LeanZapp Practice 3 Flashcards
What should data archiving and retention policies include?
A. Names of personnel allowed to receive backup media, if third party off site archiving services are used
B. Explicit statement of data format and types of storage media
C. A list of personnel whose data will be archived on a regular basis
D. Which ISP should be used for backup procedures
B. Explicit statement of data format and types of storage media
Explanation:
It is important to indicate the data format and media type for long term storage in order to ensure restoration capability; outdated or obsolete data formats and media may not be useful for restoration of data to the operational environment several years after it has been stored
Alice is the CEO for a software company; she is considering migrating the operation from the current traditional on premises environment into the cloud. Which cloud service model should she most likely consider for her company’s purposes?
A. PaaS
B. SaaS
B. BaaS
D. IaaS
A. PaaS
Explanation:
PaaS will allow her developers to create and design their software on a variety of OSs, increasing the breath of the market she can sell to. Also, she can use geographically dispersed programmers increasing the breadth of the market she can sell to
What the the optimal number of entrances to the cloud data center campus?
A. One
B. Two
C. three
D. Four
A. One
Explanation:
Controlling access is optimized by minimizing access
Which of the following is considered a technological control?
A. Firewall software
B. Fireproof safe
C. Fire extinguisher
D. Firing personal
A. Firewall software
Explanation:
A firewall is a technological control
Which of the following is not an essential element defining cloud computing?
A. Broad network access
B. Metered service
C. Offsite storage
D. On demand self service
C. Offsite storage
Explanation:
Offsite storage is not intrinsic of the definition of cloud computing; all the other options are
The architecture of the World Wide Web, as it works today is _________
A. JSON
B. DoS
C. REST
D. XML
C. REST
Explanation:
The web is mainly HTTP, which is a RESTful protocol
In the cloud, the data processor is usually _______
A. The party that assigns access rights
B. The cloud customer
C. The cloud provider
D. The cloud access security broker
C. The cloud provider
Explanation:
In legal terms, when data processor is defined, it refers to anyone who stores, handles, moves or manipulates data on behalf of the data owner or controll. In the cloud computing realm, this is the cloud provider
When building a new data center within an urban environment, which of the following is probably the most restrictive aspect?
A. The size of the plot
B. Utility availability
C. Staffing
D. Municipal codes
D. Municipal codes
Explanation:
In any large metro area, government restrictions on development and construction can severely limit how you use your property; this can be significant limiting factor in building a data center
DLP solutions can aid in deterring loss due to which of the following?
A. Malicious disclosure
B> Performance issues
C. Bad policy
D. Power failure
A. Malicious disclosure
Explanation:
DLP tools can identify outbound traffic that violates the organizations policies
Risk should always be considered from a business perspective. Risk is often balanced by corresponding _________
A. Profit
B. Performance
C. Cost
D. Opportunity
D. Opportunity
Explanation:
The only reason organizations accept any level of risk is because of the potential benefit by a risky activity
____________ is an agentless means of ensuring a VMs security baseline does not change over time by examining such things as physical location and network settings
A. ECC
B. VMI
C. HIDS
D. NIDS
B. VMI
Explanation:
Virtual machine introspection is an agentless means of ensuring a VMs security baseline does not change over time by examining things such as physical address, network settings and installed OS. These ensure that the baseline has not been inadvertently or maliciously tampered with
In working with various networking technologies such as Frame Relay, ATM and Ethernet, the capability of the network to provide better service to select traffic is called:
A. QaS
B. ASP
C. OLA
D. QoS
D. QoS
Explanation:
Quality of service refers to the capability of a network to provide better service for certain traffic regardless of the network type or topology
Which of the following best describes the purpose of a DMZ?
A. Isolates public facing network elements that would otherwise be vulnerable to attack
B. Isolates email servers that are Internet facing and protects them from attacks
C. Provides network elements such as routers that are Internet facing to protect them from attack
D. Tracks incoming attack patterns
A. Isolates public facing network elements that would otherwise be vulnerable to attack
Explanation:
A DMZ isolates network elements that are public facing and would otherwise be vulnerable to attack
Which of the following best describes a qualitative risk assessment?
