LeanZapp Practice 6 Flashcards
Which of the following best describes a Type 1 hypervisor?
A. Synchronization device for Cloud IT environments
B. Uses a minimal piece of software to manage the underlying hardware resources such as RAM, CPU and storage
C. Access control mechanisms for cloud admins
D. Uses a separate piece of hardware to manage the underlying hardware resources such as RAM, CPU, and storage
B. Uses a minimal piece of software to manage the underlying hardware resources such as RAM, CPU and storage
Explanation:
A Type 1 hypervisor uses a minimal piece of software to manage the underlying resources. A Type 2 hypervisor is a piece of software installed on top of or as part of a devices OS
_________ is a direct identifier, __________is an indirect identifier
A. Username, password
B. Users name; users age
C. Users IP Address; Users MAC address
D. Location; income level
B. Users name; users age
Explanation:
The users name is a direct identifier, explicitly stating who that person is. The users age is not a direct identifier because it doesn’t specify a certain person
__________ are software or devices that monitor or systems for malicious activities or policy violations and produce electronic alerts and/or reports to a management station
A. OSs
B. HSMs
C. NIDs
D. VPNs
C. NIDs
Explanation:
NIDs watch for anomalous or malicious system activity at the network level and provider alerts and/or reports on such activity
Which of the following is not true about risk mitigation?
A. The cost of the control/countermeasure per year is simple; the overall cost divided by life span, in years
B. Ignoring risk is not risk mitigation; ignoring risk is risk acceptance
C. The cost of mitigation can be compared against the cost of a control/countermeasure to determine the optimum course of action
D. Risk is fluid, so all risk assessments are pointless
D. Risk is fluid, so all risk assessments are pointless
Explanation:
A risk assessment may, indeed, be an estimate of a moving target, but it is invaluable in terms of measuring risk at any given point in time
Which of the following is not a feature of SAST?
A. Source code review
B. Team building efforts
C. White box testing
D. Highly skilled, often expensive2 outside consultants
B. Team building efforts
Explanation:
Team building has nothing to do with SAST; all the rest of the answers are characteristics of SAST
In which cloud service model is the customer only responsible for the data?
A. CaaS
B. SaaS
C. PaaS
D. IaaS
B. SaaS
Explanation:
SaaS is the model in which the customer only supplies the data; in the other models, the customer also supplies the OS, the application or bothj
Which of the following does not have a personal privacy law that limits the way all citizens and entities can share personal data?
A. Japan
B. Belgium
C. Argentina
D. The US
D. The US
Explanation:
The US does not have a single, overarching personal privacy law; instead, the US often protects personal information by industry (HIPAA, GLBA, FERPA, etc)
Regardless of which model the organization uses for system development, in which phase of the SDLC will user input be requested and considered?
A. Define
B. Design
C. Develop
D. Detect
A. Define
Explanation:
In the Define phase, we are trying to determine the purpose of the software, in terms of meeting the users needs; therefore, we may solicit input from the user community
What is the name of the security discipline that enables the right individuals to access the right reesources at the right time and right reasons?
A. Homomorphic encryption
B. IAM
C. GAPP
D. SDLC
B. IAM
Explanation:
The security discipline is called IAM and it ensures that the right user always has access to right right resources at the right times for the right reasons
Which of the following constitutes a MFA process or procedure?
A. Using an automated teller machine (ATM) to get cash with your credit or debit card
B. Using a password and PIN to log into a website
C. Presenting a voice sample and fingerprint to access a secure facility
D. Displaying a birth cert and a credit card
A. Using an automated teller machine (ATM) to get cash with your credit or debit card
Explanation:
At the ATM, the customer will use the card and enter a PIN
Why is the term ISC2 Cloud Secure Data Life Cycle actually somewhat inacurrate?
A. The term is not used only by ISC2
B. Not all phases are secure
C. Not all phases take place in the cloud
D. Its not actually a cycle
D. Its not actually a cycle
Explanation:
The Cloud Secure Data Life Cycle phases are in order Create, Store, Use, SHare, Archive, Destroy
DLP can be combined with what other security technology to enhance data controls?
A. DRM
B. SIEM
C. Kerberos
D. Hypervisors
A. DRM
Explanation:
DLP can be combined with DRM to protect intellectual property; both are designed to deal with data that dalls into special categories
What are the US Commerce Department controls on technology exports known as?
