Domain 3: Cloud Platform and Infrastructure Security Flashcards
Barry is the CIO of an organization that recently suffered a serious operational issue that required activation of the disaster recovery plan. He would like to conduct a lessons learned session to review the incident. Who would be the best facilitator for this session?
A. Barry, as chief information officer (CIO)
B. Chief Information Security Officer (CISO)
C. Disaster recovery team leader (DRTL)
D. External consultant (EC)
Answer: D. External consultant (EC)
Barry should recruit an independent moderator to facilitate the session. Having a moderator who was not directly involved in the effort encourages honest and open feedback. While it is not necessary to use an external consultant, they may easily fill this role. It’s also possible
to find a qualified internal employee to fill this position, but it should not be someone who was involved in the incident response effort or who has a major stake in the plan, such as Barry, the CISO, or the DR team leader.
If the cloud is used for BC/DR purposes, the loss of ___________________ could gravely affect your organization’s RTO.
A. Any cloud administrator
B. A specific VM
C. Your policy and contract documentation
D. ISP connectivity
Answer: D. ISP connectivity
Without ISP connectivity, nobody will be able to use the internet and, thus, the cloud. Of course, realistically, without internet connectivity not much business will get done
anyway, for most organizations, regardless of whether they were operating in the cloud or on-premises.
Option A is incorrect because the loss of any single cloud administrator is unlikely to gravely affect your organization’s RTO. The loss of a specific VM will probably not gravely affect your organization’s RTO. VMs can
be reinstantiated with ease. Option B is incorrect.
The loss of your policy and contract documentation cannot gravely affect your organization’s RTO. Option C is untrue.
Brent is reviewing the controls that will protect his organization in the event of a sustained period of power loss at his on-premises datacenter. Which one of the following solutions would best meet his needs?
A. Redundant servers
B. Uninterruptible power supply (UPS)
C. Generator
D. RAID
Answer: C. Generator
Generators are capable of providing backup power for a sustained period of time in the event of a power loss, but they take time to activate. Uninterruptible power supplies (UPS) provide immediate, battery-driven power for a short period of time to cover momentary losses of power, which would not cover a sustained period of power loss. Redundant arrays of inexpensive disks (RAID) and redundant servers are high-availability controls but do not
cover power loss scenarios.
Carolyn is concerned that users on her network may be storing sensitive information, such as Social Security numbers, on their hard drives without proper authorization or security controls. What third-party security service can she implement to best detect this activity?
A. IDS
B. IPS
C. DLP
D. TLS
Answer: C. DLP
Data loss prevention (DLP) systems may identify sensitive information stored on endpoint systems or in transit over a network. This is their primary purpose. DLP systems are commonly available as a third-party managed service offering. Intrusion detection and prevention systems (IDSs/IPSs) may be used to identify some sensitive information using signatures built for that purpose, but this is not the primary role of those tools, and they would not be
as effective as DLP systems at this task. TLS is a network encryption protocol that may be used to protect sensitive information, but it does not have any ability to identify sensitive information.
What individuals should have access to the management plane of a cloud datacenter?
A. Service provider engineers
B. Customer engineers
C. End users
D. Both A and B
Answer: A. Service provider engineers
The management plane of a cloud service provider’s datacenter should be reserved for use by that provider’s own engineers. Traffic on the management plane controls the operation of the infrastructure itself, and granting customers (even highly trained engineers) access to that
the network could jeopardize the security of other customers.
Roland is a physical security specialist in an organization that has a large amount of expensive lab equipment that often moves around the facility. Which one of the following technologies would provide the most automation of an inventory control process in a cost-effective manner?
A. IPS
B. Wi-Fi
C. RFID
D. Ethernet
Answer: C. RFID
Radio frequency identification (RFID) technology is a cost-effective way to track items in a facility. While Wi- Fi could be used for the same purpose, it would be much more expensive to implement.
Becka recently signed a contract with an alternate data processing facility that will provide her company with space in the event of a disaster. The facility includes HVAC, power, and communications circuits but no hardware. What type of facility is Becka using?
A. Cold site
B. Warm site
C. Hot site
D. Mobile site
Answer: A. Cold site
A cold site includes the basic capabilities required for datacenter operations— space, power, HVAC, and communications— but it does not include any of the hardware required to restore operations.
Your organization has its production environment hosted in a cloud environment. You are considering using cloud backup services for your BC/DR purposes as well. What would probably be the best strategy for this approach, in terms of redundancy and resiliency?
A. Have your cloud provider also provide BC/DR backup.
B. Keep a BC/DR backup on the premises of your corporate headquarters.
C. Use another cloud provider for the BC/DR backup.
D. Move your production environment back into your corporate premises, and use your cloud provider to host your BC/DR backup.
