LeanZapp Practice 6 Flashcards

1
Q

Which of the following best describes a Type 1 hypervisor?

A. Synchronization device for Cloud IT environments
B. Uses a minimal piece of software to manage the underlying hardware resources such as RAM, CPU and storage
C. Access control mechanisms for cloud admins
D. Uses a separate piece of hardware to manage the underlying hardware resources such as RAM, CPU, and storage

A

B. Uses a minimal piece of software to manage the underlying hardware resources such as RAM, CPU and storage

Explanation:
A Type 1 hypervisor uses a minimal piece of software to manage the underlying resources. A Type 2 hypervisor is a piece of software installed on top of or as part of a devices OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_________ is a direct identifier, __________is an indirect identifier

A. Username, password
B. Users name; users age
C. Users IP Address; Users MAC address
D. Location; income level

A

B. Users name; users age

Explanation:
The users name is a direct identifier, explicitly stating who that person is. The users age is not a direct identifier because it doesn’t specify a certain person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__________ are software or devices that monitor or systems for malicious activities or policy violations and produce electronic alerts and/or reports to a management station

A. OSs
B. HSMs
C. NIDs
D. VPNs

A

C. NIDs

Explanation:
NIDs watch for anomalous or malicious system activity at the network level and provider alerts and/or reports on such activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not true about risk mitigation?

A. The cost of the control/countermeasure per year is simple; the overall cost divided by life span, in years
B. Ignoring risk is not risk mitigation; ignoring risk is risk acceptance
C. The cost of mitigation can be compared against the cost of a control/countermeasure to determine the optimum course of action
D. Risk is fluid, so all risk assessments are pointless

A

D. Risk is fluid, so all risk assessments are pointless

Explanation:
A risk assessment may, indeed, be an estimate of a moving target, but it is invaluable in terms of measuring risk at any given point in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is not a feature of SAST?

A. Source code review
B. Team building efforts
C. White box testing
D. Highly skilled, often expensive2 outside consultants

A

B. Team building efforts

Explanation:
Team building has nothing to do with SAST; all the rest of the answers are characteristics of SAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which cloud service model is the customer only responsible for the data?

A. CaaS
B. SaaS
C. PaaS
D. IaaS

A

B. SaaS

Explanation:
SaaS is the model in which the customer only supplies the data; in the other models, the customer also supplies the OS, the application or bothj

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following does not have a personal privacy law that limits the way all citizens and entities can share personal data?

A. Japan
B. Belgium
C. Argentina
D. The US

A

D. The US

Explanation:
The US does not have a single, overarching personal privacy law; instead, the US often protects personal information by industry (HIPAA, GLBA, FERPA, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Regardless of which model the organization uses for system development, in which phase of the SDLC will user input be requested and considered?

A. Define
B. Design
C. Develop
D. Detect

A

A. Define

Explanation:
In the Define phase, we are trying to determine the purpose of the software, in terms of meeting the users needs; therefore, we may solicit input from the user community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the name of the security discipline that enables the right individuals to access the right reesources at the right time and right reasons?

A. Homomorphic encryption
B. IAM
C. GAPP
D. SDLC

A

B. IAM

Explanation:
The security discipline is called IAM and it ensures that the right user always has access to right right resources at the right times for the right reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following constitutes a MFA process or procedure?

A. Using an automated teller machine (ATM) to get cash with your credit or debit card
B. Using a password and PIN to log into a website
C. Presenting a voice sample and fingerprint to access a secure facility
D. Displaying a birth cert and a credit card

A

A. Using an automated teller machine (ATM) to get cash with your credit or debit card

Explanation:
At the ATM, the customer will use the card and enter a PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is the term ISC2 Cloud Secure Data Life Cycle actually somewhat inacurrate?

A. The term is not used only by ISC2
B. Not all phases are secure
C. Not all phases take place in the cloud
D. Its not actually a cycle

A

D. Its not actually a cycle

Explanation:
The Cloud Secure Data Life Cycle phases are in order Create, Store, Use, SHare, Archive, Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DLP can be combined with what other security technology to enhance data controls?

A. DRM
B. SIEM
C. Kerberos
D. Hypervisors

A

A. DRM

Explanation:
DLP can be combined with DRM to protect intellectual property; both are designed to deal with data that dalls into special categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the US Commerce Department controls on technology exports known as?

