(ISC)² Certified Cloud Security Professional Exam 2 (CCSP) Practice (Aris Athanasiou) Flashcards
Which of the following is not an essential cloud characteristic according to NIST?
A. Measured Service
B. Rapid Elasticity
C. Resilient Infrastructure
D. Broad Network Access
C. Resilient Infrastructure
Explanation:
Resilient infrastructure is not an essential cloud characteristic. The 5 characteristics are:
On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured Service
What type of feature can we expect to find in any data center tier of any Uptime Institute tier?
A. All operational components
B. Twelve hours of on-site fuel storage
C. Full Power Capabilities
D. All Infrastructure
B. Twelve hours of on-site fuel storage
Explanation:
Twelve hours of on-site fuel storage is a requirement for all 4 tiers of the Uptime Institute.
Which of the following is not an offering of a cloud service broker according to NIST’s cloud computing reference architecture?
A. Service Intermediation
B. Service Arbitrage
C. Service Aggregation
D. Service Refinement
D. Service Refinement
Explanation:
According to NIST, Cloud Service Brokers (CSBs) manage the use, performance, and delivery of cloud services and negotiate relationships between cloud providers and cloud consumers, the 3 types of services they offer are:
Service intermediation
Service aggregation
Service arbitrage
Tokenization typically includes two distinct
A. Databases
B. Microservices
C. Hashing Functions
D. Encryption Keys
A. Databases
Explanation:
Tokenization is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token. Tokenization typically involves two databases, one with the original data as well as one holding the mapping between the tokens and the tokenized data.
What does AAA stand in the information security context?
A. Authentication, Authorization, and Access
B. Authentication, Authorization, and Accounting
C. Administration, Authentication and Authorization
D. Administration, Authentication and Audit Trail
B. Authentication, Authorization, and Accounting
Explanation:
AAA stands for Authentication, Authorization and Accounting.
You can read more here.
https://en.wikipedia.org/wiki/AAA_(computer_security)
What is the relationship between Organizational Normative Framework (ONF) and Application Normative Framework (ANF) in terms of multiplicity?
A. 1 to 1
B. Many to Many
C. 1 to Many
D. Many to 1
C. 1 to Many
Explanation:
The multiplicity relationship between ONF and ANF is 1 to N (1 to many).
Which of the following is not a typical capability of a DRM tool?
A. Dynamic Policy Control
B. Automatic Expiration
C. Trapdoor permutation
D. Persistent Protection
C. Trapdoor permutation
Explanation:
Trapdoor permutation is a cryptographic term and is not a capability of a DRM tool. You can read more about trapdoor functions here.
Software configuration management and versioning are necessary for application security. Which of the following is not an established configuration management tool?
A. Nexus
B. Puppet
C. SaltSack
D. Chef
A. Nexus
Explanation:
Nexus is an artifact repository and not a configuration management tool.
A medium-size retailer decides to deploy a database activity monitoring (DAM) to protect their relational database holding customer data. Which attack can the DAM mitigate?
A. XSS
B. DBKill
C. SQLi
D. CSRF
C. SQLi
Explanation:
Database activity monitoring (DAM) is a database security technology for monitoring and analyzing database activity.
DAM can prevent SQL injection is by monitoring the application activity, generating a baseline behavior, and identifying a potential attack based on divergence from normal SQL queries and sequences.
Which of the following is not true about elliptic-curve cryptography (ECC)?
A. It can provide the same level of security as RSA
B. It is a form of symmetric key cryptography
C. It uses smaller size keys compared to other similar cryptographic schemes
D. It relies on the discrete logarithm problem
B. It is a form of symmetric key cryptography
Explanation:
Elliptic-curve cryptography (ECC) is not a form of symmetric-key cryptography, all the other statements are true.
How can the Consensus Assessments Initiative Questionnaire (CAIQ) help organisations with their cloud strategy/implementation?
A. Provides a list of questions cloud service providers can use to perform background checks on their employees, miming internal threat risk
B. Provides list of questions organized in control domains which can be used to allow cloud consumers and auditors to assess the security capabilities of a cloud service provider
C. Provides a list of questions cloud service providers can use to screen prospect cloud service consumers ensuring they dont pose a risk to other tenants
D. Provides a list of questions mapped to different regulatory frameworks which can be used by cloud consumers to assert if they are compliant
B. Provides list of questions organized in control domains which can be used to allow cloud consumers and auditors to assess the security capabilities of a cloud service provider
Explanation:
The CAIQ from CSA is a document that can be used to enable cloud consumers and auditors to assess the security capabilities of a cloud service provider.
Which of the following is not a value included in the Agile manifesto?
A. Customer collaboration over contract negotiation
B. Individuals and interactions over processes and tools
C. Responding to change over following a plan
D. Comprehensive documentation over working software
D. Comprehensive documentation over working software
Explanation:
The Agile Manifesto is a brief document built on 4 values and 12 principles for software development. The 4 values are:
Individuals and interactions over processes and tools
Working software over comprehensive documentation
Customer collaboration over contract negotiation
Responding to change over following a plan
Comprehensive documentation over working software is not part of the Agile Manifesto.
After Bob has proved his identity to an authentication platform he is assigned a JSON web token (JWT) token containing his Active Directory group memberships. He then sends that token to an API that is protected from an API gateway. The gateway intercepts the request and inspects group memberships in the token, it then blocks the user from accessing the API. In this instance, the API gateway acts as a?
A. Policy Enforcement Point (PEP)
B. Policy Information Point (PIP)
C. Service Provider
D. Identity Provider
A. Policy Enforcement Point (PEP)
Explanation:
In the above example, the API Gateway acts as the policy enforcement point.
What does blind penetration testing refer to?
A. The pentesting team is provided with very limited information on the system, the incident response team of the organization is informed in advance about the attack
B. The pentesting team is not restricted to any automated vulnerability scanning and exploit tools, all the production instances are in scope
C. The pentesting t eam is provided with very limited information on the system, the incident response team of the organization is not informed in advance about the attack
D. The pentesting team is restricted from using any automated vulnerability scanning and exploit tools, the incident response team of the organization has turned off all technical security controls except logging
A. The pentesting team is provided with very limited information on the system, the incident response team of the organization is informed in advance about the attack
Explanation:
Blind penetration testing simulates the actions and procedures of a real attacker by limiting the information given to the team performing the test.
An EU-based IT services provider recently decided to build a public cloud offering. They quickly attracted several clients which migrated workloads to the cloud and started storing customer data in both volume and object storage. In the above scenario, what is the data role of the IT services provider?
A. Data Subject
B. Data Owner
C. Data Controller
D. Data Processor
D. Data Processor
Explanation:
In this instance, the cloud service provider acts as the data processor while the cloud customer is the data owner.
An EU-based IT services provider recently decided to build a public cloud offering. They quickly attracted several clients which migrated workloads to the cloud and started storing customer data in both volume and object storage. The registration process asks the cloud consumers to fill in a form with their details including the consumer’s name, address, etc. In the above scenario, who is considered the data owner for the latter data?
A. The cloud service consumer
B. The cloud regulator
C. The customers of the cloud service consumer
D. The cloud service provider
D. The cloud service provider
Explanation:
This is a tricky question, most of the time in a cloud context, the cloud service provider is the data processor and the cloud customer is the data owner. However, the question here is specifically about the data that the provider is collecting as part of the cloud service consumer registration. In this specific scenario, the data owner is the cloud service provider.
An organisation based in Palo Alto, CA wants to ensure they protect their new HQ office which costs $1,000,000. By looking at statistics the CIO has determined that CA is impacted by approximately 20 earthquakes a year. By running earthquake simulation software the company determined that an earthquake would destroy about 25% of the building. In the above scenario, what is the single loss expectancy (SLE)?
A. $10,000,000
B. $1,000,000
C. $250,000
D. $5,000,000
C. $250,000
Explanation:
We can compute the Single Loss Expectancy (SLE) as follows SLE=AV*EF
In the above scenario, 25% * $1,000,000 = $250,000
Which characteristic of hash functions is a rainbow table attack exploiting?
A. Collision Resistance
B. Deterministic Output
C. Arbitrary Input
D. One-Way Function
B. Deterministic Output
Explanation:
Due to its deterministic nature, the digest of a specific plaintext password will always result in the same digest value.
As a result of the digest value of common passwords will typically appear multiple times in the identity/credentials repository of an organisation. Hackers exploit this by creating rainbow tables by precomputing the hashes of common passwords. The above attack can be defeated with the use of salt.
An organisation which has recently migrated all of their services to a newly-established cloud provider; was recently informed that they have 30 days to migrate their data before the cloud provider ceases its operation as a result of bankruptcy. Which of CSA’s treacherous 12 threats was the root cause behind?
A. Abuse and nefarious use of cloud services
B. Shared technology and vulnerabilities
C. Insufficient Due Diligence
D. Insufficient Market Research
C. Insufficient Due Diligence
Explanation:
The root cause was Insufficient due diligence, the decision-makers of the cloud customer should not have trusted a newly-established CSP without the necessary assurance for their financial sustainability
Static application security testing (SAST) analyse application source code to determine vulnerabilities. What is another term for SAST?
A. White-box Testing
B. Black-Box Testing
C. Gray-Box Testing
D. Red-Box Testing
A. White-box Testing
Explanation:
SAST, also known as white-box testing, involves the inspection of the application’s source code in order to build a comprehensive understanding of the risks which might be exposed.