(ISC)² Certified Cloud Security Professional Exam 3 (CCSP) Practice (Aris Athanasiou) Flashcards
STRIDE is a model of threats developed from Microsoft for identifying computer security threats. Which of the following is not an element of STRIDE?
A. Tampering
B. Impersonation
C. Reputation Damage
D. Elevation of Privilege
C. Reputation Damage
Explanation:
Reputation damage is not one of the 6 categories defined in STRIDE.
Which of the following firewall types would be the most challenging for the customer to deploy in a public cloud environment?
A. Host-based firewall
B. Web Application Firewall (WAF)
C. Hardware Firewall
D. Layer 3 Firewall
C. Hardware Firewall
Explanation:
Cloud service customers typically do not have access to the underlying infrastructure of public cloud providers. Hence the installation of a hardware firewall would be very challenging.
What should be the first step in incident response in a cloud environment?
A. Look at the firewall logs to determine the root cause
B. Ensuring the management plane has not been breached
C. Resetting the password of all cloud administrators
D. Shutting down affected components to contain the breach
B. Ensuring the management plane has not been breached
Explanation:
Ensuring the management plane has not been breached should be the priority of the cloud provider, as any remediation actions can be reverted if the attacker still has access to the management plane.
The newly appointed CIO of a large retailer is considering migrating workloads to a medium-size cloud service provider. The CIO has concerns about the provider since they only recently started offering cloud services and they don’t have an established presence in the market. Which of the following service models would pose the smallest risk with regards to vendor lock-in?
A. SaaS
B. IDaaS
C. IaaS
D. PaaS
C. IaaS
Explanation:
Applications build on top of IaaS are easier to migrate to a different platform if needed, compared to applications build on PaaS or software as a service (SaaS). The IaaS is also the deployment model closest to the traditional data-center hosting. In the scenario above, the CIO is concerned about the newly established CSP, therefore the best option would be to choose the option which would allow for easy migration.
An EU-based IT services provider recently decided to build a public cloud offering. They quickly attracted several clients which migrated workloads to the cloud and started storing customer data in both volume and object storage. In the above example who is considered the data processor?
A. The health and financial regulators
B. The cloud service consumer
C. The customers of the cloud service consumer
D. The cloud service provider
D. The cloud service provider
Explanation:
In the above scenario, the cloud service provider is considered the data processor.
A large IT training provider is concerned about unauthorized sharing of the training material they are providing to their students. Which of the following controls would be the most appropriate?
A. Printing the material so that students can not transfer the files via USB or email
B. Asymmetrically encrypt the files with a unqie public key per student and hand out smartcards containing the associated private key
C. Protecting the files by using IRM/DRM technologies
D. Associating the material with an access control list (ACL) and explicitly granting access to the students
C. Protecting the files by using IRM/DRM technologies
Explanation:
Protecting the files by using IRM/DRM technologies would the most appropriate control in the above scenario. The rest of the controls are either not effective or not scalable
Which term describes the probability that a threat to an asset will materialize?
A. Risk
B. Impact
C. Vulnerability
D. Exploit
A. Risk
Explanation:
That is the definition of risk.
An LDAP administrator has configured a directory server to store passwords using the SHA-2 hash function. The minimum password length is 6 and the salt consists of 8 bits. If the directory contains 50 accounts and their passwords. How many unique salts can the above setup support?
A. 2^6
B. 2^8
C. 50
D. 256
B. 2^8
Explanation:
The above setup can support 2^8=256 unique salts.
Which of the following is not an identity federation protocol?
A. RADIUS
B. OIDC
C.SAML
D. WS-Federation
A. RADIUS
Explanation:
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting. The rest of the options are protocols widely used for federated access.
Which of the following should be a primary consideration when designing a leaver process?
A. Deprovision the employee from the company’s HR system or any other authoritative source
B. Block printer access to prevent data exfiltration
C. Update the payroll system
D. Ensure the employee returns any property of the company
A. Deprovision the employee from the company’s HR system or any other authoritative source
Explanation:
Deprovisioning (or scheduling the deprovisioning) of the employee from the company’s HR system or any other authoritative source should be the priority of every company for the leaver process. Employees who have been dismissed or quit and still retain access to the company’s information systems pose a significant risk.
What is one of the delivery models of SaaS?