A. International Traffic in Arms Regulations
B. Export Administration Regulations (EAR)
C. Evaluation Assurance Level (EAL)
D. Digital Rights Management (DRM)

A

B. Export Administration Regulations (EAR)

Explanation:
Export administration regulations (EAR) is a Commerce Department Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Management is interested in adopting an Agile development style. In order for this to happen, the company will have to increase the involvement of _____________

A. Security personnel
B. Budget and finance representatives
C. Members of the user group
D. Senior management

A

C. Members of the user group

Explanation:
Agile requires interaction between developers and personnel who will use the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are performing an audit of the security controls used in a cloud environment. Which of the following would best serve your purpose?

A. The business impact analysis
B. A copy of the VM baseline configuration
C. The latest version of the companys financial records
D. A SOC 3 report from another external auditor

A

B. A copy of the VM baseline configuration

Explanation:
The baseline configuration can be used as a template of controls applied throughout the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes except:

A. Tokenization
B. Data discovery
C. Obfuscation
D. Masking

A

B. Data discovery

Explanation:
Data discovery is a term used to describe the process of identifying information according to specific traits or categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A cloud environment that lacks security controls is vulnerable to exploitation, data loss and interruptions. Conversely, excessive use of security controls ____________

A. Can lead to customer dissatisfaction
B> is a health and human safety
C. Brings down the organizations stock price
D. Negates the need for insurance

A

A. Can lead to customer dissatisfaction

Explanation:
If excessive controls impact the user/customer experience to the extent that system response speeds and results and delayed significantly, and performance is degraded to the point where competitors systems are far superior, customer dissatisfaction can be a severe problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In a centralized broker identity federation, which entity typically creates and sends the SAML token?

A. The cloud provider
B. The ISP
C. The broker
D. The cloud customer

A

C. The broker

Explanation:
In a centralized broker federation, the broker acting as the identity provider, creates the SAMl identity assertion tokens and delivers them to the relying parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The destruction of a cloud customers data can be required by all of the following except:

A. Statute
B. Regulation
C. The cloud providers policy
D. Contract

A

C. The cloud providers policy

Explanation:
The cloud provider cannot typically require the destruction of the customers data simply because of its own policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

All of the following are reasons overwriting is not a viable secure sanitization method for data stored in the cloud except:

A. Overwriting an entire storage resource would affect other tenants data
B. Regulators usually frown on the practice
C. Locating the specific storage locations of cloud data is almost impossible
D. Data is being backed constantly in the cloud; before you finished overwriting an entire data set, it would have been replicated elsewhere

A

B. Regulators usually frown on the practice

Explanation:
Regulators do not disapprove of secure sanitization; it is an acceptable form of secure data destruction if implemented properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which SOC report might be best to use for your initial review of several different cloud providers in order to narrow down the field of potential services in a fast and easy way?

A. SOC 1
B. SOC 2, Type 1
C. SOC 2, Type 2
D. SOC 3

A

D. SOC 3

Explanation:
The SOC 3 Report is an attestation that the target was audited and that is passed the audit; without detail; you could use the SOC 3 reports to quickly narrow down the list of possible providers by eliminating the ones without SOC 3s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is probably the best way to avoid problems associated with vendor lock out?

A. Using strong contract language
B. Use non proprietary data and media formats
C. Use strong cryptography
D. Use another provider for backup purposes

A

D. Use another provider for backup purposes

Explanation:
Vendor lockout occurs when the provider suddenly leaves the market, as during a bankruptcy or acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is considered a physical control?

A. Carpets
B. Ceilings
C. Doors
D. Fences

A

D. Fences

Explanation:
Fences are physical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a form of cloud storagew where data is stored in a logical storage area assigned to the user but not necessarily physically attached or even geographically proximate to the compute node the user is utilizing?

A. Volume Storage
B. Databases
C. Content Delivery network
D. Object Storage

A

A. Volume Storage

Explanation:
In volume storage, the user is assigned a logical drive space into which anything (such as raw data, objects or applications) may be saved or installed, similar to a mounted drive on a traditional network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Software developers creating productions for cloud environments need to consider:

A. The language used in the geographic area of the end user
B. The overall price of development
C. The shared use of underlying resources
D. How digital certs might be used in the cloud

A

C. The shared use of underlying resources

Explanation:
Shared resources can create the potential for side channel attacks if the software is not created with proper controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SOAP is a protocol specification providing for the exchange of structured information or data in web services. Which of the following is not true of SOAP?

