LeanZapp Practice 3 Flashcards
What should data archiving and retention policies include?
A. Names of personnel allowed to receive backup media, if third party off site archiving services are used
B. Explicit statement of data format and types of storage media
C. A list of personnel whose data will be archived on a regular basis
D. Which ISP should be used for backup procedures
B. Explicit statement of data format and types of storage media
Explanation:
It is important to indicate the data format and media type for long term storage in order to ensure restoration capability; outdated or obsolete data formats and media may not be useful for restoration of data to the operational environment several years after it has been stored
Alice is the CEO for a software company; she is considering migrating the operation from the current traditional on premises environment into the cloud. Which cloud service model should she most likely consider for her company’s purposes?
A. PaaS
B. SaaS
B. BaaS
D. IaaS
A. PaaS
Explanation:
PaaS will allow her developers to create and design their software on a variety of OSs, increasing the breath of the market she can sell to. Also, she can use geographically dispersed programmers increasing the breadth of the market she can sell to
What the the optimal number of entrances to the cloud data center campus?
A. One
B. Two
C. three
D. Four
A. One
Explanation:
Controlling access is optimized by minimizing access
Which of the following is considered a technological control?
A. Firewall software
B. Fireproof safe
C. Fire extinguisher
D. Firing personal
A. Firewall software
Explanation:
A firewall is a technological control
Which of the following is not an essential element defining cloud computing?
A. Broad network access
B. Metered service
C. Offsite storage
D. On demand self service
C. Offsite storage
Explanation:
Offsite storage is not intrinsic of the definition of cloud computing; all the other options are
The architecture of the World Wide Web, as it works today is _________
A. JSON
B. DoS
C. REST
D. XML
C. REST
Explanation:
The web is mainly HTTP, which is a RESTful protocol
In the cloud, the data processor is usually _______
A. The party that assigns access rights
B. The cloud customer
C. The cloud provider
D. The cloud access security broker
C. The cloud provider
Explanation:
In legal terms, when data processor is defined, it refers to anyone who stores, handles, moves or manipulates data on behalf of the data owner or controll. In the cloud computing realm, this is the cloud provider
When building a new data center within an urban environment, which of the following is probably the most restrictive aspect?
A. The size of the plot
B. Utility availability
C. Staffing
D. Municipal codes
D. Municipal codes
Explanation:
In any large metro area, government restrictions on development and construction can severely limit how you use your property; this can be significant limiting factor in building a data center
DLP solutions can aid in deterring loss due to which of the following?
A. Malicious disclosure
B> Performance issues
C. Bad policy
D. Power failure
A. Malicious disclosure
Explanation:
DLP tools can identify outbound traffic that violates the organizations policies
Risk should always be considered from a business perspective. Risk is often balanced by corresponding _________
A. Profit
B. Performance
C. Cost
D. Opportunity
D. Opportunity
Explanation:
The only reason organizations accept any level of risk is because of the potential benefit by a risky activity
____________ is an agentless means of ensuring a VMs security baseline does not change over time by examining such things as physical location and network settings
A. ECC
B. VMI
C. HIDS
D. NIDS
B. VMI
Explanation:
Virtual machine introspection is an agentless means of ensuring a VMs security baseline does not change over time by examining things such as physical address, network settings and installed OS. These ensure that the baseline has not been inadvertently or maliciously tampered with
In working with various networking technologies such as Frame Relay, ATM and Ethernet, the capability of the network to provide better service to select traffic is called:
A. QaS
B. ASP
C. OLA
D. QoS
D. QoS
Explanation:
Quality of service refers to the capability of a network to provide better service for certain traffic regardless of the network type or topology
Which of the following best describes the purpose of a DMZ?
A. Isolates public facing network elements that would otherwise be vulnerable to attack
B. Isolates email servers that are Internet facing and protects them from attacks
C. Provides network elements such as routers that are Internet facing to protect them from attack
D. Tracks incoming attack patterns
A. Isolates public facing network elements that would otherwise be vulnerable to attack
Explanation:
A DMZ isolates network elements that are public facing and would otherwise be vulnerable to attack
Which of the following best describes a qualitative risk assessment?
A. Typically employs a set of methods, principles or rules for assessing risk based on numerical categories
B. Typically employs a set of methods, principles or rules for assessing risk based on numbers
C. Typically employs a set of methods, principles or rules for assessing risk based on nonnumerical categories
D. Typically employs a set of methods, principles or rules for assessing risk based on threat categories
C. Typically employs a set of methods, principles or rules for assessing risk based on nonnumerical categories
Explanation:
As opposed to quantitative assessments, which use specific numerical values such as 1,2 and 3, qualitative assessments use nonnumerical categories that are relative in nature such as high medium or low
In regard to most privacy guidance, the data controller is _________
A. The individual described by the privacy data
B.The entity that collects or creates the privacy data
C. The entity that uses privacy data on behalf of the controller
D. The entity that regulates privacy data
B.The entity that collects or creates the privacy data
Explanation:
Option B is the definition of the data controller
Which of the following laws resulted from a lack of independence in audit practices?