Answer: C. Use another cloud provider for the BC/DR backup.
It’s best to have your backup at another cloud provider in case whatever causes an interruption in service occurs throughout your primary provider’s environment; this will be more complicated and expensive, but it provides the best redundancy and resiliency. Using the same provider for production and backup is not a bad option, but it entails the risk of the same contingency affecting both copies of your data. Having either the backup or the production environment localized does not provide the best protection, so neither option B nor option D is desirable.
Philip is developing a new security tool that will be used by individuals in many different subsidiaries of his organization. He chooses to use Docker to deploy the tool to simplify configuration. What term best describes this approach?
A. Virtualization
B. Abstraction
C. Simplification
D. Containerization
Answer: D. Containerization
All of these terms accurately describe this use of technology. However, the use of Docker is best described as a containerization technology, so this is the best possible answer choice.
What is the most important asset to protect in cloud BC/DR activities?
A. Intellectual property
B. Hardware at the cloud datacenter
C. Personnel
D. Data on portable media
Answer: C. Personnel
Health and human safety is always paramount in all security activity. All of these assets require some type of protection; however, human safety must always be the highest priority.
Carla is developing the design of a cloud infrastructure service offering that she will be reselling to a number of customers. What component of her stack is most directly responsible for performing tenant partitioning of the virtual machines belonging to different customers?
A. Access control lists
B. Network security group
C. Firewall
D. Hypervisor
Answer: D. Hypervisor
All of these technologies play some role in tenant partitioning. However, this question asked specifically about the partitioning of virtual machines belonging to different tenants. This is the responsibility of the hypervisor on a virtualization platform.
Carlos is planning a design for a datacenter that will be constructed within a new four-story corporate headquarters. The building consists of a basement and three above-ground floors. What is the best location for the datacenter?
A. Basement
B. First floor
C. Second floor
D. Third floor
Answer: C. Second floor
Datacenters should be located in the core of a building. Locating it in the basement makes it susceptible to flooding. The first floor is the normal point of entry to a building, making it more susceptible to physical break-ins. Locating it on the top floor makes it vulnerable to
wind and roof damage.
Chris is an information security professional for a major corporation, and, as he is walking into the building, he notices that the door to a secure area has been left ajar. Physical security does not fall under his responsibility, but he takes immediate action by closing the door and
informing the physical security team of his action. What principle is Chris demonstrating?
A. Due care
B. Due diligence
C. Separation of duties
D. Informed consent
Answer: A. Due care
The due care principle states that an individual should react in a situation using the same level of care that would be expected from any reasonable person. It is a very broad standard. The due diligence principle is a more specific component of due care that states that an individual assigned a responsibility should exercise due care to complete it accurately and in a timely manner.
Roger recently accepted a new position as a security professional at a company that runs its entire IT infrastructure within an IaaS environment. Which one of the following would most likely be the responsibility of Roger’s firm?
A. Configuring the network firewall
B. Applying hypervisor updates
C. Patching operating systems
D. Wiping drives prior to disposal
Answer: C. Patching operating systems.
In an infrastructure as a service environment, the vendor is responsible for hardware-related and network-related responsibilities. These include configuring network firewalls, maintaining the hypervisor, and managing physical equipment. The customer retains responsibility for patching operating systems on its virtual machine instances. The customer is responsible for managing network ingress and egress, but, does so by manipulating network security groups, rather than directly configuring the network firewall.
In addition to the security controls implemented by the cloud provider, a cloud customer must consider the security controls implemented by ___________________.
A. The respective regulator
B. The end user(s)
C. Any vendor the cloud customer previously used in the on-premises environment
D. Any third parties the provider depends on
Answer: D. Any third parties the provider depends on
Because supply chain dependencies can affect service, the cloud customer will need assurance that any third-party reliance is secure.
Regulators and end users do not provide security to the enterprise, so options A and B are incorrect.
The vendors used for on-premises security will no longer affect the data, so option C is incorrect.
Alyssa’s team recently implemented a new system that gathers information from a variety of log sources, analyzes that information, and then triggers automated playbooks in response to security events. What term best describes this technology?
A. SIEM
B. Log repositories
C. IPS
D. SOAR
Answer: D. SOAR
Security information and event management (SIEM) systems do correlate information from multiple sources and perform analysis, but they stop short of providing automated playbook responses. That is the realm of security orchestration, automation, and response
(SOAR) platforms. Intrusion prevention platforms have a more limited scope, allowing the blocking of traffic based on analysis performed by the IPS itself. Log repositories simply collect log information and do not perform analysis.
