LearnZapp Practice 1 Flashcards
Which of the following is a feature of SAST?
A. Testing applications while running in RAM
B. Pentesting
C. Team building efforts
D. Source code review
D. Source code review
Explanation:
Static Application security testing examines source code while the application is not running
Which of the following takes advantage of the information developed in the business impact analysis?
A. Calculating ROI
B. Risk analysis
C. Calculating TCO
D. Securing asset acquisition
B. Risk analysis
Explanation:
Among other things, the BIA gathers asset valuation information that is crucial to risk management analysis and further selection of security controls
Which term best describes when a cloud provider goes out of business and leaves the customer unable to retrieve data?
A. Vendor lock in
B. Vendor lock out
C. Bankruptcy
D. Vendor closure
B. Vendor lockout
Explanation:
This is the definition of vendor lockout; when the cloud provider goes out of business and you can no longer access your data. This must be considered when you are determining whether to cloud migration
When monitoring for performance reasons, which of the following should not be included?
A. Free disk space
B. Disk IO
C. CPU Usage
D. Printer queue information
D. Printer queue information
Explanation:
Print spooling is not an accepted performance measure. All the others are critical to keeping the environment running at peak efficiency
Which of the following cloud service models requires the least amount of maintenance, administration and support by the cloud customer?
A. SaaS
B. PaaS
C. IaaS
D. DaaS
A. SaaS
Explanation:
The SaaS model requires the least intervention because the provider is responsible for maintaining the operating system, hardware and software
Of the following SOC reports, which is the most commonly advertised?
A. SOC 1
B. SOC 2 Type 2
C. SOC 2 Type 1
D. SOC 3
D. SOC 3
Explanation:
The SOC 3 report is merely an attestation by an auditor. It does not contain any confidential information and is therefore readily available upon request and often even advertised on websites
After a cloud migration, risks must be reviewed. However, a complete analysis is not necessary because much of the material has already been compiled in which of the following?
A. The cost benefit analysis completed prior to migration
B. The recent BIA
C. The last risk assessment
D. NIST 800-54r4
A. The cost benefit analysis completed prior to migration
Explanation:
Most of the risks associated with the cloud migration are examined in the cost benefit phase of evaluation and therefore do not need to be revisited
Compliance with ASHRAE data center standards for humidity can help reduce the risk of which of the following?
A. Static discharge
B. Malicious users
C. Increased power usage
D. Increased heating cooling expenses
A. Static discharge
Explanation:
The ASHRAE standards provide for humidity standards that reduce the chances of static discharge, which could be catastrophic in a data center environment
Egress monitoring solutions can aid in reducing the potential for loss due to
A. Data seizure
B. Crypto shredding
C. Malicous disclosure
D. Encryption
C. Malicious disclosure
Explanation:
Egress monitoring tools identify outbound traffic that violates an organizations policies, such as when a malicious user attempts data exfiltration
Of the following data center redundancy characteristics, which will be in place regardless of tier?
A. All hardware
B. Power
C. Emergency Egress
D. Cooling
C. Emergency Egress
Explanation:
Human life is always the first priority so all data centers must have an emergency egress. The other characteristics will only be in place and associated with specific tiers
Gathering business requirements aid in determining information about organizational assets. WHich of the following is not determined by this process?
A. Criticality
B. Robustness
C. Value
D. ROI
C. Robustness
Explanation:Robustness is not a trait measured by the process of reviewing business requirements
Of the following, which is a valid readon for a baseline to change?
A. New hardware
B. Numerous change requests
C. New hypervisor
D. New database
B. Numerous change requests
Explanation:
The best reason for changing a baseline is numerous change requests. If too many changes are being requested, it is a sign that the baseline needs to be reviewed and changed in order to meet these new demands
In which of the following does the customer have the most control of their data and systems while the cloud provider will have the least amount of responsibility?
A. PaaS
B. SaaS
C. IaaS
D. DaaS
B. IaaS
Explanation:
In the infrastructure as a service model, the provider offers and manages the physical plant and connectivity to underlying hardware. All systems and data are the responsibility of the customer
What term best describes a set of technologies that analyze application source code, byte code and binaries for coding and design problems that would indicate a security problem or vulnerability?