A. Standards based
B. Reliant on XML
C. Extremely fast
D. Works over numerous protocols

A

C. Extremely fast

Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TLS is a session encryption tool that uses _______ encryption to create a _____________ session key

A. Symmetric, symmetric
B. Asymmetric, symmetric
C. Asymmetric, asymmetric
D, Symmetric, Asymmetric

A

B. Asymmetric, symmetric

Explanation:
TLS uses asymmetric encryption to create a symmetric session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

GAPPs are created and maintained by which organization?

A. ISO
B. IEC
C. PCI
D. AICPA

A

D. AICPA

Explanation:
AICPPA is the organization responsible for generating and maintaing what are the Generally Accepted Accounting Practices in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which entity is legally responsible for the protection of personal data?

A. The data subject
B. The data controller
C. The data processor
D. The data steward

A

B. The data controller

Explanation:
The data controller is legally liable for protecting any privacy data it has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is a legal practice of removing a suspect from one jurisdiction to another in order for the suspect to face prosecution for violation laws in the latter?

A. Applicable law
B. Judgements
C. Criminal Law
D. Extradition

A

D. Extradition

Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Most attacks that overcome encyrption protections exploit ____________

A. Mathematical principles
B. Misconfigurations
C. Supercomputers
D. Statistical probabilities

A

B. Misconfigurations

Explanation:
Historically, when encryption has been used as a security mechanism, it was not defeated by attacking the encryption directly but rather by subverting the encryption implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the intellectual property protection for a useful manufacturing innovation?

A. Copyright
B. Patent
C. Trademark
D. Trade Secret

A

B. Patent

Explanation:
Patents protect processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What type of intellectual property protection will your company likely rely upon for legally enforcing your rights?

A. Trademark
B. Patent
C. Copyright
D. Trade secret

A

C. Copyright

Explanatrion:
Software is protected by copyright. ALl the other options are forms of protections but not applicable to software for the most part

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of these does the cloud customer need to ensure protection of intellectual property created in the cloud?

A. Digital rights management (DRM) solutions
B. IAM Solutions
C. Strong contractual clauses
D. Cryptoshredding

A

C. Strong contractual clauses

Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

TLS protocol creates a secure communications channel over public media. In a typical TLS session, what is the usual means for establishing trust between the parties?

A. Out of band authentication
B. Public key infrastructure certs
C. MFA
D. Preexisting knowledge of each other

A

B. Public key infrastructure certs

Explanation:
TLS usually relies on PKI certs authenticated and issued by a trusted third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Where are the business requirements most likely to be mapped to software construction?

A. Define
B. Design
C. Test
D. Secure Operations

A

B. Design

Explanation:
Design is the correct answer, as this is where the requirements gathered during the Define phases are mapped to system designs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Is overwriting a feasible secure sanitization method in the cloud?

A. Yes, but only if you use multiple passes
B. No, because you cant get physical access to cloud storage resources
C. Yes, but it requires a final pass with all zeros or ones
D. No, because the logical location of the stored data is almost impossible to determine

A

D. No, because the logical location of the stored data is almost impossible to determine

Explanation:
Overwriting is the practice of filling the entire storage of the target data with randomized characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which security tool can perform content inspection of SFTP communications?

A. WAF
B. DAM
C. XML Gateway
D. Single sign on

A

C. XML Gateway

Explanation:
The XML gateway can provide this functionality; it acts as a reverse proxy and can perform content inspection on many traffic protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

According to CSA, in the event of a data breach, a cloud customer will likely need to comply with all the following data breach notification requirements except ________

A. Multiple state laws
B. Contractual notification requirements
C. All standards based notification schemes
D. Any applicable federal regulation

A

C. All standards based notification schemes

Explanation:
Option C is correct because an organization is not required to subscribe to all standards but instead only the standards it selects (or imposed by regulations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is a data discovery approach that offers insight to trends of trends, using both historical and predictive approaches?

