Enisa Cloud Security - Benefits, Risks, and Recommendations for Information Security Flashcards

1
Q

According to ENISA, is cloud computing a benefit or a risk to security?
A. benefit
B. risk
C. neither
D. both

A

Answer: D
According to the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security (page 4), cloud computing’s economies of scale and flexibility are “both a friend and a foe from a security point of view.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to ENISA, which of the following is not one of the top security benefits of cloud computing?
A. benefits of scale
B. market differentiation
C. training opportunities
D. standardized interfaces

A

Answer: C
According to the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security (pages 7-8), all the answers except for D are top security benefits of the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to ENISA, which of the following is not one of the top security risks associated with cloud computing?
A. insecure or incomplete data deletion
B. wide potential for human error
C. data protection
D. compliance risks

A

Answer: B
According to the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security (pages 9-10), all of the answers except for B are top security risks associated with cloud computing. This is a nuanced question, because “malicious insiders” is one of the top security risks listed in the ENISA document. The crucial difference between the answer listed and the element listed in the ENISA guidance is malice versus error; the intent of the person involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to ENISA, vendor lock-in is rated as a __________ level of risk in the cloud.
A. high
B. medium
C. low
D. not applicable

A

Answer: A
See page 25 of the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following standards is not mentioned by ENISA in the context of secure software assurance?
A. HIPAA
B. OWASP
C. SANS
D. SAFECode

A

Answer: A
HIPAA is a US federal law that applies to medical providers and their business associates; all the other answers are software security standards mentioned in the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security (see page 73).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to ENISA, which is more difficult and less common: attacking the resource isolation mechanisms in a cloud environment (such as the hypervisor), or attacking the operating systems (OSs) in a traditional computing environment?
A. cloud resource isolation mechanisms
B. traditional Oss
C. they are equally difficult and common
D. neither type of attack ever occurs

A

Answer: A
According to the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security, attacks on cloud resource isolation mechanisms is more difficult and less common than attacking traditional OSs (see page 9 of that document). Therefore, A is correct, and B and C are incorrect.
Attacks on both occur constantly, so D is incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not an example of an economic denial of service attack against a cloud environment, according to ENISA?
A. identity theft
B. cache poisoning
C. unexpected resource consumption
D. attacker consuming the customer’s metered service

A

Answer: B
Cache poisoning is not one of the types of attacks listed in the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security entry on economic denial of service (see page 41). All the other answers are listed in that entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is not a cloud customer asset that might be affected by the risks associated with licensing, according to ENISA?
A. company reputation
B. software
C. service delivery
D. certification

A

Answer: B
Typically, the software is the asset being licensed, not something affected by failure to properly license it. All the other answers are assets affected by licensing risks. See page 47 of the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is “VM hopping”?
A. the attacker exceeds the resources of the target VM (such as CPU or RAM)
B. the attacker makes multiple copies of the target’s VM
C. the attacker deletes the target’s VM
D. the attacker exploits a vulnerability in the hypervisor and can access other VMs

A

Answer: D
This is the definition of VM hopping, from the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security, page 54.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not one of the fundamental legal issues associated with all cloud scenarios?
A. data protection
B. user training
C. intellectual property
D. professional negligence

A

Answer: B
User training is a security issue, but not necessarily a legal issue associated with cloud computing. See page 97 of the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__________ is one way to enhance portability, and avoid vendor lock-in.
A. use only a single cloud vendor for all cloud computing needs
B. adopt an open standard, such as OVF (the open virtualization standard)
C. use only private clouds
D. use cloud providers only in a single geographic region

A

Answer: B
The ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security (page 27) recommends using standards such as OVF to ease cloud migrations.
Each of the other answers does not help with portability, and may, in fact, make migration more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which party is typically the data controller, in most cloud service arrangements?
A. the cloud provider
B. the cloud customer
C. the regulator
D. the data subject

A

Answer: B
The cloud customer is typically the data controller. See page 66 of the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which party is typically the data processor, in most cloud service arrangements?
A. the cloud provider
B. the cloud customer
C. the regulator
D. the data subject

A

Answer: A
The cloud provider is typically the data processor. See page 66 of the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In an IaaS cloud service model, who is responsible for monitoring guest systems?
A. the auditor
B. the regulator
C. the cloud provider
D. the cloud customer

A

Answer: D
See page 68 of the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is one of the underlying vulnerabilities associated with malicious probes and scans of the cloud environment?
A. increase in shadow IT
B. social engineering
C. the possibility that internal network probing will occur
D. governmental overreach

A

Answer: C
According to the the ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security (page 42), internal probes are one of the underlying vulnerabilities related to malicious probes/scans.
All the other answers are not included in the list of underlying vulnerabilities for that risk in that document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly