(ISC)² Certified Cloud Security Professional Exam 4 (CCSP) Practice (Aris Athanasiou) Flashcards
Which of the following organisations would have to comply with FERPA?
A. A financial institution
B. A educational agency
C. A public company
D. A hospital
B. A educational agency
Explanation:
The Family Educational Rights and Privacy Act of 1974 (FERPA) is a federal law that protects the privacy of student education records. Therefore, the educational agency would have to comply with it.
Which of the following is not true about static application security testing (SAST)?
A. Can detect vulnerabilities like XSS and CSRF
B. Can analyse both source code as well as compiled binaries
C. Can be conducted as part of the continuous integration/continuous deployment pipeline
D. Can detect race conditions
D. Can detect race conditions
Explanation:
Static application security testing can not detect race conditions. We typically employ dynamic security testing techniques to identify race conditions. All the other statements are true.
What does “production” refer to in the context of digital forensics?
A. The temporary suspension of the organizations data retention policy due to legal
B. The process for generating the data requested in the warrant
C. The presentation of the requested data to the court
D. The environment that data needs to be collected from
C. The presentation of the requested data to the court
Explanation:
In the context of digital forensics “production” refers to the presentation of the requested data to the court or the requesting party.
Which mathematical problem does RSA rely on?
A. Finding the discrete logatirhm of a random elliptic curve element with respect to a publicly known base point
B. Discrete logarithm problem (DLP)
C. Factorization of the product of two large prime numbers
D. Traveling salesman problems (TSP)
C. Factorization of the product of two large prime numbers
Explanation:
RSA relies on the factorization of the product of two large prime numbers. Diffie–Hellman, and ElGamal rely on the discrete logarithm problem.
Which of the following is not a feature of an API gateway?
A. Policy Enforcement
B. Rate-Limiting
C. Metrics
D. Malware Analysis
D. Malware Analysis
Explanation:
Malware analysis is not a typical feature of an API gateway, the rest of the capabilities are typical features of these products.
A large enterprise recently defined, implemented, and fully tested their Business Continuity (BC)/Disaster Recovery (DR) procedures. The newly-appointed CIO has decided that the organisation needs a large number of the existing workloads to the cloud. Which of the following models would allow the organisation to replicate their existing (BC/DR) strategy, minimising rework?
A. BCaaS
B. PaaS
C. IaaS
D. SaaS
C. IaaS
Explanation:
Infrastructure-as-a-Service (IaaS) would allow the enterprise to replicate more of their existing (BC/DR) to the cloud environment compare to PaaS or SaaS.
A user attempts to log in to a customer relationship management (CRM) application offered as a SaaS. As the first step, the user is prompted to type in his username. Which of the following best describe the above?
A. Identity Verification
B. Authorization
C. Identification
D. Authentication
C. Identification
Explanation:
Identification occurs when a user (or any subject) claims an identity. By submitting their username, the users claim to be the identity/persona associated with that name.
Authentication is the process of proving your identity and it occurs when subjects provide appropriate credentials to prove their identity.
Once a user is identified and authenticated, they can be granted authorization based on their proven identity.
Identity Verification is the process that typically is performed once, during the creation of the persona/identity, and ties the physical person to the digital identity. This typically involves the physical person presenting their passport or some other proof of identity.
Which OSI layer does a web application firewall (WAF) operate?
A. 3
B. 4
C. 7
D. 1
C. 7
Explanation:
Web application firewall (WAF) operate at the OSI Layer 7. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection.
Which of the following media sanitisation techniques would provide the most assurance in a cloud environment?
A. Multiple passes with 0s and 1s
B. Crypto-shredding
C. Physical destruction of media mandated by the SLA/contract
D. Overwriting
C. Physical destruction of media mandated by the SLA/contract
Explanation:
The physical destruction of media is always the most effective way of minimising the chances of data remanence. This would be quite challenging in a cloud environment given the multitenancy aspects of it. However, if it is mandated from the SLA or the contract between the cloud provider and the customer, the CSP would have to destroy the media.
Which of the following best describes paravirtualization?
A. Running multiple type 2 hpervisors on the same host machine
B. A method for the hypervisor to offer interfaces to the guest OS that can use instead of the normal hardware interfaces
C. Running multiple Type 1 hypervisors on the same host machine
D. Paravirtualization is another term for container virtualization
B. A method for the hypervisor to offer interfaces to the guest OS that can use instead of the normal hardware interfaces
Explanation:
The definition for paravirtualization is a virtualization technique that presents a software interface to virtual machines which is similar, yet not identical to the underlying hardware interface.
