Domain 8: Virtualization and Containers Flashcards
What is the main reason process isolation in a cloud environment is so important?
A. regulatory requirement
B. cost
C. multitenancy
D. effi ciency
Answer: C
In a multitenant cloud environment, if one process could observe another process, or capture data from another process, one cloud customer might gain unauthorized access to other customers. See page 93 of the CSA Cloud Security Guidance v4.
Process isolation might, in fact, aid a cloud provider or customer with compliance for a given standard/regulation, but this is an outcome, not a reason. Process isolation, like all good security practices, will have a negative impact on cost and efficiency.
All of the following are typical security controls available to cloud customers except __________.
A. monitoring and logging
B. cloud provider personnel reviews
C. image asset management
D. use o f dedicated hosting
Answer: B
Typically, cloud customers do not have access to personnel files for cloud provider employees. See pages 93-94 of the CSA Cloud Security Guidance v4.
All the other answers are examples of security controls commonly available to cloud customers.
Which of the following is not considered a major virtualization category, according to the Cloud Security Alliance?
A . compute
B. networking
C. user
D. stor age
Answer: C
We cannot yet virtualize users in most environments. See pages 92, 94, and 97 of the CSA Cloud Security Guidance v4.
One of the reasons software-defined networking (SDN) may be preferable to virtual local area networks (VLANs) in the cloud.
A. VLANs are more expensive
B. VLANs are not approved by regulators
C. VLANs may not provide sufficient isolation
D. VLANs are not as fast as SDNs
Answer: C
See page 94 of the CSA Cloud Security Guidance v4. Clouds are often multitenant environments, so process/data isolation is crucial.
There is no appreciable difference between VLANs and SDNs in terms of cost, regulatory restriction, and speed.
A reason that traditional network monitoring devices deployed in a cloud environment may not work effectively.
A. communication between virtual machines on the same hardware device might not be routed through any physical network
B. auditors cannot review virtual images
C. regulators might insist that a certain process be hosted in a traditional environment
D. certain jurisdictions may outlaw this practice
Answer: A
This is a difficult question. While C may be true (some regulators might require sensitive processes to run in a traditional environment, or may disallow cloud operations), this is the cause of network monitoring devices having less effectiveness in the cloud. A is correct and true. See page 96 of the CSA Cloud Security Guidance v4.
Auditors can review any artifact that is presented to them, including virtualized instances. As far as I know, no jurisdiction has outlawed the use of network monitoring tools in cloud environments; again, this would not be a reason that those tools were less effective.
Instead of using physical firewall appliances, which may not be as effective in the cloud environment, cloud customers may opt for using __________ to achieve the same purpose.
A . strong contract terms
B. the firewall solution(s) offered by the provider
C. digital rights management (DRM)
D. user training
Answer: B
Public cloud providers offer native, cloud-based firewall solutions to accomplish the monitoring tasks that physical firewalls are intended for; these may be a viable option for the cloud customer. See page 96 of the CSA Cloud Security Guidance v4.
While strong contract language is useful in any cloud arrangement, it does not accomplish the same goals that firewalls are meant to accomplish. Likewise, DRM and user training are good practices, and may be used in conjunction with firewalls for defense in depth, they do not offer network monitoring.
Which of the following could be considered the top security priority for cloud providers?
A. protecting their own intellectual property
B. segregating and isolating customer traffic
C. providing maximum bandwidth
D. design ing application programming interfaces (APIs) that optimize customers’ business goals
Answer: B
In a multitenant environment, ensuring that customers cannot see each other’s traffic is absolutely essential. See page 96 of the CSA Cloud Security Guidance v4.
While maximum bandwidth and optimizing APIs are useful to customers, those typically are performance goals, not security goals. The provider protecting its own intellectual property is more about profitability for the provider, and not a paramount security function.
A special kind of wide area network (WAN) virtualization technology used to span multiple “base” networks.
A. virtual local area network (VLAN)
B. Wifi
C. overlay network
D. maximal netw orking
Answer: C
This is the definition of an overlay network. See page 97 of the CSA Cloud Security Guidance v4.
VLANs are used to segment networks. Wifi is a term used to describe the IEEE standard 802.11 for wireless networking (and is actually a trademark of the Wi-Fi Alliance). “Maximal networking” is only a distractor, and has no meaning in this context.
Two common forms of storage virtualization in traditional (on-prem) IT environments. [select two]
A. hypertext transfer protocol (HTTP)
B. virtual local area network (VLAN)
C. storage-area network (SAN)
D. Hippo
E. Apache
F. network-attached storage (NAS)
Answer: C, F
Both SAN and NAS are often used in traditional enterprises. See page 97 of the CSA Cloud Security Guidance v4.
HTTP is used for Web traffic. VLANs are used to segment networks. “Hippo” is purely invented, and has no meaning in this context. Apache is a Web server technology.
What method is commonly used to ensure that swapping out a storage drive won’t inadvertently reveal data?
A. watermarking
B. encryption
C. superimposition
D. steganography
Answer: B
This is one of the many purposes of encryption. See page 97 of the CSA Cloud Security Guidance v4.
Watermarking does not prevent data from being revealed; instead, it is used to assert ownership rights when data is revealed. “Superimposition” is only a distractor, and has no meaning in this context. Steganography is embedding a message of one medium in another, often to convey the message in plain sight.
Which of the following is a highly portable code execution environment?
A. container
B. web server
C. Kerberos
D. OAuth
Answer: A
This is a definition of a container. See page 97 of the CSA Cloud Security Guidance v4.
Web servers host and portray web content. Kerberos is a single sign-on solution.
OAuth is an identity federation standard.
Containers typically provide runtime environments that share a common __________.
A . vernacular
B. operating system (OS)
C. molecular bond
D. kernel
Answer: D
Containers provide isolated areas for individual users, but share the same underlying kernel. See page 97 of the CSA Cloud Security Guidance v4.
“Vernacular” has no meaning in this context; “molecular bond” is a chemistry term– both are used here only as distractors. Containers do not typically include an entire OS.
If data is encrypted at the virtual layer, the data may not be protected from exposure to __________.
A . users
B. external attackers
C. the cloud provider
D. regulato rs
Answer: C
Data encrypted at the virtualization layer may still be exposed to the cloud provider, because the provider has access to the underlying infrastructure, and possibly the encryption mechanism. See page 97 of the CSA Cloud Security Guidance v4.
We generally aren’t using encryption to protect data from users; users need access to the data in order to be productive. Data encrypted at the virtualization layer should be protected from external attack. We also don’t typically use encryption to protect data from regulators, because they need to see some data.
Which of the following is not a component of typical software container systems?
A . the execution environment
B. a GUI interface for user interaction
C. an orchestration and scheduling controller
D. a reposi tory for the container images or code to execute
Answer: B
A GUI is not one of the typical crucial components of a software container system; all the other answers are. See page 98 of the CSA Cloud Security Guidance v4.
Which of the following is not a required security measure for containers, regardless of the type of container?
A. physical security of the underlying hardware
B. securing the management plane
C. properly securing the image repository
D. encrypting the code of the container as it runs
Answer: D
Typically, code is not encrypted as it runs. All the other answers are security measures that should be used to protect containerized environments. See page 98 of the CSA Cloud Security Guidance v4.