Domain 4: Cloud Application Security Flashcards
Mikayla wants to validate a component of her software that she has downloaded from GitHub. How can she validate that the underlying software does not have security flaws when it is downloaded and included in her environment as part of her integration process?
A. Validate the checksum of the file.
B. Validate the signature of the file.
C. Validate the hash of the file.
D. Mikayla cannot ensure that there are no security flaws via the options described.
**Answer: **
Lin wants to allow her users to use existing credentials provided by a third-party identity provider when they access her service. What element will she have to provide from the following list?
A. User IDs
B. Authentication
C. Authorization
D. Identity proofing
**Answer: **
Joanna’s software vendor does not provide source code to their clients. In the following list, what is her best option to test the security of the vendor’s software package?
A. C. Perform static analysis of the software.
B. Implement pair-programming techniques.
Review the software for hard-coded secrets.
D. Perform dynamic testing.
**Answer: **
What SDLC model is most frequently associated with cloud development processes?
A. Agile
B. RAD
C. Spiral
D. Waterfall
**Answer: **
Susan wants to avoid common pitfalls in cloud application development. Which of the following pitfalls is frequently associated with cloud environments?
A. Reliability of applications built in the cloud
B. Scalability of applications built in the cloud
C. Redundancy of applications built in the cloud
D. Security of applications built in the cloud
**Answer: **
Susan wants to avoid issues with data integration. She is aware that the OWASP Cloud Top 10 includes service and data integration security issues, and is deploying a REST-based
API for her customers to use when accessing her service. She is using API keys, but she is concerned about third parties intercepting and accessing the data. What should she include in her implementation to address this concern?
A. Data tokenization
B. Ensure encryption at rest
C. Ensure encryption in transit
D. Data masking
**Answer: **
Ben wants to gather business requirements for his software development effort and is using an Agile methodology. Which of the following is not a common means of gathering user requirements in an Agile process?
A. Brainstorming
B. Documentation review
C. User observation
D. Surveys
**Answer: **
Encryption at rest is a protective design element included in SDLCs for cloud environments due to what common cloud design motif?
A. Rapid elasticity
B. Multitenancy
C. Measured services
D. Scalability
**Answer: **
Nick wants to avoid common pitfalls in his CI/CD pipeline. Which of the following is a common CI/CD pitfall that can harm cloud development efforts?
A. Automation of processes
B. Use of metrics
C. Using multiple deployment paths
D. Reliance on a version control system
**Answer: **
Maria wants to integrate her existing identity provider with her cloud provider’s services. What common standard is used for most cloud identity provider integration?
A. IDPL
B. OpenLDAP
C. SAML
D. ConnectID
**Answer: **
Jack wants to enable his team to develop cloud- native applications. Which of the following is
not a common element in a cloud- native application design?
A. Optimized assembly code
B. Automated release pipelines
C. Containers
D. Microservices
**Answer: **
At which phase of the software development life cycle (SDLC) is user involvement most
crucial?
A. Define
B. Design
C. Development
D. Test
**Answer: **
Brian wants to ensure that he takes the OWASP Top 10 Cloud risks into account in his
development process. He knows that regulatory compliance is on the list, and he wants to
include it in the SDLC. During what phase of the SDLC would it make the most sense to
consider regulatory compliance?
A. Analysis and requirements definition
B. Design
C. Implementation
D. Testing
**Answer: **
The testing process that Angie is using for her organization includes access to the design spec-
ifications, source code, and running applications. What type of security testing methodology
is she using?
A. White box
B. Gray box
C. Red box
D. Black box
**Answer: **
The CWE/SANS Top 25 most dangerous software errors includes the use of hard- coded
credentials. What common cloud service component can be used to avoid this problem for
cloud- hosted software and applications?
A. An MFA token
B. A TPM
C. A KMS
D. An API key
**Answer: **
Dana’s organization requires an SBOM for each application it deploys. What OWASP
Top 10 item does an SBOM help to avoid?
A. Vulnerable and outdated components
B. Broken access control
C. Injection
D. Security misconfiguration
**Answer: **
The company that Yun works for provides API access to customers. Yun wants to rate- limit
API access and gather billing information while using a central authorization and access
management system. What type of tool should Yun put in place to meet these requirements?
A. An API gateway
B. An API proxy
C. An API firewall
D. A next- generation API manager
**Answer: **
What phase of the SDLC is IAST typically associated with?
A. Design
B. Testing
C. Implementation
D. Deployment
**Answer: **
Gary’s cloud service provides customers with access to APIs. Which of the following is a
common security flaw in APIs?
A. Use of unstructured data
B. Lack of authentication
C. Use of semi- structured data
D. Lack of encryption
**Answer: **
Dan wants to encrypt data at rest in his cloud environment. What encryption standard
should he look for when encrypting data at rest?
A. TLS
B. AES- 256
C. SSL
D. Blowfish
**Answer: **
Mark wants to ensure that his software vendor is using industry best practices as part of
their software validation process. He knows that NIST defines a number of recommended
minimums for verification of code by developers. Which of the following is not a NIST
recommended minimum standard for vendor or developer verification of code?
A. Use automated testing.
B. C. Perform code- based (static) analysis.
Only check internally developed software.
D. Conduct threat modeling.
**Answer: **
Lori wants to ensure that the included software components provided by her vendor are
secure. What type of process should she use to conduct an assessment of those packages?
A. A web application vulnerability scan
B. A software composition analysis
C. A vulnerability scan
D. A version number validation process
**Answer: **
Christine has documented a software testing user story that states: “As an attacker, I will
upload malicious software as part of my form submission which will exploit the parsing
software that reads user submissions.” What type of testing is Christine preparing for?
A. Abuse case testing
B. Static testing
C. QA testing
D. SCA testing
**Answer: **
OWASP’S Application Security Verification Standard (ASVS) has three primary usage models.
Which of the following is not an intended usage model based on its design objectives?
A. To be used as a metric
B. To be used for auditing
C. To be used as guidance
D. To be used during procurement
**Answer: **