Domain 5: Cloud Security Operations Flashcards
What term is used to describe agreements between IT service providers and customers that describe service-level targets and responsibilities of the customer and provider?
A. OLA
B. SAC
C. SLA
D. SLR
Answer: C. SLA
A service-level agreement (SLA) defines service-level targets and the responsibilities of the IT service provider and customer. An OLA (operational level agreement) is an internal agreement between the IT service provider and another part of the same organization and
supports the service provider’s delivery of the service. Service acceptance criteria (SAC) are the criteria used to determine whether a service meets its quality and functionality goals.
Finally, a service-level requirement (SLR) defines the requirements of a service from the customer’s perspective.
Sally is building her organization’s communication plans and knows that customers are an important group to include in the plan. What key function does proactive customer communication help with?
A. Notification of breaches
B. Regulatory compliance
C. Managing expectations
D. Problem management
Answer: C. Managing expectations
Proactive customer communications are key to managing expectations. Reactive communications are often used for data breach notification, regulatory compliance, and problem management.
Juanita has discovered unexpected programs running on her freshly installed Linux system that was built using her cloud provider’s custom Linux distribution, but that did not allow connections from the internet yet. What is the most likely reason for this?
A. Juanita inadvertently installed additional tools during the installation process.
B. The version of Linux automatically downloads helper agents when installed.
C. Cloud vendors often install helper utilities in their own distributions.
D. Attackers have installed applications.
Answer: C. Cloud vendors often install helper utilities in their own distributions.
Juanita knows that the major cloud vendors provide their own customized versions of Linux that often include additional agents and tools to help them work better with the provider’s infrastructure. She should verify that this is the case, but it is the most likely scenario for a freshly built system as described.
Ben wants to manage operating system and application patches for thousands of machines hosted in an infrastructure as a service vendor’s cloud. What should he do?
A. Use the cloud vendor’s native patch management tools.
B. Use the operating system vendor’s patch management tools.
C. Use manual update processes.
D. Write custom scripts to manage updates.
Answer: A. Use the cloud vendor’s native patch management tools.
When managing systems at scale in the cloud, Ben knows that the best option is often to use the cloud IaaS vendor’s tools, particularly because they are typically designed to handle both operating systems that may have special features to work in the vendor’s environment and applications.
Jason’s organization is required to provide information about its cloud operating environment, including yearly audit information to regulators in his industry. What is he most likely to be able to provide to the regulators when they ask for a security audit of his hosted
environment?
A. A recent audit conducted by staff from Jason’s organization
B. A recent audit conducted by a third-party auditor hired by Jason’s organization
C. Direct audit permissions for the regulators to audit the cloud provider
D. A copy of the cloud provider’s third-party audit results
Answer: D. A copy of the cloud provider’s third-party audit results
Jason knows that cloud service providers typically do not allow direct or third-party audits of their systems and services, but that they do provide audit results to customers.
Tracy has set up a cloud hardware security module (HSM) service for her organization in her cloud-hosted environment. What activity is she preparing for?
A. Securely storing and managing secrets
B. Ensuring end-to-end encryption between cloud and on-site systems
C. Managing the security of the underlying hardware in the environment
D. Detecting attacks against hosted systems
Answer: A. Securely storing and managing secrets
A cloud hardware security module (HSM) is used to create, store, and manage secrets.
Charles wants to be able to create new servers as needed for his environment, using variables and configuration files to configure the systems to meet changing needs. What type of solution should he implement to help with this type of orchestration?
A. A CI/CD pipeline
B. Infrastructure as code
C. A check-in/checkout design
D. An application interface
Answer: B. Infrastructure as code
Charles knows that his situation calls for an infrastructure as code (IaaC) design, which uses code and configuration files or variables to allow rapid deployment using scripts and automated tools. A CI/CD pipeline will often leverage infrastructure as code and automation tools, but it doesn’t directly meet this need. APIs (application programming interfaces)
are used to access data from services, and check- in/checkout design was made up for this question.
James wants to establish key performance indicators for his service continuity management practice based on ITIL. Which of the following is a useful KPI for service continuity management?