A. International Traffic in Arms Regulations
B. Export Administration Regulations (EAR)
C. Evaluation Assurance Level (EAL)
D. Digital Rights Management (DRM)
B. Export Administration Regulations (EAR)
Explanation:
Export administration regulations (EAR) is a Commerce Department Program
Management is interested in adopting an Agile development style. In order for this to happen, the company will have to increase the involvement of _____________
A. Security personnel
B. Budget and finance representatives
C. Members of the user group
D. Senior management
C. Members of the user group
Explanation:
Agile requires interaction between developers and personnel who will use the software
You are performing an audit of the security controls used in a cloud environment. Which of the following would best serve your purpose?
A. The business impact analysis
B. A copy of the VM baseline configuration
C. The latest version of the companys financial records
D. A SOC 3 report from another external auditor
B. A copy of the VM baseline configuration
Explanation:
The baseline configuration can be used as a template of controls applied throughout the environment
All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes except:
A. Tokenization
B. Data discovery
C. Obfuscation
D. Masking
B. Data discovery
Explanation:
Data discovery is a term used to describe the process of identifying information according to specific traits or categories
A cloud environment that lacks security controls is vulnerable to exploitation, data loss and interruptions. Conversely, excessive use of security controls ____________
A. Can lead to customer dissatisfaction
B> is a health and human safety
C. Brings down the organizations stock price
D. Negates the need for insurance
A. Can lead to customer dissatisfaction
Explanation:
If excessive controls impact the user/customer experience to the extent that system response speeds and results and delayed significantly, and performance is degraded to the point where competitors systems are far superior, customer dissatisfaction can be a severe problem
In a centralized broker identity federation, which entity typically creates and sends the SAML token?
A. The cloud provider
B. The ISP
C. The broker
D. The cloud customer
C. The broker
Explanation:
In a centralized broker federation, the broker acting as the identity provider, creates the SAMl identity assertion tokens and delivers them to the relying parties
The destruction of a cloud customers data can be required by all of the following except:
A. Statute
B. Regulation
C. The cloud providers policy
D. Contract
C. The cloud providers policy
Explanation:
The cloud provider cannot typically require the destruction of the customers data simply because of its own policy
All of the following are reasons overwriting is not a viable secure sanitization method for data stored in the cloud except:
A. Overwriting an entire storage resource would affect other tenants data
B. Regulators usually frown on the practice
C. Locating the specific storage locations of cloud data is almost impossible
D. Data is being backed constantly in the cloud; before you finished overwriting an entire data set, it would have been replicated elsewhere
B. Regulators usually frown on the practice
Explanation:
Regulators do not disapprove of secure sanitization; it is an acceptable form of secure data destruction if implemented properly
Which SOC report might be best to use for your initial review of several different cloud providers in order to narrow down the field of potential services in a fast and easy way?
A. SOC 1
B. SOC 2, Type 1
C. SOC 2, Type 2
D. SOC 3
D. SOC 3
Explanation:
The SOC 3 Report is an attestation that the target was audited and that is passed the audit; without detail; you could use the SOC 3 reports to quickly narrow down the list of possible providers by eliminating the ones without SOC 3s
What is probably the best way to avoid problems associated with vendor lock out?
A. Using strong contract language
B. Use non proprietary data and media formats
C. Use strong cryptography
D. Use another provider for backup purposes
D. Use another provider for backup purposes
Explanation:
Vendor lockout occurs when the provider suddenly leaves the market, as during a bankruptcy or acquisition
Which of the following is considered a physical control?
A. Carpets
B. Ceilings
C. Doors
D. Fences
D. Fences
Explanation:
Fences are physical controls
What is a form of cloud storagew where data is stored in a logical storage area assigned to the user but not necessarily physically attached or even geographically proximate to the compute node the user is utilizing?
A. Volume Storage
B. Databases
C. Content Delivery network
D. Object Storage
A. Volume Storage
Explanation:
In volume storage, the user is assigned a logical drive space into which anything (such as raw data, objects or applications) may be saved or installed, similar to a mounted drive on a traditional network
Software developers creating productions for cloud environments need to consider:
A. The language used in the geographic area of the end user
B. The overall price of development
C. The shared use of underlying resources
D. How digital certs might be used in the cloud
C. The shared use of underlying resources
Explanation:
Shared resources can create the potential for side channel attacks if the software is not created with proper controls
SOAP is a protocol specification providing for the exchange of structured information or data in web services. Which of the following is not true of SOAP?
