downtime, near zero data loss, and is for mission critical services?

A

Multi-site, active/active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What provides the best redundancy and resiliency for backup?

A

Having your backup at another cloud provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers.

A

Docker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What packages software into standardized units called containers that have everything the software needs to run including libraries, system tools, code, and runtime.

A

Docker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the highest priority in security?

A

Human safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What allows every resource on the server to be placed in a partition and can be used to achieve multitenancy, logical separation of data, scalability, and geographic sharding?

A

Tenant partitioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What partitions virtual machines belonging to different tenants on a virtualization platform?

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Where should datacenters be located?

A

In the core of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What principle states an individual should react in a situation using the same level of care expected from any reasonable person?

A

Due care principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What states an individual assigned a responsibility should exercise due care to complete it accurately and in a timely manner?

A

Due care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In what service model is the vendor responsible for hardware related and network related responsibilities?

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

*configuring network firewalls
*maintaining hypervisor
*managing physical equipment
Are three _____ responsibilities in _____.

A

vendor / IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is customer responsible for in IaaS?

A

Patching OS on VM and managing ingress/egress via NSGs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What data is included in incremental backup?

A

Only the data modified since the most recent incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What data is included in differential backup?

A

All data modified since last full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What data is included in the full backup?

A

All data on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are transaction log backups designed to support?

A

Database servers, not effective on file server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A computer responsible for the storage and management of data files so that other computers on the same network can access the file.

A

What is a file server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a machine running database software dedicated to providing database services.

A

Database servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What do SIEMs do?

A

Correlate info from multiple sources and perform analysis on data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does SOAR stand for?

A

Security orchestration, automation, and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What do SOAR platforms provide?

A

automated playbook responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What do intrusion prevention platforms do?

A

Block traffic based on analysis performed by the IPS itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Do log repositories perform analysis?

A

No, they just collect log info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Do SIEM solutions create an audit trail?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What does an audit trail show you?

A

Sequential record of all the activity on a specific system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What analyzes and blocks suspicious network traffic?

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What monitors endpoints for malware and responds to malware infections?

A

Endpoint detection and response platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The process of protecting devices like desktops, laptops, mobile phones, and tablets from malicious threats and cyberattack

A

Endpoint security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are physical devices that connect to a network system such as mobile devices, desktop computers, virtual machines, embedded devices, and servers.

A

Endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Who enforces an org’s security policies across cloud providers?

A

CASB - Cloud access security broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What can handle large-scale DDoS attacks?

A

Content delivery network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a network of servers that distributes content from an origin server by caching content close to where each end user is accessing the internet via a web-enabled device.

A

CDN - content delivery network. It speeds up webpage loading for data-heavy applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is designed to overwhelm a system until it can no longer process legitimate requests?

A

DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What principle does DDoS affect?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Is an IPS an example of risk mitigation?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What determines the critical path of assets, resources, and data w/in an org?

A

BIA - business impact plan - useful in shaping BC/DR plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What should be redundant in a well-designed datacenter?

A

power, cooling, and network connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What allows for the programmatic interaction w/ services and platforms?

A

APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is a file that generally contains a short self-contained set of instructions, i.e., lines of code, that perform a specific task.

A

Python script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What do the following do:
Use HTTPS
Activate Authentication & Authorization
Validate User Input
Limit Access to Sensitive Data
Monitor and Log API Activity
Keep Software and Libraries Up-to-date
Perform Regular Security Audits

A

Secure the backend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What are the elements of hardware and software that ensure that a system can only be controlled by those w/ proper permissions

A

TCB - Trusted Computing Base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What coordinates access to physical hardware and enforces isolation b/w different virtual machines running on the same physical platform?

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What’s the most cost-effective way to provide network segmentation that’s used to create logical separation b/w systems in a datacenter?

A

Virtual local area networks (VLANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What’s used to connect remote users and sites over an insecure network?

A

VPN - virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What’s an option to route traffic b/w network sites?

A

BGPs - border gateway protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What tier is expected to achieve 99.741% availability?

A

Tier 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What tier is expected to achieve 99.671% availability?

A

Tier 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What tier is expected to achieve 99.982% availability?

A

Tier 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What tier is expected to achieve 99.995% availability?

A

Tier 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Does running unnecessary services on a server increase the attack vector?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

How are compute nodes measured?