Which CSA STAR certification framework level involves the CSP submitting a completed Consensus Assessments Initiative Questionnaire (CAIQ)?
A. Level Two
B. Level Four
C. Level Three
D. Level One
D. Level One
Explanation:
Level one of the CSA STAR requires that the cloud providers either submit a completed Consensus Assessments Initiative Questionnaire (CAIQ) or submit a report documenting compliance with the Cloud Controls Matrix (CCM).
Which of the following controls can both increase and decrease the risk for an organisation at the same time?
A. Hash customer password before storing them
B. Close down unnecessary ports on the Internet facing firewall
C. Store cryptographic keys outside the cloud service provider
D. Remove services which are not required from baseline images
C. Store cryptographic keys outside the cloud service provider
Explanation:
Storing cryptographic keys outside the cloud service provider can reduce risks such as an attacker gaining access to both the encrypted data and the respective keys, insider threat from the cloud service personnel, etc.
At the same time, it can create new risks for the organisation such as unavailability of the data when connectivity between the cloud service provider and the keys storage service is lost, keys might have to be transferred between the cloud provider and the key storage provider from time to time which increases the chances of a key being compromised, etc.
Several countries and unions have developed their own privacy standards. Which country enacted PIPEDA?
A. Canada
B. Japan
C. Argentina
D. USA
A. Canada
Explanation:
The Personal Information Protection and Electronic Documents Act (PIPEDA) is the federal privacy law for private-sector organizations in Canada.
Which aspect of information security is ensured from encryption?
A. Integrity
B. Confidentiality
C. Resiliency
D. Availability
B. Confidentiality
Explanation:
Encryption can protect the confidentiality of data. Although encryption can also provide integrity (through Message Authentication Codes), confidentiality is the most common use-case and therefore the best answer out of the four.
What is the difference between SOC Type 1 and Type 2 reports?
A. Type 1 is intended for external stakeholders, type is 2 intended for internal stakeholders
B. Type 1 focuses on the operating effectiveness of the controls, type is 2 presents the auditors opinion regarding the accuracy of managements description of the system
C. Type 1 is intended for internal stakeholders, type 2 is intended for external stakeholders
D. Type 1 presents the auditors opinion regarding the accuracy of managements description of the system, type 2 focuses on the operating effectiveness of the controls
D. Type 1 presents the auditors opinion regarding the accuracy of managements description of the system, type 2 focuses on the operating effectiveness of the controls
Explanation:
The main difference between SOC Type 1 and 2 is that the first is an attestation of controls at a specific point in time, whereas the latter is an attestation of controls over a minimum six-month period focusing on their effectiveness.
Which of the following HTTP status codes is associated with client-side errors?
A. 2XX
B. 5XX
C. 3XX
D. 4XX
D. 4XX
Explanation:
HTTP 4xx codes denote client-side errors, some of the code include
400 Bad Request
401 Unauthorized
402 Payment Required
403 Forbidden
404 Not Found
405 Method Not Allowed
Full list of HTTP codes can be found here
In cloud environments, automated configuration is usually achieved by consuming a set of APIs provided by the CSP. What does API stand for?
A. Application Programming Interface
B. Applied Programming Infrastructure
C. Applied Programmatic Infrastructure
D. Application Programmatic Interface
A. Application Programming Interface
Explanation:
API stands for Application Programming Interface
What does cloud reversibility refer to?
A. The ability to reverse a misconfiguration and roll back to a well known state
B. The ability for an organization to retrieve and delete its data stored in a cloud service provider
C. The ability for an organization to transfer its data stored in a cloud service to a different cloud service provider
D. The ability to trace the source of an attack and unleash a hack-back
B. The ability for an organization to retrieve and delete its data stored in a cloud service provider
Explanation:
The definition of reversibility is the ability of an organisation to retrieve and delete its data stored in a cloud service provider.
Which of the following actions is not part of defining the objectives of an audit?
A. Define frequency and tools to be used
B. Refine processes from lessons learned
C. Define the audit output format
D. Define number of auditors involved
B. Refine processes from lessons learned
Explanation:
Refine processes from lessons learned happens after the audit has been completed and is not part of defining the objectives of an audit.
A large system integrator (SI) decided to start offering more services around cloud computing. Their business model is purchasing cloud services in bulk and then offering those services to their own customers with a 10% markup over the original price. Which of the following describes the SI?
A. Cloud integrator
B. Cloud Access Broker
C. Cloud computing reseller
D. Cloud operator
C. Cloud computing reseller
Explanation:
This is a typical example of a cloud computing reseller.