A. HIPAA
B. GLBA
C. SOX
D. ISO 27064
C. SOX
Explanation:
SOX was passed primarily to address the issues if audit independence, poor board over sight, and transparency of findings
When designing a cloud data center, which of the following is not necessary to ensure continuity of operations during contingency operations?
A. Access to clean water
B. Broadband data connection
C. Extended battery backup
D. Physical access to the data center
C. Extended battery backup
Explanation:
Backup power does not have to be delivered by batteries; it can be fed to the data center through redundant utility lines or from a generator
Availability refers to which of the following?
A. The amount of uptime in any given 30 day period
B. The amount of uptime specified in the SLA
C. Whether authorized users can access services and/or data
D. The amount of uptime promised by the cloud vendor
C. Whether authorized users can access services and/or data
Explanation:
Availability is one of the three legs of the CIA triad, this represents when services and/or data can be accessed in an authorized manner
What are the two general delivery modes for SaaS model?
A. Ranked and free
B. Hosted application management and software on demand
C. Intrinsic motivation complex and undulating perspective details
D. Framed and modular
B. Hosted application management and software on demand
Explanation:
In SaaS, the cloud provider might license and deliver commercially available software for the customer, via the cloud or provide the customer access to the providers proprietary software
Which of the following aspects of cloud computing can enhance the customers business and continuity and disaster recovery efforts?
A. Ondemand self service
B. Pooled resources
C. Virtualization
D. The control plane
A. Ondemand self service
Explanation:
On demand self service allows the cloud customer to provisioned those production resources during a contingency without any delay in ordering or allocating those resources
To protect data on user devices in BYOD environment, the organization should consider requiring all of the following except:
A. DLP agents
B. Local encryption
C. MFA
D. Two person integrity
D. Two person integrity
Explanation:
Although all the other options are ways to harden a mobile device, two person integrity is a concept that has nothing to do with the topic
During a cost benefit analysis, your company determines that it spends a disproportionate amount of money on software licensing and administration. Which cloud model may best help your company reduce these costs?
A. IaaS
B. PaaS
C. SaaS
D. Hybrid
C. SaaS
Explanation:
In SaaS model, the cloud provider is tasked with acquiring and managing the software licenses; the scale of a cloud providers operations
According to CSA, an organization that operates in the cloud environment and suffers a data breach may be required to __________
A. Notify affected users
B. Reapply for cloud services
C. Scrub all affected physical memory
D. Change regulatory framework
A. Notify affected users
Explanation:
Data breach notification laws are plentiful; organizations operating in the cloud are almost sure to be subject to one or more such laws
Which of the following attack vectors is new to the cloud environment and was not typically found in on premises, legacy environments?
A> DDoS
B. Guest Escape
C. Internal Threats
D. Inadvertent Disclosure
B. Guest Escape
Explanation:
Guest Escape is prevailing threat in a vritualized, multi tenant cloud environment and was not commonly found in traditional environments
____________ often uses access control and encryption to prevent unauthorized copying and limitation of distribution to only those who pay
A. PCI
B. IRM
C.SDN
D. Doctrine of the Proper Law
B. IRM
Explanation:
Information rights management is a means to prevent unauthorized copying and limitation of distribution to only those who pay for content
If a cloud customer wants a secure, isolated sandbox in order to conduct software development and testing, which cloud service model would be best?
A. IaaS
B. PaaS
C. SaaS
D. Hybrid
B. PaaS
Explanation:
PaaS allows the cloud customer to install any kind of software, includi9ng software to be tested, on an architecture that includes any desired OSs
Which of the following is an example of 2FA?
A. Strong passwords
B. Unique user ID and password
C. Something you know
D. User ID and physical characteristics
D. User ID and physical characteristics
Explanation:
Only option D involves two distinct factor
Which of the following is not an acceptable means of sanitizing hardware?
A. Burning
B. Deletion
C. Industrial Shredding
D. Drilling
B. Deletion
Explanation:
Hardware cannot be sanitizied by deleting data. Deleting, an an operation, does not erase the data; it simply removes the logical pointers to the data for processing purposes
Software developers should receive cloud specific training that highlights the challenges involved with having a production environment that operates in the cloud. One of these chalennges is __________
A. The massive additional hacking threat, especially from foreign sources
B. The prevalent use of encryption in all data life cycle phases
C. Drastic increase of risk due to DDoS attacks
D. Additional regulatory mandates
B. The prevalent use of encryption in all data life cycle phases
Explanation:
Because cloud operations are so dependent on encryption protections in all data life cycle phases, developers will have to accomodate the additional overhead and interoperability encryption requires
WHich of the following SOC report subtypes spans a period of time?