A. Obverse polyglotism
B. Big data
C. Real time analytics
D. Agile analytics/business intelligence

A

D. Agile analytics/business intelligence

Explanation:
The Agile approach to data analysis offers greater insight and capabilities than previous generations of analytical technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is perhaps the best method for reducing the risk of a specific application not delivering the proper level of functionality and performance when it is moved from the traditional environment into the cloud?

A. Remove the application from the organizations production environment and replace it with something else
B. Negotiate and conduct a trial run in the cloud environment for that application before permanently migrating
C. Make sure the application is fully updated and patched according to all vendor specifications
D. Run the application in an emulator

A

B. Negotiate and conduct a trial run in the cloud environment for that application before permanently migrating

Explanation:
A trial run in the cloud will reveal any functionality/performance loss before a permanent cloud migration. Option A doesnt reduce any risk for a specific application

42
Q

Which of these subsystems is probably most important for acquiring useful log info?

A. Fan
B. RAM
C. Clock
D. UPS

A

C. Clock

Explanation:
the clock needs to be synced throughout the environment so that all activity can be contextualized and mapped and a true narrative of events can be reconstructed later

43
Q

A pentest is designed to ________

A. Document ongoing attacks
B. Test a system for vulnerabilities that would allow an attacker to gain control over said system
C. Detect attacks in real time
D. Test a system, network or web application for vulnerabilities that would allow an attacker to gain control over said system, network or application

A

D. Test a system, network or web application for vulnerabilities that would allow an attacker to gain control over said system, network or application

Explanation:
A pentest is a test that is designed to take advantage of any vulnerability it can find to compromise a system or gain unauthorized access

44
Q

When deciding whether to apply specific updates, it is best to follow, in order to demonstrate due care:

A. Regulations
B. Vendor guidance
C. internal policy
D. Competitors actions

A

B. Vendor guidance

Explanation:
A data center doesnt follow vendor guidance might be seen as failing to provide due care

45
Q

Which of the following best describes a set of practices that focus on aligning IT services with business needs?

A. ITIL
B. ISO
C. HIPAA
D. GLBA

A

A. ITIL

Explanation:
ITIL is a set of practices that focus on aligning IT services with business needs

46
Q

Which of the following probably poses the most significant risk to the organization?

A. Not having essential BCDR personnel available during a contingency
B. Not including all BCDR elements in the cloud contract
C. Returning to normal operations too soon
D. Telecommunications outages

A

C. Returning to normal operations too soon

Explanation:
A premature return to normal operations can jeopardize not only production, but personnel; if the contingency that caused the BCDR action is not fully complete/addressed, there may still be danger remaining

47
Q

TLS uses a new ________ for each secure connection

A. Symmetric key
B. Asymmetric key
C. Public-private key pair
D. Inverse comparison

A

A. Symmetric key

Explanation:
TLS uses symmetric key crypto for each communications session in order to secure the connection; the session key is uniquely generated each time a new connection is made

48
Q

The process of hardening a device should include which of the following?

A. Encrypting the OS
B. Updating and patching the system
C. Using video cameras
D. Performing thorough personnel background checks

A

B. Updating and patching the system

Explanation:
Updating and patching the system helps harden the system. Encrypting the OS is a distractor

49
Q

Which of the following is not typically a phase in the SDLC?

A. Define
B. Test
C. Develop
D. Sanitization

A

D. Sanitization

Explanation:
Secure sanitization is not included in all (or even many) SDLC models

50
Q

What language is used in the SOAP application design protocol?

A. HTML
B. X.509
C. XML
D. HTTP

A

C. XML

Explanation:
SOAP necessarily uses XML.
HTML is a language to tag tect files so that thjey can be displayed with different fonts, colors, graphics and hyperlinks. HTML is not used in SOAP

51
Q

Storage controllers will typically be involved with each of the following storage protocols except:

A. iSCSI
B. RAID
C. Fibre Channel
D. Fibre Channel over Ethernet

A

B. RAID

Explanation:
This question might be susceptible to overthinking because it is simplistically straightforward.,

52
Q

Which SSAE 18 audit report is simply an attestation of audit results?