A

In terms of how many CPUs/how much RAM is available in the center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Do compute nodes include virtual and hardware machines?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

T/F: Block storage provides disk volumes for use by servers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is a named logical area of the physical disk?

A

Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

B/c entire machines could be stolen in highly-portable, easily copied formats, _____ must be protected?

A

VM file stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is a common attack vector that uses malicious SQL code for backend database manipulation to access PI?

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is a programming language for storing and processing information in a relational database?

A

SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What attack executes code on a remote user’s system?

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What attack exploits trust relationships by tricking systems into authorizing unauthorized activity?

A

Cross-site request forgery and server-side request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is a measure of data that can be lost in an outage w/out damaging the organization?

A

RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What strategy most affects RPO?

A

Data replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What’s a measure of how long an org can endure an outage w/out irreparable harm?

A

RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

This is how long an org can suffer an outage before ceasing to be an org

A

MAD - maximum allowable downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What technology performs the following:
Encryption: hides the data being transferred from third parties
Authentication: ensures that the parties exchanging information are who they claim to be
Integrity: verifies that the data has not been forged or tampered with

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What’s the primary protocol used to implement HTTPS for secure communication?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is separating and storing data in separate logical partitions or storage areas, even if those partitions or storage are on the same physical device.

A

Logical separation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is separating and storing data on different physical systems or networks.

A

Physical separation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is a protocol used to implement VPNs?

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is a group of protocols for securing connections between devices that helps keep data sent over public networks secure. It is often used to set up VPNs?

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What works by encrypting IP packets, along with authenticating the source where the packets come from to secure connections b/w devices?

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is it called when you assign users only the permissions they need to perform their job responsibilities?

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is the unintentional accumulation of privileges over time?

A

Aggregation or privilege creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is it called when two people must work together to perform a sensitive action?

A

Two-person control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is the reliance upon secrecy of security mechanisms to provide security for a system or process?

A

Security through obscurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What hypervisor provides a greater degree of security b/c they run directly on top of hardware, decreasing the attack surface?

A

Type 1 (bare-metal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What’s the major driver to lease space in a colocation facility?

A

A reduction in cost achieved by sharing cost among multiple clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

At a minimum, the Uptime Institute requires it to offera UPS; a designated space for IT systems; dedicated cooling equipment that runs outside of office hours; and an engine generator.

A

Tier 1 datacenters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What is a voltage regulator that protects sensitive electronics, such as computers, lab equipment, home theaters from voltage fluctuations and power surges?

A

Line conditioners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Dual-power supplies are a requirement for what datacenter tier?

A

Tier 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What handles traffic b/w SDN controllers and SDN applications?

A

NBI - northbound interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is used to access the SDN controller and allows a network administrator to access the SDN to configure it or to retrieve information from it?

A

NBI - northbound interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

In what do applications often need to communicate with network controllers to query or modify the current state of the network?

A

SDN - Software defined networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network?

A

SDN - Software defined networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What is basically SSO across multiple organizations?

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is a method of linking a user’s identity across multiple separate identity management systems allowing users to quickly move between systems while maintaining security.

A

Federated identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What are hardened, tamper-resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates.

A

Hardware security modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What technology provides for the management of physical keys?

A

KMBs - Key management boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Components of Kerberos authentication process.

A

TGT - ticket granting tickets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What is a computer network security protocol that authenticates service requests between two or more trusted hosts across an untrusted network, like the internet. It uses secret-key cryptography and a trusted third-party for authenticating client-server applications and verifying users’ identities.

A

Kerberos

114
Q

What provides a secure operating environment inside a computer system?

A

TCB - trusted computing base

115
Q

Technological capabilities of virtualization create the ease of use that can cause ______.

A

Sprawl

116
Q

Sprawl should be addressed from a _________ perspective.

A

Managerial

117
Q

T/F: It’s helpful to have a moderator to guide participants thru tabletop exercises.

A

True

118
Q

The ________ contains the suite of security controls applied uniformly thru an environment.

A

Baseline

119
Q

Forensic analysis is an important part of ______.

A

Incident response

120
Q

What is the term used to describe the ability of customers to access their systems remotely?

A

Ping

121
Q

What is the term used to describe the network connectivity that supports servers’ connections to the internet?

A

Pipe

122
Q

What is the software layer between the hardware and the guest operating systems that acts as a resource manager to enable the sharing of processing power and memory.

A

Hypervisor

123
Q

What reroutes traffic based on current customer demand, creates logical subnets w/out having to change any physical connections, and filters access to resources based on specific rules or settings?