A. Tailored Application
B. Hosted Application
C. Off-Premise Application
D. Remote Application
B. Hosted Application
Explanation:
The two delivery models for SaaS applications are:
Hosted Application: a cloud provider hosts software for customers and delivers it over the Internet.
Software-on-demand: a cloud provider supplies customers with network-based access to a single copy of an application created specifically for SaaS distribution.
What kind of attack does the following code describe SELECT id FROM users WHERE username=’username’ AND password=’password’ OR 1=1’.
A. LDAPi
B. CSRF
C. SQLi
D. XSS
C. SQLi
Explanation:
The above is the most typical example of a SQL injection (SQLi) attack.
After Bob has proved his identity to an application he is assigned a JWT token containing his Active Directory group memberships. He then sends that token to an API that is protected from an API gateway. The gateway intercepts the request and inspects group memberships in the token, it then decides to block the user from accessing the API. The latter is an example of?
A. Identification
B. Access Federation
C. Authorization
D. Authentication
C. Authorization
Explanation:
The user has been already been authenticated and based on the persona he has been assigned to and the resource he/she is trying to access, the system makes a decision to deny access, this is a classic example of authorisation.
The cloud security alliance has defined a model for the cloud data lifecycle which consists of 6 phases. In which phase does data classification take place?
A. Store
B. Share
C. Create
D. Use
C. Create
Explanation:
The creation phase is the best time to classify data according to its value to the organization.
Which of the following verbs is not associated with REST?
A. DELETE
B. FETCH
C. PATCH
D. PUT
B. FETCH
Explanation:
RESTful APIs primarily use HTTP as a transport layer. The verbs (HTTP methods) available are GET, HEAD, POST, PUT, PATCH, DELETE, CONNECT, OPTIONS, and TRACE.
Which of the following is not a common approach for data masking according to the CCSP CBK?
A. Random Substitution
B. Anagram
C. Deletion
D. Algorithmic Substitution
B. Anagram
Explanation:
An anagram is a word formed by rearranging the letters of a different word. Simply rearranging the characters of a word would not be sufficient, as it would be trivial for someone to reconstruct/guess the original data. The rest of the methods above are common approaches for data masking.
An organisation has several applications deployed in a hybrid cloud architecture. At the moment each application handles its own authentication and authorisation by maintaining local user accounts and their entitlements. The CIO wants to improve the way the employees access the applications, increasing security, and productivity. The CIO decided to implement single-sign-on between the application with tokens issued from a third-party cloud service. Which of the following best describe the third party?
A. Identity as a Service (IDaaS)
B. Service Provider (SP)
C. Blockchain-based Authentication
D. External Kerberos Provider
A. Identity as a Service (IDaaS)
Explanation:
Single-sign-on (SSO) is one of the typical offerings of an Identity as a Service (IDaaS) platform along with multi-factor authentication, federation, and authorisation.
Which of the following can protect cloud operations from rogue employees?
A. Mantraps
B. 24/7 Video Surveillance
C. Single Egress Point in the data center
D. Dual Authority Controls
D. Dual Authority Controls
Explanation:
Dual authority controls are often used as a control against collusion. The rest of the controls would not be effective against rogue employees which have anyway access to the facilities.
The “Single egress point in the data center” in particular is a risk on its own and could riks the health and safety of the employees if an incident occurred.
Which is not included in the OWASP Top 10 (2021)?
A. Insecure Media Sanitization
B. Identification and Authentication Failures
C. Broken Access Control
D. Insecure Design
A. Insecure Media Sanitization
Explanation:
Insecure media sanitization is not included in the OWASP Top 10, the rest of the options are.
The OWASP TOP 10 (2021) includes:
Broken Access Control
Cryptographic Failures
Sensitive Data Exposure
Injection
Insecure Design
Security Misconfiguration
Vulnerable and Outdated Components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery
Which of the following is the most important for ensuring non-repudiation?
A. Centralized Authentication
B. Formal Certification and Authorization of the system
C. Strong Cryptography
D. Continuous Audit Trail
D. Continuous Audit Trail
Explanation:
A continuous audit trail is the most important aspect of ensuring non-repudiation. Strong cryptography and centralised authentication can also help but unless the system is capable of capturing a complete audit trail, non-repudiation can be challenging to achieve.