Flashcards in “CCSK: Certificate of Cloud Security Knowledge 6 of 6 Practice
What are the Three Vs of big data according to the CSA?
A.High velocity, high volume, high variance
B.High velocity, high volume, high variety
C.High validation, high volume, high variety
D.High value, high variance, high velocity
B.High velocity, high volume, high variety
Explanation:
he Three Vs are high volume, high velocity, and high variety. This means a big data system has to process a high volume of data that is coming in at a high rate of speed and that can be in multiple formats (structured, unstructured, and streamed).
Which of the following is not considered a serverless platform according to the CSA?
A.Load balancer
B.DNS Server
C.Notification service
D.Object storage
B.DNS Server
Explanation:
The DNS server is not a serverless option according to CSA. Hold on, because there’s a learning lesson to be had here. Providers may very well offer a DNS service to customers. That’s not what is written here, though. Take your time when reading questions on your exam to make sure you aren’t tricked by wording. You can absolutely build your own DNS server in an IaaS environment, or you can consume a DNS service if the provider offers one. The other possible answers are listed as serverless platforms.
When should input validation be performed?
A.When using the cloud as the backend for mobile applications
B.When using the cloud as the backend for IoT devices
C.When using cloud services to support a big data system
D. All of these
D. All of these
Explanation:
It is a security best practice always to perform input validation on any incoming network traffic. This includes all the technologies listed.
According to the CSA, what is an/are attribute(s) of the cloud that makes it ideal to support mobile applications?
A.Cost of running required infrastructure
B.Distributed geographical nature of cloud
C.Inherent security associated with cloud service
D.Both (Distributed geographical nature of cloud) and (Inherent security associated with cloud services)
B.Distributed geographical nature of cloud
Explanation:
The only listed attribute in the CSA Guidance regarding mobile application suitability for the cloud is the geographical nature of cloud. Yes, a cloud environment may be more secure, but this is, of course, a shared responsibility. You are never guaranteed that running in the cloud will be cheaper than running systems in your own data center.
Which of the following is listed by ENISA as a way for SaaS or PaaS providers to protect their customers?
A.Provider should have redundant storage in place
B.Providers should have source code escrow agreement in place
C.Customers should have contractual agreements that list penalties for loss of code
D.All of these are correct
B.Providers should have source code escrow agreement in place
Explanation:
To ensure that SaaS or PaaS software is not orphaned or abandoned in the event of a provider’s failure, customers should seek to ensure that providers have a code escrow agreement in place with a third-party escrow agent. Although the other answers are good ideas for protecting customers, only code escrow agreements are listed in the ENISA documentation.
According to the ENISA documentation, which of the following may be used in IaaS to address portability?
A.OVF
B.WAF
C.IAM
D.DAM
A.OVF
Explanation:
The ENISA document calls open virtualization format (OVF) as potentially beneficial to address portability in an IaaS environment.
Why is data deletion considered a top security risk according to ENISA?
A.because of the shared nature of storage
B.Because of the inability to verify that data is adequately deleted
C.Because SSD drives cannot reliably wipe data
D.Both (Because of the shared nature of storage) and (Because of the inability to verify that data is adequately deleted)
D.Both (Because of the shared nature of storage) and (Because of the inability to verify that data is adequately deleted)
Explanation:
Insecure or incomplete data deletion is a risk in cloud because of the shared nature of storage and the inability to verify that data is adequately deleted. Although SSD wiping is possible (only with vendor-supplied tools), this is not listed as a reason in the document. It is also not true that all providers use SSD for storage of customer data.
Select the unessential characteristic of cloud computing out of the given options.
A.Third Party Service
B.Broad Network Access
C.Rapid Elasticity
D.Measured Service
A.Third Party Service
Logical design of data center might be affected by which of the following topics?
A.Virtualization technology
B.Cloud management plane
C.Multi tenancy
D.All of the above
D.All of the above
Which guideline/s of the following should be followed when utilizing encryption? 1. Encrypt using sufficiently durable encryption strengths 2. Use open, validated formats 3. Use proprietary encryption formats whenever possible
A.All of these B.Only 1 and 3 B.Only 2 and 3 C.None of these E.Only 1 and 2
E.Only 1 and 2
Storage encryption provides protection against what?
A.Side channel attacks
B.APT
C.Hardware theft
D.SQL Injection
C.Hardware theft
What is a Controller in the context of Privacy and Data Protection?