A

SDNs

124
Q

What splits a large network into a grouping of smaller, interconnected networks to help minimize traffic and increases network speed?

A

Subnet

125
Q

What delivers streaming media content efficiently by placing it closer to the end user?

A

CDN

126
Q

What is a group of servers with mostly shared storage between them that can be used to facilitate high availability for your applications and services and can also be used to create the benefits of reliability, performance, and lower TCO?

A

Failover clusters

127
Q

What is a group of independent computers that work together to increase the availability and scalability of clustered roles

A

Failover cluster

128
Q

What’s another word for clustered servers?

A

Nodes

129
Q

How can you ensure your data is not held hostage or lost if a provider becomes unusable?

A

Having a backup with a different provider.

130
Q

What are two things that provide compute capability?

A

Virtual server instances and containers

131
Q

____ is the most significant reason cloud datacenters use VMs

A

Cost

132
Q

What shuts down the primary operating facility and shifts operations to the backup facility?

A

Full tests or full interruption tests

133
Q

What test for backup and restore capabilities restores a system that hasn’t actually broken down to an alternate location?

A

Parallel test - activates the facility but doesn’t move production responsibility to it.

134
Q

What kind of attack is when the attacker is able to leave the confines of its own VM and access resources belonging to another customer?

A

Escape attack

135
Q

What type of vulnerability occurs when there is more data in a buffer than it can handle and causes data to overflow into adjacent storage, which can cause a system crash or, worse, create an entry point for a cyberattack.

A

Overflow vulnerability

136
Q

What kind of vuln exists in the following example: A search form where visitors send their search query to the server, and attackers typically send victims custom links that direct unsuspecting users toward a vulnerable page.

A

Scripting vulnerability

137
Q

What vulnerability causes escape attacks to occur?

A

A vuln in the hypervisor, b/c it’s supposed to be the separation that prevents customers from accessing each other’s resources.

138
Q

Disk volumes are stored on _____ storage, except when snapshotting is used to create a backup, then they’re stored on less expensive ______ storage.

A

Block - Object

139
Q

Hot and warm sites are not needed when your data is backed up __________.

A

In the cloud

140
Q

T/F: A specified configuration built to defined standards and with a controlled process can be used to show that all VMs w/in an environment include certain controls.

A

True

141
Q

What records provide the “telephone bill” level of communication detail but not the content?

A

Netflow records

142
Q

What is a commonly used standard for monitoring network flow data that allows you to monitor IP network traffic information as data packets enter or exit an interface.

A

NetFlow

143
Q

What standard provides the most accurate reconstruction of user activity but is costly to implement due to data storage requirements?

A

Packet capture

144
Q

What is a networking term for intercepting a data packet that is crossing a specific point in a data network, and once captured in real-time, is stored for a period of time so that it can be analyzed, and then either be downloaded, archived or discarded.

A

Packet capture

145
Q

What type of backup provides the best redundancy and resiliency?

A

Having your backup at another cloud provider

146
Q

Every plan/policy should include mention of:

A

The governance documents, by reference, that drive the formation of the plan/policy

147
Q

What is SAML?

A

Security Assertion Markup Language - based on XML

148
Q

What is an open federation standard that allows an identity provider (IdP) to authenticate users and then pass an authentication token to another application known as a service provider (SP).

A

SAML

149
Q

HTTP is used for port ___ web traffic

A

80

150
Q

What is used to load web pages using hypertext links?

A

HTTP - hypertext transfer protocol

151
Q

What is used to present web pages?

A

HTML

152
Q

What is the universal alphanumeric character set?

A

ASCII

153
Q

Moving information into another jurisdiction may affect your:

A

Regulatory compliance

154
Q

What are the 4 major risk management strategies?

A

Risk acceptance
Risk transference
Risk avoidance
Risk reduction

155
Q

What most affects RPO?

A

Data replication strategies, which determine how much recent data is available for recovery purposes

156
Q

T/F: Data replication affects RPO more than RTO.

A

True

157
Q

What is the process of granting users and other security principles access to resources in an environment?

A

Authorization

158
Q

When using two different cloud providers, a customer runs the risk of:

A

Data/software formats being different and not readily adapted, causing delays during a failover

159
Q

In what model does the customer have most configuration control?

A

IaaS

160
Q

In what model does the customer have least configuration control?

A

SaaS

161
Q

Public cloud makes a ______ _______ more likely.

A

Guest escape

162
Q

What is used to create an encrypted communication tunnel over an untrusted medium?

A

VPN

163
Q

What are used for central repositories for identification, authentication, and authorization purposes?

A

ACLs

164
Q

What is an access control model used to assign permissions based on job functions w/in an org?

A

RBAC

165
Q

What is the address at which an item (memory cell, storage element, network host) appears to reside from the perspective of an executing application program.

A

Logical address

166
Q

What is the least disruptive type of disaster recovery test?

A

Checklist review

167
Q

Accessing source code is necessary for ______

A

Static analysis

168
Q

Which dev model is most frequently associated with cloud services?

A

Agile

169
Q

What is the best solution to prevent 3Ps from intercepting and accessing data sent via API calls?

A

TLS

170
Q

What provides protection against inadvertent data exposure when multiple tenants share the same underlying infrastructure?

A

Encryption at rest

171
Q

T/F: Multiple paths are ideal for CI/CD pipeline.

A

False

172
Q

Automation, use of metrics, and version control are all recommended best practices for ________.

A

CI/CD pipelines

173
Q

IdPs integrate with _______ or ______.

A

OpenID Connect or SAML

174
Q

In what phase of the SDLC is user input most necessary?

A

Define

175
Q

Customer responsible for apps, data, runtime, middleware, and OS. CSP responsible for virtualization, servers, storage, and networking.

A

IaaS

176
Q

Customer responsible for apps and data. CSP responsible for runtime, middleware, OS, virtualization, servers, storage, and networking.

A

PaaS

177
Q

Shared responsibility for apps and data. CSP also responsible for runtime, middleware, OS, virtualization, servers, storage, and networking

A

SaaS

178
Q

Standard measures such as locks, security personnel, lights, fences, visitor check in procedures.

A

CSP data center physical security measures

179
Q

_____ controls Identity and access management (IAM), single
sign on (SSO) provider, multifactor authentication (MFA) and logging.

A

Logical access

180
Q

Customer is responsible for configuring the VMs, virtual network, and guest OS security as if the systems were on premises. CSP responsible for physical host, physical storage, and physical network. CSP provides the tooling to secure the VM but customer must configure them.

A

IaaS

181
Q

CSP is responsible for the physical components, the internal network, and the tools provided. Cheaper for customer, but less control. Customer is responsible for configuration of application and data access security. CSP is responsible internal network, and the tools provided.

A

PaaS

182
Q

The customer remains responsible for configuring access to the cloud service for their users, as well as shared responsibility for data recovery. CSP owns physical infrastructure, as well as network and communication. CSP may provide the tools for data recovery, but customer may need to perform recovery in some cases.

A

SaaS

183
Q

Maximum utilization of compute resource by a customer (e.g. VM) which are allowed to change dynamically based on current conditions and consumption

A

limits

184
Q

A weighting given to a particular VM used to calculate percentage based access to pooled resources when there is contention. In cases of shortage, host scoring determines who gets capacity.

A

shares

185
Q

A minimum resource that is guaranteed to a customer.

A

reservation

186
Q

The infrastructure components that deliver compute resources, such
as the VMs, disk, processor, memory and network resources.

A

compute

187
Q

The _____ remains responsible for the maintenance and security of the physical components of compute.

A

csp

188
Q

The security of the hypervisor is always the responsibility of the _____.

A

csp

189
Q

– Flawed hypervisor can facilitate inter VM attacks
– Network traffic between VMs is not necessarily visible
– Resource availability for VMs can be impacted
– VMs and their disk images are simply files, can be portable and movable

A

risks associated with virtualization

190
Q

Install all updates to the hypervisor as they are released by the vendor.
Restrict administrative access to the management interfaces of the hypervisor.
Capabilities to monitor the security of activity occurring between guest operating systems (VMs).

A

hypervisor security recommedations

191
Q

Install all updates to the guest OS promptly.
Back up the virtual drives used by the guest OS on a regular basis

A

Security recommendations for the guest OS

192
Q
  • preventing physical access to the servers.
  • limiting both local and remote access to the hypervisor.
A

csp’s hypervisor security

193
Q

T/F: The virtual network between the hypervisor and the VM is also a potential attack surface.

A

True - Responsibility for security in this layer is often shared between the CSP and the customer. These components include virtual network, virtual switches, virtual firewalls, virtual IP addresses, etc.