A. DAST
B. SAST
C. MFA
D. STRIDE
B. SAST
Explanation:
DAST stands for dynamic application security testing and cannot analyze source code as it analyzes code while it is running. MFA stands for multifactor authentication and STRIDE is a threat model concept
How long should an uninterruptable power supply be able to run during a sustained power outage?
A. Long enough for administrative intervention
B. Long enough to complete a graceful system shutdown
C. Until the power resumes
D. 4 hours
B. Long enough to complete a graceful system shutdown
Explanation:
A UPS is configured to safely shut down systems in order to save data in the event of a power failure
Poorly negotiated contacts can cause many problems. Of the following, which is not an example of what can happen when contracts are not properly negotiated?
A. Unfavorable terms
B. Malware
C.Vendor lock in
D. Paying for services not used
B. Malware
Explanation:
MAlware is not the result of a poorly negotiated cloud contract.
Which of the following is the most important mechanism to ensure trust in the cloud providers performance and duties?
A. The contract
B. Statutory Law
C. CSA Security Alliance Cloud Controls Matrix
D. SLA provisions
A. The contract
Explanation:
The contract between the provider and the customer provides trust between the two parties by holding the provider legally responsible for its contractual obligations
Of the following, whose advice should be given the most weight on the decision to patch a live production system?
A. Customer
B. Vendor
C. Internal Compliance
D. Supervisor
B. Vendor
Explanation:
The vendor should be the one advising when and how to patch a system as they will have the most up to date information and it will be their patches you are applying
What is the term used to describe the ease and efficiency of moving data from one provider to another?
A. Portability
B. Mobility
C. Forklifting
D. Vendor Lock Out
A. Portability
Explanation:
This is the term used to describe the ease and efficiency of moving data from one cloud provider to another
WHich of the following is not a countermeasure designed to protect against internal threats?
A. Separation of duties
B. Data masking
C. DLP Solutions
D. Scalability
D. Scalability
Explanation:
All except option D are designed to protect against unreliable personnel actions, including by cloud admins
Which of the following does not represnt an attack on a network?
A. Syn flood
B. Denial of Service
C. Nmap Scan
D. Brute force
C. Nmap scan
Explanation:
All of the rest of these options represent specific network attacks. Nmap is a relatively harmless scanning utility designed for network mapping. Although it can be used for info gathering
WHich of the following is not an acceptable practice for user access control administration?
A. Customer directly administers access
B. Provider provides administration on behalf of the customer
C. Customer provides access administration on behalf of provider
D. Third party provides administration on behalf of the customer
C. Customer provides access administration on behalf of the provider
How quickly should data center transfer switches bring backup power online in the event of a main failure?
A. 3 seconds
B. 1 minute
C. 5 minutes
D. Before the battery backup fails
D. Before the battery backup fails
Of the following, which would be used to protect a companys sales lead information?
A. Trademark
B. Copyright
C. Patent
D. Trade secret
D. Trade secret
Explanation:
Information specific to a company and that is unique to them would be covered under the term trade secret
What is the lowest tier of data center redundancy according to the Uptime Institute?
A. 1
B. 3
C. 5
D. 7
A. 1
Explanation:
There are four tiers of data center redundancy, with 1 being the lowest and 4 being the highest
Of the following, which would be most useful in a disaster that is primarily local, such as an interruption of communications service?
A. Joint operating agreements
B. Diesel Generators
C. Assistance from regulatory agencies
D. Assistance from local law enforcement
A. Joint operating agreements
Explanation:
Having a joint operating agreement with a sister facility can assist greatly when dealing with a local disaster that does not affect a large area
Which of the following is a technology solution for securing databases?
A. NIST
B. SAST
C. SAML
D. DAM
D. DAM
Explanation:
Database activity monitoring is a security technology used for monitoring and analyzing database activity that operates independently of the database management system. NIST is the National Institute of Technology, SAST is a type of application testing, and SAML is a technology used with identity access management
Of the following, which would be used to protect the intellectual property of a logo for a business?