A.A natural or legal person, public authority, agency or any other body which processes personal data on behalf of the Customer
B.The natural or legal person, public authority, agency, or any other body which alone or jointly with others determines the purposes and means of the processing of personal data
C.One who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specified to his/her physical, physiological, mental, economic, cultural or social identity
B.The natural or legal person, public authority, agency, or any other body which alone or jointly with others determines the purposes and means of the processing of personal data
The “authentication” component of identity, entitlement and access management (IdEA) are best defined by which of the following?
A.The process of specifying and maintaining access policies
B.Establishing/asserting the identity to the application
C.Updating security protocols to the latest version
D.A guarantee that data in repository is 100% regulated
B.Establishing/asserting the identity to the application
What is an ENISA: an example of a user provisioning vulnerability?
A.Credentials are vulnerable to interception and replay
B.Poorly managed backups or archival systems
C.Government access to biometric information
D.Remote access to management interface
A.Credentials are vulnerable to interception and replay
To address application security in a Cloud Computing environment how should an SDLC be modified?
A.Updated threat and trust models
B.Integrated development environments
C.No modification needed
D.Just-in-time compilers
A.Updated threat and trust models
How often should incident response testing occur?
A.Semi-annually
B.Quarterly
C.Monthly
D.Annually
D.Annually
Which logical model holds the management plane that is exposed to customers?
A.Infostructure
B.Applistructure
C.Metastructure
D.Infrastructure
C.Metastructure
Explanation
The management plane is part of the metastructure logical model.
You are running a web server in an IaaS environment. You get a call from a customer saying the server appears to have been compromised. Which logical model has been impacted?
A.Infostructure
B.Applistructure
C.Metastructure
D.Infrastructure
B.Applistructure
Explanation
The web server is part of the applistructure. The controls surrounding the web server would be implemented at the metastructure level, but the web server itself is at the applistructure level (and data is at the infostructure layer).
Which of the following is NOT an essential characteristic of cloud as per NIST?
A.Multitenancy
B.Elasticity
C.Resource pooling
D.On-demand self-service
A.Multitenancy
Explanation
NIST doesn’t call out multitenancy as an essential characteristic. ISO, however, does call out multitenancy as part of the resource-pooling essential characteristics.
In which logical model would you implement a virtual firewall?
A.Infostructure
B.Applistructure
C.Metastructure
D.Infrastructure
C.Metastructure
Explanation:
All controls in the virtual environment are performed at the metastructure layer. If the question asked about installing a firewall agent, that would occur at the applistructure layer.
How is one consumer’s access tightly isolated from other consumers in a public cloud environment?
A.Strong passwords
B.RBAC
C.Policies at the provider side
D.Policies at the customer side
C.Policies at the provider side
Explanation:
Tenants are protected by policies at the provider side. Consider, for example, network sniffing. One tenant will never see network traffic destined for another tenant. As a general rule, one tenant should never know that another tenant even exists. Although consumers will also have their own policies in place, the provider must ensure that there is strong isolation of workloads and tenants. This makes C the best answer.
Orchestration enables a controller to request resources from a pool of resources. How is this done?
A.ticketing system prioritizes clients based on support level
B.Through the use of REST APIs
C.Through the use of RPC
D.Via network calls
B.Through the use of REST APIs
Explanation:
Orchestration generally uses REST API calls. Although orchestration is, of course, performed across a network, the best answer is REST API calls. This is an example of the tricks that test writers like to pull on candidates.
You are instructed to build a server with eight CPUs and 8GB of RAM. Which service model would you use?
A.SaaS
B.PaaS
C.IaaS
D.No cloud provider supports a machine with 8 CPUs
C.IaaS
Explanation:
This is a prime example of why you would use IaaS—access to core foundational computing.
Your company is using a PaaS provider to host a Python 2.7–based application. One day, the provider sends you an e-mail stating they will no longer support the Python 2.7 platform and all applications must be upgraded to use Python 3.6 within two weeks. What is the first action you should take?
A.Test the application in Python 3.6
B.Tell the provider you cant meet this timeline
C.Providers are restricted by law from doing this
D.Launch a lawsuit against the provider for pain and suffering
A.Test the application in Python 3.6
Explanation:
When a platform is deprecated (no longer supported), the provider will generally give you access to a test environment where you can test your application using the new platform. As for the time provided in the question, it’s a bit extreme based on what I’ve experienced, but there is no law stopping a provider from giving you hours to migrate, let alone weeks.