194
Q

A malicious user breaks the isolation between VMs running on a hypervisor by gaining access outside their VM.

A

VM escape

195
Q

Ensure patches on hypervisor and VMs are always up to date. Ensure guest privileges are low, server level redundancy and HIPS/HIDS protection.

A

Protection from VM escape

196
Q

Whose responsibility:
- physical protection of data centers and the storage infrastructure they contain.
- security patches and maintenance of underlying data storage technologies and other data services they provide

A

csp

197
Q

Whose responsibility:
- properly configuring and using the storage tools.
- logical security and privacy of data they store in the CSP’s environment.

A

customer

198
Q
  • Assessing the adequacy of these controls and properly configuring and using the controls available.
  • Ensuring adequate protection for the data at rest and in motion based on the capabilities offered by the CSP.
  • Configuring secure access, whether private or public.
A

customer storage responsibilities

199
Q

Inability to securely wipe physical storage and possibility of another tenant being allocated the same previously allocated storage space

A

customer storage challenge

200
Q
  • only storing data in an encrypted format
    – retaining control of the keys needed to decrypt the data
A

compensating controls for lack of physical storage

201
Q

Provides the tools (web interface and APIs) necessary to configure, monitor, and control your cloud environment. Provides virtual management options equivalent to the physical administration options a legacy data center would provide.

A

management plane

202
Q

You interact with the _____ through tools including the CSP’s cloud portal, PowerShell or other command line, or client SDKs

A

management plane

203
Q

_____ is what you are calling when you create top level cloud resources with ARM & Bicep (Azure), CloudFormation (AWS) or Terraform (IaC)

A

Control plane

204
Q

Performs operations on resources created through the control plane

A

data plane

205
Q

The main web interface for the CSP platform.

A

cloud portal

206
Q
  • create tenant partitioning or isolation
  • limit and secure remote access
  • monitor the cloud infrastructure
  • allow for the patching and updating of systems
A

things logical data center design should provide

207
Q

Who’s responsible for implementing and enforcing controls that address the unique multitenant risks of the public cloud?

A

CSP and tenant

208
Q

Single login for on premises and cloud

A

hybrid identity

209
Q

– federate a customer’s existing IAM system with their CSP tenant
– identity as a service ( IDaaS

A

methods to facilitate IAM between cloud and on premises

210
Q

the native remote access protocol for Windows operating systems.

A

RDP

211
Q

the native remote access protocol for Linux operating systems, and common for remote management of network devices.

A

SSH

212
Q

a bastion host at the boundary of lower and higher security zones .

A

jumpbox

213
Q

software tools that allow remote connection to a VM for use as if it is your local machine

A

virtual clients

214
Q

Requires significant investment
Offers the most control over datacenter design
Requires knowledge and skill to match quality of other option

A

build

215
Q

Generally, lower cost of entry (especially in shared)
Less flexibility in service design (limited to what provider)
Shared datacenters come with additional security challenges

A

buy

216
Q

A strong fence line of sufficient height and construction
Lighting of facility perimeter and entrances
Video monitoring and alerting
Electronic monitoring for tampering
Visitor access procedures with controlled entry points
Interior access controls (badges, key codes, secured doors)
Fire detection and prevention systems
Protection of sensitive assets, systems, wiring closets, etc.

A

physical security mechanisms

217
Q

simply measures the amount of time a system is running

A

uptime

218
Q

encompasses availability of the infrastructure, applications, and services

A

availability

219
Q
  • Involves no redundancy and the most amount of downtime in the event of unplanned maintenance or an interruption.
  • Must have an uninterruptible power supply that can handle brief power outages, as well as sags and spikes
  • Must also have dedicated cooling equipment that can run on 24/7, and a generator to handle extended power outages expected to provide 99.671% availability
A

Tier 1 - basic site infrastructure

220
Q
  • Provides partial redundancy, meaning an unplanned interruption will not necessarily cause an outage
  • Adds redundant components for important cooling and power systems
  • Facilities must also have the ability to store additional fuel to support the generator
    expected to provide 99.741% availability
A

Tier 2 - redundant site infrastructure

221
Q
  • Adds even more redundant components
  • Has a major advantage in that it never needs to be shut down for maintenance
  • Enough redundant components that any component can be taken offline for
    maintenance and data center continues to run
  • Expected to provide 99.982% availability
A

Tier 3 - concurrently maintainable site infrastructure

222
Q
  • Can withstand either planned or unplanned activity without affecting availability
  • This is achieved by eliminating all single points of failure
  • Requires fully redundant infrastructure, including dual commercial power feeds,
    dual backup generators
  • Expected to provide 99.995% availability
A

Tier 4 - fault-tolerant site infrastructure

223
Q

_____ is an audit standard to enhance the quality and usefulness of System and Organization Control (SOC) reports.

A

SSAE 18

224
Q

Connectivity to data center locations from more than one internet service provider (ISP) is _____.