Candace is designing a backup strategy for her organization’s file server. She would like to perform a backup every weekday that has the smallest possible storage footprint. What type of backup should she perform?
A. Incremental backup
B. Full backup
C. Differential backup
D. Transaction log backup
Answer: A. Incremental backup
Incremental backups provide the option that includes the smallest amount of data. In this case, that would be only the data modified since the most recent incremental backup. A differential backup would back up all data modified since the last full backup, which would
be a substantial amount. The full backup would include all information on the server. Transaction log backups are specifically designed to support database servers and would not be effective on a file server.
Nick is evaluating options for his organization’s future datacenters. Which one of the following options normally incurs the largest up-front cost?
A. Colocation facilities
B. Cloud datacenters
C. On-premises datacenters
D. SaaS offerings
Answer: C. On-premises datacenters
This is a classic example of the “buy vs. build” decision. Any time an organization chooses to build out capital resources, such as an on-premises datacenter, it involves very high up-front investments. The other offerings here involve leveraging the capital investments made by others and will involve lower (or no) up-front costs, but will have higher recurring costs.
Ben is an IT auditor and would like to ensure that the organization has mechanisms in place to create an appropriate audit trail for systems and applications. Which one of the following technologies aggregates and correlates log entries?
A. SIEM
B. IPS
C. EDR
D. CASB
Answer: A. SIEM
Security information and event management (SIEM) solutions aggregate log entries from many different sources and correlate them to create an interpretable audit trail. Intrusion prevention systems (IPSs) analyze and block suspicious network traffic. Endpoint detection and response (EDR) platforms monitor endpoints for malware and respond to malware infections. Cloud access security brokers (CASBs) enforce an organization’s security policies
across cloud providers. IPS, EDR, and CASB solutions are important components of an organization’s security program, but they do not aggregate and correlate log entries.
Brittney is reviewing her organization’s disaster recovery process data and notes that the MTD for the business’s database server is 30 minutes. What does she know about the RTO for the server?
A. It needs to be less than 30 minutes.
B. It needs to be at least 30 minutes.
C. The MTD is too short and needs to be longer.
D. The RTO is too short and needs to be longer.
Answer: A. It needs to be less than 30 minutes.
When Brittney reviews the recovery time objective (RTO) data, she needs to ensure that the organization can recover from an outage in less than 30 minutes based on the maximum tolerable downtime (MTD) of 30 minutes.
Cameron is worried about distributed denial-of-service (DDoS) attacks against his company’s primary web application. Which of the following options will provide the most resilience against large-scale DDoS attacks?
A. Implement a CDN.
B. Increase the number of servers in the web application server cluster.
C. Contract for DDoS mitigation services via the company’s ISP.
D. Increase the amount of bandwidth available from one or more ISPs.
Answer: A. Implement a CDN.
A content delivery network (CDN) run by a major provider can handle large-scale DDoS attacks more easily than any of the other solutions. Using DDoS mitigation techniques via an ISP is the next most useful capability, followed by both increases in bandwidth and increases in the number of servers in the web application cluster.
John’s network begins to experience symptoms of slowness. He launches a packet capture tool and realizes that the network is being bombarded with TCP SYN packets and believes that his organization is the victim of a Denial-Of-Service (DOS) attack. What principle of information security is being violated?
A. Availability
B. Integrity
C. Confidentiality
D. Denial
Answer: A. Availability
A denial- of- service (DoS) attack is designed to overwhelm a system until it is unable to process legitimate requests.
The purpose of this attack is to deny legitimate users access to the system, which is a violation of the principle of availability.
Mike recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is
Mike pursuing?
A. Risk acceptance
B. Risk avoidance
C. Risk mitigation
D. Risk transference
Answer: C. Risk mitigation
Risk mitigation strategies attempt to lower the probability and/or impact of a risk occurring. Intrusion prevention systems attempt to reduce the probability of a successful attack and are, therefore, examples of risk mitigation.
You are trying to determine the critical assets that your organization must protect in your BC/DR activities. Which one of the following artifacts would be most useful in your work?
A. Quantitative risk analysis
B. Qualitative risk analysis
C. Business impact analysis
D. Risk appetite
Answer: C. Business impact analysis
The business impact analysis (BIA) is designed for this purpose: to determine the critical path of assets/resources/data within the organization. It is a perfect tool to use in shaping the BC/DR plan.
The risk analyses options and the risk appetite option may provide input for the BIA, but they are not what is used to determine the critical assets necessary to protect in the BC/DR activity. So, options A, B, and D are incorrect.