A. SOC 1
B. SOC 2, Type 1
C. SOC 2, Type 2
D. SOC 3

A

D. SOC 3

Explanation:
This is the definition of a SOC 3 report

53
Q

Risk is usually viewed with consideration for all the following elements except _________

A. Impact that could occur if a given circumstance is realized
B. The likelihood of probability a circumstance will occur
C. In the context of specific threats to an organization
D. According to risks recently realized by other organizations in the same industry

A

D. According to risks recently realized by other organizations in the same industry

Explanation:
While historical information, especially that specific to the organizations industry can be useful in assessing threats, risk must be considered independently from other occurrences;

54
Q

According to the CSA, service traffic hijacking can affect which portion of the CIA triad?

A. Confidentiality
B. Integrity
C. Availability
D. All of the triad

A

D. All of the triad

Explanation:
All. Service traffic hijacking can affect all portions of the CIA triad. Through hijacking, an attacker could eavesdrop on legitimate communication

55
Q

Countermeasures for protecting cloud operations against external attackers include all of the following except:

A. Continual monitoring for anomalous activity
B. Detailed and extensive background checks
C. Hardened devices and systems, including servers, hosts, hypervisors and virtual machines
D. Regular and detailed configuration/change management activities

A

B. Detailed and extensive background checks

Explanation:
Background checks are controls for attenuating potential threats from internal actors;

56
Q

Federation should be _______ to the users

A. Hostile
B. Proportional
C. Transparent
D. Expensive

A

C. Transparent

Explanation:
Federation allows ease of use for access to multiple resource providers; this provides a transparent user mechanism

57
Q

All of these can affect the quality of service expected from an application except:

A. Encryption
B. Egress monitoring
C. Antimalware tools
D. Use of known secure libraries/components

A

D. Use of known secure libraries/components

Explanation:
Using only known secure libraries and components in software design may slow down development efforts but shouldnt impact how the application runs

58
Q

The additional review activities that might be performed for privileged user accounts include all of the following except:

A. Deeper personnel background checks
B. Review of personal financial accounts for privileged users
C. More frequent reviews of the necessity for access
D. Pat down checks of privileged users to deter against physical theft

A

D. Pat down checks of privileged users to deter against physical theft

Explanation:
The efficacy of frisking admins and managers is doubtful and the harm to morale and disparity

59
Q

Impact resulting from risk being realized is often measured in terms of :

A. Amount of data lost
B. Money
C. Amount of property lost
D. Number of people affected

A

B. Money

Explanation:
While all the options are somewhat true, because all of that information can be sued to provide the most comprehensive risk picture, the best answer among those listed is money

60
Q

What functional process can aid in BCDR efforts?

A. SDLC
B. Data classification
C. Honeypots
D. Identity Management

A

B. Data classification

Explanation:
The data classification process is the organizations formal means of determining value of its assets

61
Q

When targeting a cloud customer, a court grants an order allowing law enforcement entity to seize:

A. Electronic data
B. Hardware
C. Electronic data and the hardware on which it resides
D. only data extracted from the hardware

A

C. Electronic data and the hardware on which it resides

Explanation:
Courts can issue seizure orders for anything and everything

62
Q

A UPS should have enough power to last how long?

A. 12 hours
B. 10 minutes
C. One day
D. Long enough for graceful shutdown

A

D. Long enough for graceful shutdown

Explanation:
The UPS is intended to last only long enough to save production data currently being processed

63
Q

Which of the following does not typically represent a means for enhanced authentication?

A. Challenge questions
B. Variable keystrokes
C. Out of band identity confirmation
D. Dynamic end user knowledge

A

B. Variable keystrokes

Explanation:
Variables, in general arent useful for authentication; authentication requires a match against a template or a known quantity

64
Q

Both short term and long term strategies designed to assist organizations in recovering activities that disrupt critical functions are called:

A. BCDR
B. BCP
C. DR
D. BIA

A

A. BCDR

Explanation:
BCDR are both strategies designed to aid organizations in recovering from disruptions in activities

65
Q

DRM requires that every data resource be provisioned with:

A. A tracking device
B. An access policy
C. A hardware security module
D. A biometric system

A

B. An access policy

Explanation:
For DRM to work properly, each resource needs to be outfitted with an access policy so that only authorized entities may make use of that resource

66
Q

What is probably the optimum way to avoid vendor lock in?