A. The number of business processes with continuity agreements
B. The number of vulnerabilities found in installed software per period of time
C. The number of patches installed per period of time
D. The number of natural disasters in the local area in a year
Answer: A. The number of business processes with continuity agreements
From a service continuity management perspective, the number of business processes with continuity agreements is the only relevant answer from this list. Understanding the number of business practices that have continuity planning in place and assessing which gaps in coverage are critical is a common practice to improve service continuity.
Zoe wants to speed up her traditional release management process. What modern approach is best suited to an ITIL v4–based rapid-release-oriented organization?
A. Waterfall
B. Agile/DevOps
C. Spiral
D. RAD
Answer: B. Agile/DevOps
Agile and DevOps are well-suited to rapid release cycles, with continuous integration and continuous delivery processes. Waterfall and spiral both tend to take longer periods of time for each release, and RAD is not as widely adopted and not as release focused.
ITIL v4 includes a seven-step continual improvement model. What item occurs at the end of the process before it starts again?
A. Determining the vision
B. Assessing results
C. Taking action
D. Determining the goal
Answer: B. Assessing results
Assessing results occurs at the end of the seven-step process, helping provide feedback into the next cycle’s vision determination phase.
Tim puts a server in his virtualization environment into maintenance mode. Which of the following events will occur?
A. Migrates the running virtual machines to other hardware
B. Pauses all running VMs immediately
C. Sends a notification to users, then pauses running VMs
D. Marks the machine as unavailable for new VMs
Answer: A. Migrates the running virtual machines to other hardware
Maintenance mode migrates virtual machines to other hosts or waits until they are powered down to allow for hardware or other maintenance. Tim knows that he’ll need to ensure all VMs are migrated or shut down, and that he can then perform maintenance.
Kathleen wants to centralize her log capture and analysis capabilities and use automated tools to help her identify likely security issues. What type of tool should she look for?
A. SIEM
B. IPS
C. CASB
D. MITRE
Answer: A. SIEM
Kathleen should look for a security information and event management (SIEM) tool. They’re used to centralized log collection, analysis, and detection capabilities and often have automated methods of finding issues and alerting on them. An IPS (intrusion prevention system) is used to detect and stop attacks, a CASB (cloud application security broker) is used to control and manage access to cloud services, and MITRE is a U.S. government–funded research organization with a heavy focus on security work.
Elaine wants to ensure that traffic is encrypted in transit. What technology is commonly used to secure data in transit?
A. VLANs
B. TLS
C. DNSSEC
D. DHCP
Answer: B. TLS
TLS (Transport Layer Security) is an encryption protocol used to secure data in transit. VLANs are used to logically separate network segments, DNSSEC is intended to provide security to domain name system requests, and DHCP provides IP addresses and other network configuration information to systems automatically.
Ujama wants to protect systems in his environment from being accessed via SSH. What should he do if he needs to leave the service available for local connections?
A. Block inbound connections to TCP port 3389 on his firewall.
B. Block outbound connections to TCP port 3389 on his firewall.
C. Block inbound connections to TCP port 22 on his firewall.
D. Block outbound connections to TCP port 22 on his firewall.
Answer: C. Block inbound connections to TCP port 22 on his firewall.
Blocking inbound connections to port 22, the default SSH port will stop attackers and third parties from outside of the network from accessing SSH as long as it hasn’t been changed to another port. TCP3389 is associated with RDP.
Ron wants to use a central system to store information about system and software configurations and their relationships. What tool is often used for this to support standards-based configuration management practices like those found in ITIL v4?
A. CRM
B. CMDB
C. Configuration item
D. Change catalog
Answer: B. CMDB
A configuration management database (CMDB) is frequently used in mature standards-based configuration management environments where it stores both configuration management and information about relationships between configuration items (CIs). CRMs are customer relationship management tools and aren’t part of the CCSP exam. A change catalog was made up for this question.
Maria’s manager is concerned about patching for the underlying cloud environment that her platform as a service (PaaS) vendor provides. What should Maria tell her manager?
A. Maria’s organization is responsible for patching and needs to set up a regular patch cycle.
B. The vendor is responsible for patching, and there is no patching that needs to be done by customers in a PaaS environment.
C. Negotiations need to be done with the vendor to determine which organization is responsible for patch management.
D. The contract will determine which organization is responsible for patch management.
Answer: B. The vendor is responsible for patching, and there is no patching that needs to be done by customers in a PaaS environment.