A. Standards based
B. Reliant on XML
C. Extremely fast
D. Works over numerous protocols
C. Extremely fast
Explanation:
TLS is a session encryption tool that uses _______ encryption to create a _____________ session key
A. Symmetric, symmetric
B. Asymmetric, symmetric
C. Asymmetric, asymmetric
D, Symmetric, Asymmetric
B. Asymmetric, symmetric
Explanation:
TLS uses asymmetric encryption to create a symmetric session key
GAPPs are created and maintained by which organization?
A. ISO
B. IEC
C. PCI
D. AICPA
D. AICPA
Explanation:
AICPPA is the organization responsible for generating and maintaing what are the Generally Accepted Accounting Practices in the US
Which entity is legally responsible for the protection of personal data?
A. The data subject
B. The data controller
C. The data processor
D. The data steward
B. The data controller
Explanation:
The data controller is legally liable for protecting any privacy data it has.
Which of the following is a legal practice of removing a suspect from one jurisdiction to another in order for the suspect to face prosecution for violation laws in the latter?
A. Applicable law
B. Judgements
C. Criminal Law
D. Extradition
D. Extradition
Explanation:
Most attacks that overcome encyrption protections exploit ____________
A. Mathematical principles
B. Misconfigurations
C. Supercomputers
D. Statistical probabilities
B. Misconfigurations
Explanation:
Historically, when encryption has been used as a security mechanism, it was not defeated by attacking the encryption directly but rather by subverting the encryption implementation
What is the intellectual property protection for a useful manufacturing innovation?
A. Copyright
B. Patent
C. Trademark
D. Trade Secret
B. Patent
Explanation:
Patents protect processes
What type of intellectual property protection will your company likely rely upon for legally enforcing your rights?
A. Trademark
B. Patent
C. Copyright
D. Trade secret
C. Copyright
Explanatrion:
Software is protected by copyright. ALl the other options are forms of protections but not applicable to software for the most part
Which of these does the cloud customer need to ensure protection of intellectual property created in the cloud?
A. Digital rights management (DRM) solutions
B. IAM Solutions
C. Strong contractual clauses
D. Cryptoshredding
C. Strong contractual clauses
Explanation:
TLS protocol creates a secure communications channel over public media. In a typical TLS session, what is the usual means for establishing trust between the parties?
A. Out of band authentication
B. Public key infrastructure certs
C. MFA
D. Preexisting knowledge of each other
B. Public key infrastructure certs
Explanation:
TLS usually relies on PKI certs authenticated and issued by a trusted third party
Where are the business requirements most likely to be mapped to software construction?
A. Define
B. Design
C. Test
D. Secure Operations
B. Design
Explanation:
Design is the correct answer, as this is where the requirements gathered during the Define phases are mapped to system designs
Is overwriting a feasible secure sanitization method in the cloud?
A. Yes, but only if you use multiple passes
B. No, because you cant get physical access to cloud storage resources
C. Yes, but it requires a final pass with all zeros or ones
D. No, because the logical location of the stored data is almost impossible to determine
D. No, because the logical location of the stored data is almost impossible to determine
Explanation:
Overwriting is the practice of filling the entire storage of the target data with randomized characters
Which security tool can perform content inspection of SFTP communications?
A. WAF
B. DAM
C. XML Gateway
D. Single sign on
C. XML Gateway
Explanation:
The XML gateway can provide this functionality; it acts as a reverse proxy and can perform content inspection on many traffic protocols
According to CSA, in the event of a data breach, a cloud customer will likely need to comply with all the following data breach notification requirements except ________
A. Multiple state laws
B. Contractual notification requirements
C. All standards based notification schemes
D. Any applicable federal regulation
C. All standards based notification schemes
Explanation:
Option C is correct because an organization is not required to subscribe to all standards but instead only the standards it selects (or imposed by regulations)
Which of the following is a data discovery approach that offers insight to trends of trends, using both historical and predictive approaches?
A. Obverse polyglotism
B. Big data
C. Real time analytics
D. Agile analytics/business intelligence
D. Agile analytics/business intelligence
Explanation:
The Agile approach to data analysis offers greater insight and capabilities than previous generations of analytical technologies