A. Use nonproprietary data formats
B. Use industry standard media
C. Use strong cryptography
D. Use favorable contract language

A

D. Use favorable contract language

Explanation:
The contract is probably the cloud customers best tool for avoiding vendor lock in; contract terms will establish how easy it is to migrate your organizations data to another provide in a timely, cost effective, manner

67
Q

In a cloud environment, encryption should be used for all of the following except:

A. Long term storage of data
B. Near term storage of virtualized images
C. Secure sessions/VPN

A

D. Profile formatting

Explanation:
All of the activites should incorporate encryption, except for profile formatting, which is a made up term.

68
Q

In protections afforded to PII under GLBA, the subject must ______ in order to prevent the vendor from sharing their personal data

A. Opt in
B. Opt out
C. Undergo screening
D. Provide a biometric template

A

B. Opt out

Explanation:
Under GLBA, financial and insurance vendors are allowed tro share account holders personal data with other entities unless the account holder explicitly states in writing that the vendor is not allowed to do so

69
Q

The _________ controls the entire infrastructure and is independent of physical network configuration

A. Hypervisor
B. SDN
C. Management plane
D. IaaS

A

C. Management plane

Explanation:
the management plane is used to crreate logical networking connections regardless of physical layout

70
Q

Which of the following is not included in OWASP Top Ten web application security threats?

A. Injection
B. Cross Site scripting
C. Internal theft
D. Sensitive data exposure

A

C. Internal theft

EExplanation:
Internal theft is not listed in the Top 10

71
Q

Who should be responsible for ensuring the state, security and control of all evidence from the time its collected until its presented in court?

A. The data controller
B. The evidence custodian
C. The security manager
D. The IT Director

A

B. The evidence custodian

Explanation:
The evidence custodian is the person designated to maintain the chain of custody for the duration of the investigation

72
Q

Using one cloud provider for your operational environment and another for your BCDR backup will also give you the additional benefit of:

A. Allowing any custom VM builds you use to be instantly ported to another environment
B. Avoiding vendor lock/lock out
C. Increased performance
D. Lower costs

A

B. Avoiding vendor lock/lock out

Explanation:
Having an additional backup with a different provider means that if your primary provider becomes unusuable for any reason, your data is not being held hostage or lost

73
Q

Cloud customers in a public cloud managed services environment can install all the following types of firewalls except:

A. Provider operated
B. Host based
C. Third party
D. Hardware

A

D. Hardware

Explanation:
cloud customer with rare exceptions, will not be allowed to add hardware to the cloud data center

74
Q

In PII content, who is the processor?

A. the cloud customer
B. the cloud provider
C. the regulator
D. the individual

A

B. the cloud provider

Explanation:
In PII context, the processor is any entity that processes data on behalf or at the behest of the data owner.

75
Q

Which of the following should occur during the final phase of the Cloud Secure Data Life Cycle?

A.Data Dispersion
B. Cryptoshredding
C. Cryptoparsing
D. Cryptospordium

A

B. Cryptoshredding

Explanation:

76
Q

Which of the following frameworks focuses specifically on design implementation and management?

A. ISO 31000-2009
B. HIPAA
C. ISO 27017
D. NIST 800-92

A

A. ISO 31000-2009

Explanation:
ISO 31000-2009 speficially focuses on design implementation and management

77
Q

The inclusion of security controls in the software design process is dictated by _________

A. NIST 800-37
B. AICPA
C. ISO 27034
D. HIPAA

A

C. ISO 27034

Explanation:
ISO 37034 addresses the sets of controls used in software throughout the environment

78
Q

You work for a small application development company. Which of the following traits of cloud functionality is probably the most crucial in terms of deciding which cloud provider you will choose?

A. Portability
B> Interoperability
C. Resiliency
D. Governance

A

B> Interoperability

Explanation:
Because you will bee creating proprietary software, you will probably be most concerned with how it will function across many platforms

79
Q

What is one possible risk associated with the use of algorithm masking for obscuring a data set?

A. You could corrupt the production data
B. The data could be subject to easy inadvertent disclosure
C. Algorithms are two way operations
D. A null set has no test value

A

C. Algorithms are two way operations

Explanation:
Using an algorithm to mask data suggests that the same algorithm, if learned or reverse engineered by an aggressor, could be sued on the masked data to reveal the production data

80
Q

Which Common Criteria Evaluation Assurance Level is granted to those products that are formally verified in terms of designed and tested by an independent third party?