A

multi vendor pathway connectivity

225
Q

Best practice for CSPs or data centers is _____ for high availability.

A

dual entry, dual provider

226
Q

HA firewalls, active passive or active active
Multi vendor pathway connectivity
Web server farm (behind redundant load balancers)
Database cluster (Windows / Linux cluster feature)

A

resilient design

227
Q

Two risk management frameworks

A
  • ISO/IEC 31000:2018 Risk Management Guidelines
  • NIST SP 800 37, Guide for Applying the Risk Management Framework to Federal Information Systems
228
Q

Assigns a dollar value to evaluate effectiveness of countermeasures. Objective, ensure controls are cost effective.

A

quantitative risk assessment

229
Q

What will the impact be if that goes wrong?

A

Single loss expectancy (SLE) $

230
Q

How likely is it to happen?

A

Annualized Rate of Occurrence (ARO) - decimal

231
Q

ARO =
An incident that happens twice a year has an ARO of
An incident that happens once every two years has an ARO of
An incident that happens once every five years has an ARO of

A

Incidents/Year
2.0
0.5
0.2

232
Q

The possible yearly cost of all instances of a specific realized threat against a specific asset.

A

annualized loss expectancy (ale)

233
Q

SLE x ARO

A

ALE

234
Q
  • Business units
  • Vendor management
  • Privacy
  • Information security
A

risk areas

235
Q

Authentication Risk
Data Security
Supply Chain Risk Management (SCRM)
Geographic dispersion of the CSP data centers
Downtime
Compliance
General technology risk

A

common cloud risks

236
Q

Different threat actors, ranging from competitors and script kiddies to criminal syndicates and state actors. Capabilities depend on tools, experience, and funding. Other external environmental threats, such as fire and floods, and manmade threats, such as the accidental deletion of data or users.

A

external threats

237
Q

A malicious insider, a threat actor who may be a dissatisfied employee (someone overlooked for a promotion). Another internal threat is human error, which is when data is accidentally deleted.

A

internal threats

238
Q
  1. Data Breaches
  2. Misconfiguration and inadequate change control
  3. Lack of cloud security architecture and strategy
  4. Insufficient identity, credential access and key management
  5. Account hijacking
  6. Insider threat
  7. Insecure interfaces and APIs
  8. Weak control plane
  9. “Metastructure ” and “applistructure ” failures
  10. Limited cloud usage visibility
  11. Abuse and nefarious use of cloud services
A

The CSA Egregious 11

239
Q

What’s the most common account hijacking approach?

A

phishing

240
Q

What mitigates insider threat?

A

Job rotation, privileged access management, auditing , security training

241
Q

MFA, RBAC, and key based API access are controls for _____.

A

insecure interfaces and APIs

242
Q

The protocols and mechanisms that provide the interface between the cloud layers, enabling management and configuration.

A

metastructure

243
Q

Applications deployed in the cloud and the underlying application services used to build them.

A

applistructure

244
Q

Selecting a qualified CSP
Designing and architecting with security in mind
Consider security at every step, starting with design
Encryption, and data should be encrypted at rest and in transit. Storage and database encryption at rest, TLS and VPN in transit
Ongoing monitoring and management to maintain posture.

A

risk mitigation strategies

245
Q

– ability to restrict physical access at multiple points
– ensuring a clean and stable power supply
– adequate utilities like water and sewer
– the availability of an adequate workforce

A

physical and environmental protection

246
Q

Visibility, composition of the surrounding area, area accessibility, and the effects of natural disasters.

A

site selection criteria

247
Q

Automation of configuration
Responsibilities for protecting cloud systems and services
Monitoring and maintenance

A

security practices for people and processes

248
Q

Policy and Procedures
Separation of System and User Functionality
Security Function Isolation
Denial of Service Protection
Boundary Protection
Cryptographic Key Establishment and Management

A

system, storage, and communication protection

249
Q

Preventing malicious traffic from entering the network
Preventing malicious traffic from leaving your network
Protecting against data loss (exfiltration)
Configuring rules/policies in routers, gateways, or firewalls

A

boundary protection

250
Q

What is typically enforced with adequate logging and monitoring of system activity?