A. Typically employs a set of methods, principles or rules for assessing risk based on numerical categories
B. Typically employs a set of methods, principles or rules for assessing risk based on numbers
C. Typically employs a set of methods, principles or rules for assessing risk based on nonnumerical categories
D. Typically employs a set of methods, principles or rules for assessing risk based on threat categories
C. Typically employs a set of methods, principles or rules for assessing risk based on nonnumerical categories
Explanation:
As opposed to quantitative assessments, which use specific numerical values such as 1,2 and 3, qualitative assessments use nonnumerical categories that are relative in nature such as high medium or low
In regard to most privacy guidance, the data controller is _________
A. The individual described by the privacy data
B.The entity that collects or creates the privacy data
C. The entity that uses privacy data on behalf of the controller
D. The entity that regulates privacy data
B.The entity that collects or creates the privacy data
Explanation:
Option B is the definition of the data controller
Which of the following laws resulted from a lack of independence in audit practices?
A. HIPAA
B. GLBA
C. SOX
D. ISO 27064
C. SOX
Explanation:
SOX was passed primarily to address the issues if audit independence, poor board over sight, and transparency of findings
When designing a cloud data center, which of the following is not necessary to ensure continuity of operations during contingency operations?
A. Access to clean water
B. Broadband data connection
C. Extended battery backup
D. Physical access to the data center
C. Extended battery backup
Explanation:
Backup power does not have to be delivered by batteries; it can be fed to the data center through redundant utility lines or from a generator
Availability refers to which of the following?
A. The amount of uptime in any given 30 day period
B. The amount of uptime specified in the SLA
C. Whether authorized users can access services and/or data
D. The amount of uptime promised by the cloud vendor
C. Whether authorized users can access services and/or data
Explanation:
Availability is one of the three legs of the CIA triad, this represents when services and/or data can be accessed in an authorized manner
What are the two general delivery modes for SaaS model?
A. Ranked and free
B. Hosted application management and software on demand
C. Intrinsic motivation complex and undulating perspective details
D. Framed and modular
B. Hosted application management and software on demand
Explanation:
In SaaS, the cloud provider might license and deliver commercially available software for the customer, via the cloud or provide the customer access to the providers proprietary software
Which of the following aspects of cloud computing can enhance the customers business and continuity and disaster recovery efforts?
A. Ondemand self service
B. Pooled resources
C. Virtualization
D. The control plane
A. Ondemand self service
Explanation:
On demand self service allows the cloud customer to provisioned those production resources during a contingency without any delay in ordering or allocating those resources
To protect data on user devices in BYOD environment, the organization should consider requiring all of the following except:
A. DLP agents
B. Local encryption
C. MFA
D. Two person integrity
D. Two person integrity
Explanation:
Although all the other options are ways to harden a mobile device, two person integrity is a concept that has nothing to do with the topic
During a cost benefit analysis, your company determines that it spends a disproportionate amount of money on software licensing and administration. Which cloud model may best help your company reduce these costs?
A. IaaS
B. PaaS
C. SaaS
D. Hybrid
C. SaaS
Explanation:
In SaaS model, the cloud provider is tasked with acquiring and managing the software licenses; the scale of a cloud providers operations
According to CSA, an organization that operates in the cloud environment and suffers a data breach may be required to __________
A. Notify affected users
B. Reapply for cloud services
C. Scrub all affected physical memory
D. Change regulatory framework
A. Notify affected users
Explanation:
Data breach notification laws are plentiful; organizations operating in the cloud are almost sure to be subject to one or more such laws
Which of the following attack vectors is new to the cloud environment and was not typically found in on premises, legacy environments?
A> DDoS
B. Guest Escape
C. Internal Threats
D. Inadvertent Disclosure
B. Guest Escape
Explanation:
Guest Escape is prevailing threat in a vritualized, multi tenant cloud environment and was not commonly found in traditional environments