A. 1
B. 3
C. 5
D. 7

A

D. 7

Explanation:
EAL 7 is for those products that have undergone independent third party testing and verification of security feature design.

81
Q

A loosely coupled storage cluster will have performance and capacity limitations based on the:

A. Physical backplane connecting it
B. Total number of nodes in the cluster
C. Amount of usage demanded
D. The performance and capacity in each node

A

D. The performance and capacity in each node

Explanation:
In a loosely coupled storage cluser, each node acts as an independent data store that can be added or removed from the cluster without affecting other nodes

82
Q

All of the following are identity federation standards commonly found in use today except:

A. WS Federation
B. OpenID
C. OAuth
D. Pretty Good Privacy (PGP)

A

D. Pretty Good Privacy (PGP)

Explanation:
PGP is an email encryption, not an identity federation standard

83
Q

Administrative penalties for violating GDPR can range up to:

A. $100,000 USD
B. 500,000 euros
C. 20,000,000 euros
D. 1,000,000 euros

A

C. 20,000,000 euros

Explanation:

84
Q

Where should the cloud providers data discovery requirements be listed?

A. NIST 800-53
B. Applicable laws and regulations
C. PCI DSS
D. The managed services contract and SLA

A

D. The managed services contract and SLA

Explanation:
The cloud customer will have to determine which levels of performance/responsibilities on the part of the provider will be necessary to meet the customer’s needs for data discovery. These should be codified in the contract/SLA

85
Q

Which typee of attacks occurs when an application received untrusted data and then sends it to a web browser without proper validation?

A. SQL Injection
B. Brute force
C. XSS
D. Man in the middle

A

C. XSS

Explanation:
A XSS attack occurs when an application receives untrusted data and then sends it to a web browser without proper valiidation, allowing an attacker to execute scripts in the users browser, hijack sessions or engage in other malicious behavior

86
Q

When implementing a DRM solution in a cloud environment, which of the following does not pose an additional challenge for the cloud customer?

A. Users might be required to install a DRM agent on their local devices
B. DRM Solutions might have difficult interfacing with multiple different operating systems and services
C. DRM solutions might have difficult interacting with virtualized instances
D. Ownership of intellectual property might be difficult to ascertain

A

D. Ownership of intellectual property might be difficult to ascertain

Explanation:
The owner of intellectual propert will not change whether the materials is stored in the cloud or in a legacy environment. Moving into the cloud will probably result in more use of personal devices, requiring users to install local DRM agents, so option A is true. Options B and C are also true due to the nature of cloud computing and are therefore also not suitable for this question

87
Q

You are the security directory for a call center that provides live support for customers of various vendors. Your staff handles calls regarding refunds, complaints and the use of products customers have purchased. To process refunds, your staff will have access to purchase info, determine which credit card the customer used and identify specific elements of personal data. How should you best protect this sensitive data and still accomplish the purpose?

A . Encrypt the data while it is at rest but allow the call center personnel to decrypt it for refund transactions
B. Encrypt the data while call center personnel are performing their operations
C. Mask the data while call center personnel are performing their operations
D. Have the call center personnel request the pertinent information from the customer for every transaction

A

C. Mask the data while call center personnel are performing their operations

Explanation:
Masking the data should suffice for the purpose; it allows the call center personnel to determine which card was used in the sale but does not reveal the card number to the call center

88
Q

Synthetic performance monitoring may be preferable to real user monitoring (RUM) because:

A. It costs less
B. It is a more accurate depiction of user behavior
C. It is more comprehensive
D. It can take place in the cloud

A

C. It is more comprehensive

Explanation:
Synthetic agents can simulate user activity in a much faster, broader manner and perform these actions 24/7 without rest

89
Q

Sprawl in the cloud can lead to a significant additional costs to the organization because of:

A. Larger necessary physical footprint
B. Much larger utility consumption
C. Software licensing
D. Requisite additionnal training

A

C. Software licensing

Explanation:
In some instances, more virtualized machines will entail a relative increase in the number of software seatr licenses, which can be a significant expense

90
Q

Security best practices in a virtualized environment would include which of the following?