A

accountability

251
Q

– SaaS apps used as users travel make identifying anomalous / malicious behavior more difficult
– Bad password practices (reuse across services)
– Use of personal devices in BYOD scenarios

A

Cloud challenges in enforcing accountability

252
Q

_____ are the weakest form of authentication

A

passwords

253
Q

Oath tokens create _____

A

one time passwords (OTP)

254
Q

This is a software based authenticator that implements two step verification services using the Time based One time Password Algorithm and HMAC based One time Password algorithm, for authenticating users of software applications.

A

authentication applications

255
Q

This is where the server is pushing down the authentication information to your mobile device. Uses the mobile device app to be able to receive the pushed message and display the authentication information.

A

push notifications

256
Q

This is a collection of domains that have established trust. The level of trust may vary, but typically includes authentication and almost always includes authorization.
Often includes a number of organizations that have established trust for shared access to a set of resources.

A

Federation

257
Q

Refers to the ability to discover relationships between two or more events across logs.

A

correlation

258
Q

Packet capture tools are also called _____

A

protocol analyzers

259
Q

An open source protocol analyzer, with CLI and GUI versions, available for Windows and Linux.

A

Wireshark - packet capture

260
Q

_____focuses on the whole business, while _____ focuses more on the technical aspects
of recovery

A

BCP / DRP

261
Q

The plan to move from the disaster recovery site back to your business environment or back to normal operations.

A

BRP (Business Resumption Plan)

262
Q

A time determination for how long a piece of IT infrastructure will continue to work before it fails.

A

MTBF (Mean Time Between Failures)

263
Q

A time determination for how long it will take to get a piece of hardware/software repaired and back on line.

A

MTTR (Mean Time to Repair)

264
Q

The amount of time we can be without the asset that is unavailable BEFORE we must declare a disaster and initiate our disaster recovery plan.

A

MTD (Max tolerable downtime)

265
Q

The overall organizational plan for “how to” continue business after an event has occurred. A proactive risk mitigation strategy that contains likely scenarios that could affect the organization and guidance on how the organization should respond

A

Disaster Recovery Plan

266
Q

The plan for recovering from an IT disaster and having the IT infrastructure back in operation.

A

DRP (Disaster Recovery Plan) - tech focused

267
Q

This is used to determine which processes are critical and which are not.

A

BIA

268
Q

A BIA typically contains a _____

A

cost benefit analysis (CBA) and a calculation of the return on investment (ROI)

269
Q

The ____ is responsible for determining how to recover in the case of a disaster in the cloud.

A

customer

270
Q

CSPs can further protect customers in disaster by not allowing _____ within a single physical datacenter within a cloud region.

A

two availability zones

271
Q

The plan that details how relevant stakeholders will be informed in event of an incident. Would include plan to maintain confidentiality, such as encryption to ensure that the event does not become public knowledge. Contact list should be maintained that includes stakeholders from the government, police, customers, suppliers, and internal staff.

A

communication plan

272
Q

This is the age of data that must be recovered from backup storage for normal operations to resume if a system or network goes down

A

rpo

273
Q

This is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated
with a break in continuity.

A

rto

274
Q

This measures the compute resources needed to keep production environments running during a disaster. It is a percentage measure (0-100%) of how much computing power you will need during a disaster based upon a percentage of computing used by production environments versus others, such as development, test, and QA

A

recovery service level - rsl

275
Q

design - based on bia priorities
implement the plan
test the plan
report and revise

A

BCDR plan process

276
Q

A BCP and DRP should be tested at least _____

A

annually

277
Q

Members of the disaster recovery team gather in a large conference room and role play a disaster scenario. Usually, the exact scenario is known only to the test moderator, who presents the details to the team at the meeting. The team members refer to the document and discuss the appropriate responses to that particular type of disaster.

A

tabletop testing

278
Q

In this test, some of the response measures are tested (on non critical functions).

A

dry run

279
Q

Involves actually shutting down operations at the primary site and shifting them to the recovery site. When the entire organization takes part in an unscheduled, unannounced practice scenario, of full BC/DR activities.

A

full test

280
Q

✓ multiple availability zones
✓ automatic failover to backup region(s)
✓ direct connection to a CSP.

A

high availability features for disaster recovery