A. SOC 2
B. SOC 3
C. SOC 1
D. Type II
D. Type II
Explanation:
A SOC Type II report is designed around a period of time as opposed to a specific point in time
Which type of framework contains only the information required for a specific business application to reach a targeted level of trust?
A. ONF
B. ISMS
C. RIsk assessment
D. ANF
D. ANF
Explanation:
An ANF is a subset of an ONF that contains only the information required for a specific business application to reach the targeted level of trust. There is many to one relationship between the ANF and ONF
When putting a system into maintenance mode, its important to do all the following except:
A, Transfer any live virtual guest off of the host
B. Turn off logging
B. Lockout the system from accepting new guests
D. Notify customers if there are any interruptions
B. Turn off logging
Explanation:
Auditing is probably even more important during maintenance mode than normal operation because administrator activity is almost always involved
The TLS protocol creates a secure communications channel over public media (such as the Internet). In a typical TLS session, what form cryptography is used for the session key?
A. Symmetric Key
B. Asymmetric key
C. Hashing
D. One asymmetric pair
A. Symmetric Key
Explanation:
In TLS, the parties will establish a shared secret, symmetric key, for the duration of the session
Which of the following would make a good provision to include in the SLA between cloud customer and provider?\
A. Location of the data center
B. Amount of data uploaded/downloaded during a pay period
C. Type of personnel security controls for network admins
D. Physical security barriers on the perimeter of the data center campus
B. Amount of data uploaded/downloaded during a pay period
Explanation:
Option B is the only element that lends itself well to a discrete, objective metric
Of the following control techniques/solutions, which can be combined to enhance the protections offered by each?
A. Razor tape/background checks
B. Least privilege/generators
C. DLP/DRM
D. Personnel badging/secure baselines
C. DLP/DRM
Explanation:
Theoretically, all combinations of security controls are preferable to any one security control used by itself.
The PCI DSS requires that all merchants who want to process credit card transactions be compliant with a wide variety of security control requirements. Merchants are assigned different tiers under PCI DSS based on:
A. Availability
B. Redundancy
C. Location of their corporate headquarters
D. Number of transactions per year
D. Number of transactions per year
Explanation:
The different merchant tiers are based on the number of transactions a specific merchant conducts annually. All the other options are incorrect
Why might an organization choose to comply with ISO 27001 standard?
A. Price
B. Ease of implementation
C. International acceptance
D. Speed
C. International acceptance
Explanation:
The ISO standards are almost universally accepted and recognized and they are even mandated for certain industries/locales
Which of the following is one of the benefits of a private cloud deployment?
A. Less cost
B. Higher performance
C. Retaining control of governance
D. Reduction in need for maintenance capability on the customer side
C. Retaining control of governance
Explanation:
With a private cloud deployment, the customer gets to dictate government requirements, which is a significant benefit for customers in highly regulated industries
The OWASP Top Ten often includes invalidated redirects and forwards. Which of the following is a good way to protect against the problem?
A. Dont use redirects/forwards in your applications
B. Refrain from storing credentials long term
C. Implement SIEM/SIM
D. Implement DRM solutions
A. Dont use redirects/forwards in your applications
Explanation:
Basic as it may seem, not including redirects and forwards within your software is an easy way to avoid the problem altogether, and redirects/forwards are not necessary for efficient usage
Which of the following is not a component of the STRIDE model?
A. Spoofing
B.Repudiation
C. Information Disclosure
D. External pentest
D. External pentest
Explanation:
From a security perspective, automation of configuration aids in ___________
A. Enhancing performance
B. Reducing potential attack vectors
C. Increasing ease of use of the systems
D. Reducing the need for administrative personnel
B. Reducing potential attack vectors
Explanation:
A secure baseline configuration, applied and maintained automatically, ensures the optimum security footprints with the least attack surface
All the other options are benefits of automatic configuration but are not specifically security enhancements
A DAM functions at layer _______ of the OSI model
A. 1
B. 2
C. 5
D. 7
D. 7
Explanation:
A DAM is a Layer 7 appliance
MTD/MAD is a measure of which of the following:
A. A point in time after an outage has occurred and beyond which recovery becomes extremely difficult or impossible
B. The optimal time it takes to recovery a system after an outage
C. A weak point in a specific program that makes it unrecoverable after an outage has occurred
D. A point in time before an incident occurs
A. A point in time after an outage has occurred and beyond which recovery becomes extremely difficult or impossible
Explanation:
The maximum tolerable downtime/maximum allowable downtime is a point in time after an outage has occurred and beyond which recovery becomes extremely difficult or impossible