A. Using distinct ports and port groups for VLANs on a vritual switch rather than running them through the same port
B. Running iSCSI traffic unencrypted in order to have it observed and monited by a NIDS
C. Adding a HIDS to all virtual guests
D. Hardening all outward facing firewalls in order to make them resistant to attack

A

A. Using distinct ports and port groups for VLANs on a vritual switch rather than running them through the same port

Explanation

91
Q

Symmetric encryption involves ___________

A. The Diffie Helman Key exchange
B. Passing keys out of band
C. Mathematically related key pairs
D. A one way mathematical algorithm for validating messages

A

B. Passing keys out of band

Explanation:
In symmetric encryption, thee key must usually be passeed through a different medium than will be used for sending and receiving the encrypted messages
DH is usually used for asymmetric encryption to establish a temporary symmetric key

92
Q

There are two reasons to conduct a test of the organizations recovery from backup in an environment other than the primary production environment. Which of the following is one of them?

A. It is good to invest in more than one community
B. You want to approximate contingency conditions, which includes not operating in the primary location
C. It is good for your personnel to see other places occasionally
D. Your regulators wont follow you off site so you ll be unobserved during your test

A

B. You want to approximate contingency conditions, which includes not operating in the primary location

Explanation:
Assuming your facility is not available during contingency operations allow you to better approximate an emergency situation, which adds realism to the test

93
Q

Of the following options, which is a reason cloud data center audits are often less easy to verify than traditional audits?

A. Cryptography is present
B, Auditors dont like the cloud
C. Cloud equipment is resistant to audit
D. They often rely on data the provider chooses to disclose

A

D. They often rely on data the provider chooses to disclose

Explanation:
In many circumstances, a cloud audit will depend on which info a cloud provider discloses, which makes auditing difficult and less trustworthy

94
Q

A cloud environment that lacks security controls is vulnerable to exploitation, data loss and interruptions. Conversely, excessive use of security controls ___________

A. Can lead to DDoS
B. Allows malware infections
C. Increases the risk of adverse environmental effects
D. Is an unnecessary expense

A

D. Is an unnecessary expense

Explanation:
From a simple financial perspective (which is often the managerial perspective), money spent on excessive anything is money wasted; spending to no good effect is detrimental

95
Q

You are in charge of building a cloud data center. What purposes does the raise floor serve?

A. Allows airflow and increases structural soundness for holding large components
B. Cold air feed and place to run wires for the machines
C. Additional storage for critical components and a dedicated access to a landline
D. Fire suppression systems and personnel safety

A

B. Cold air feed and place to run wires for the machines

Explanation:
The raised floor in a data center will serve as an air plenum (usually for cold air) and a wiring chase. All the other options are incorrect

96
Q

MFA consists of at least two items. Which of the following best represents this concept?

A. A complex password and a secret code
B. Complex passwords and an HSM
C. A hardware token and a magnetic stripe card
D. Something you know and something you have

A

D. Something you know and something you have

Explanation:
Option D is the best, most general, and most accurate answer

97
Q

What is the principal issue concerning transborder data flow?

A. Government taxation standards differ
B. Differences may exist in customs or procedures
C. Encryption must be implemented
D. Legal requirements may not be the same

A

D. Legal requirements may not be the same

Explanation:
The concern with trans-border data flow is that the legal requirements may be different between the countries. An additional concern with trans border data flow is that the level of risk may different depending on privacy and laws affecting intellectual property, such as trademark and copyright

98
Q

Which of the following is not a goal of site survey?

A. Threat definition
B. Target identification
C. Pentesting
D. Facility characteristics

A

C. Pentesting

Explanation:
The pentest is not part of the site survey

99
Q

How does representational state transfer (REST) make web service requests?

A. XML
B. SAML
C. URIs
D. TLS

A

C. URIs

Explanation:
REST calls web resources by using uniform resource identifiers (URIs)
XML may be used for REST, but it is not a requirement as it is in SOAP

100
Q

You are designing a private cloud data center for an insurance underwriter, to be located in a major metro area. Which of the following airflow management schemes is preferable?

A. Hot aisle
B. Cold aisle
C. Either hot aisle or cold aisle
D. Free flow

A

C. Either hot aisle or cold aisle

Explanation:
It shouldnt matter which design you use as long as airflow is managed. Neither hot or cold aisle containment is preferable to the other

101
Q
A