Maria knows that PaaS environments are patched by the vendor and that she does not need to perform patching of the software or cloud service. She may, however, have to decide when to adopt patches or versions— although she won’t be able to delay adopting new versions forever!
ITIL v4 describes three subprocesses related to availability management. What are these three subprocesses?
A. Designing services for availability, disaster recovery testing, and determining availability targets
B. Availability management, availability metrics, and availability improvement
C. Designing services for availability, availability testing, availability monitoring, and reporting.
D. Availability planning, availability improvement, availability validation
Answer: C. Designing services for availability, availability testing, and availability monitoring and reporting.
The ITIL subprocesses for availability management are designing services for availability, availability testing, and availability monitoring and reporting. Even if you’re not familiar with ITIL, thinking about a standards-based approach to availability might help you design, testing, and monitoring are all logical steps in a process like this.
Naomi’s organization has recently experienced a data breach. Which of the following parties is least likely to require notification based on existing contracts or regulations?
A. Customers
B. Vendors
C. Regulators
D. Partners
Answer: B. Vendors
Vendors are the least likely to have contractual or regulatory requirements that mean that they must be notified. Vendors often have to tell their customers about breaches, but customers typically do not need to tell their vendors!
Megan is starting her organization’s change management practices. She has conducted an asset inventory. What step is typically next in a change management process?
A. Creating a baseline
B. Deploying new assets
C. Establishing a CMB
D. Documenting deviations from the baseline
Answer: A. Creating a baseline
Megan’s next step once she has an inventory is to create a baseline. With that in hand she can establish a CMB, deploy new assets configured to meet the baseline, and document deviations that the CMB approves if needed.
Dan wants to use clipboard-based drag and drop between his virtualized desktops in a Type 2 hypervisor environment. Which of the following steps is most likely to allow him to access additional features that require virtualization environment integration to work?
A. Building the virtual machines as containers
B. Installing guest operating system virtualization tools
C. Installing virtualization environment orchestration tools
D. Building the containers as virtual machines
Answer: B. Installing guest operating system virtualization tools
Guest operating system virtualization tools add additional functionality like use of GPUs, shared clipboards, and drag and drop between guest operating systems, shared folders, and similar features that require additional integration between the guest OS and the underlying
hypervisor and hardware.
Geoff knows that ITIL v4 focuses on four information security management practices. Which of these processes could involve an SOC 2 Type 2 audit?
A. Design of security controls
B. Security testing
C. Management of security incidents
D. Security review
Answer: D. Security review.
The security review objective focuses on whether security practices and procedures align to risk tolerance for the organization and includes verification and testing like an SOC 2 Type 2 audit does. Design, testing, and management of incidents involve the topics they describe.
Eleanor wants to build her organization’s change management processes. What is the typical first step for change management efforts?
A. Policy creation
B. Baselining
C. Documentation creation
D. Vulnerability scanning
Answer: B. Baselining
Configuration management typically starts with baselining. While policies and documentation are important, creating a baseline allows organizations to understand what they have and what state it is in, a critical part of the change management practice.
Theresa is building an automated CI/CD pipeline. She wants to ensure that code that passes through the pipeline is secure before it moves from staging to production. What is her best option if she wants to test the running application?
A. Manual static code review
B. Automated code review
C. Using a web application firewall
D. Using an IPS
Answer: B. Automated code review
Ensuring that the code itself is secure in an automated process requires a tool that can be run as part of the process. That means that the only option from the list that is viable is an automated review of code. Manual static code review isn’t a good fit for a CI/CD pipeline in
most cases due to speed requirements. WAFs and IPSs can help protect the application, but again, they don’t test the code or make the application itself more secure.
The Cloud Security Alliance’s Cloud Incident Response (CIR) framework documents typical breakdowns for customer versus cloud provider responsibilities in incident response, including pointing to cloud providers as being responsible for almost all risks in an SaaS
environment. In an IaaS environment, who is responsible for network risks?
A. The customer
B. Both the customer and the service provider
C. The service provider
D. Third-party incident responders
Answer: B. Both the customer and the service provider
Since IaaS provides the customer with access to and control over some of the network, they must take responsibility for network-based risks. The IaaS provider provides services and infrastructure, and thus must take responsibility for some of the network-based risks as well. Third-party incident responders do not play a role in risk responsibility in this model.