A. Trademark
B. Copyright
C. Trade Secret
D. Patent
A. Trademark
Explanation:
Trademarks are designed to protect symbols such as company logo or trade name
Who is ultimately legally responsible for data loss or disclosure in the cloud?
A. Cloud service provider
B. Cloud broker
C. Cloud customer
D. Cloud admin
C. Cloud customer
Explanation:
The cloud customer, also the data owner, is always ultimately legally responsible for unauthorized disclosures
Regardless of cloud deployment or service model, the customer will always be allowed to access to which of the following?
A. Access controls
B. User permissions
C. Data
D. Hypervisor
C. Data
Explanation:
Regardless of model, the customer owns the data and will therefore always be allowed to access it
WHich of the following is the best example of a technical control?
A. Access control lists
B. Door locks
C. Overriding security policy
D. Configuration guidelines
A. Access control lists
Explanation:
Only access control lists are a technical control. All others are physical and administrative
In order for tokenization to properly work, which of the following must be in place?
A. MFA
B. Two databases
C. Asymmetric encryption keys
D. MFA Key Fobs
B. Two databases
Explanation:
Tokenization requires two databases one containing the raw, original data and a second that contains the tokens that map to the original data
Inability to remotely access a cloud provider impacts which of the three elements of the VIA triad?
A. Integrity
B. Availability
C. Confidentiality
D. Access Controls
B. Availability
Explanation:
The element of availability is impacted if a remote user cannot access the cloud provider
Which of the following is the best example of a SIEM function?
A. Performance enhancements
B. REST
C. SOAP
D. Centralization of log streams
D. Centralization of log streams
Explanation:
In addition to centralization of log streams, SIEMs provide the ability to do trend analysis and view dashboards of activity
Which of the following is not an example of encryption used in cloud computing?
A. Storage encryption
B. Session encryption
C. Data masking
D. TLS remote access
C. Data masking
Explanation:
Data masking is a technique whereby similar text strings are used in place of real data.
How long should the fuel that is stored for data center generators be able to keep the data center up?
A. 12 hours
B. 24 hours
C. 8 hours
D. 48 hours
A. 12 hours
Explanation:
Based on Uptime Institute guidelines, enough fuel should be on hand to keep the generator running for at least 12 hours regardless of the data center tier
When migrating to the cloud, which of the following dependencies are not important as part of the BIA review process?
A. Cloud providers suppliers
B. Cloud providers vendors
C. Cloud providers utilities
D. Cloud providers resellers and brokers
D. Cloud providers resellers and brokers
Explanation:
All options except D are important dependencies when reviewing the BIA
Of which of the following is not a feature of DAST?
A. Runtime testing
B. Executable testing by teams
C. Black box testing
D. Code review
D. Code review
Explanation:
All of the other items listed are features of dynamic application security testing
Which of the following is the term used for the intellectual property protection for the tangible expression of creative ideas?
A. Trademark
B. Registration
C. Copyright
D. Trade secret
C. Copyright
Explanation:
Copyrights are designed to protect the tangible expressions of creative works, like books, articles, music and so on
Of the following which is an example of a technical control?
A. Fire suppression equipment
B. Audit trails
C. Security policies
D. Configuration procedures
B.Audit trails
Explanation:
Audit trails are an example of a technical control. Fire suppression equipment, security policies and configuration procedures are all examples of administrative controls
In order to provide a secure environment for application testing, which service model would be the best fit?
A. PaaS
B. IaaS
C. SaaS
D. DaaS
A. PaaS
Explanation:
PaaS allows the customer to install and run any applications they want on any OS environment they may need
Which of the following is a technique used in hardening a device?
A. Use of SSL for communications
B. Patching and updating
C. PKI
D. OS Encryption
B. Patching and updating
Explanation:
Updating and keeping systems patched is one of he most effective ways to keep them secure. If you were to encrypt the OS, you would not be able to use the system, and SSL and PKI refer to ways of protecting communications
What is a good way to secure devices in a BYOD environments?
A. Encrypt device drives
B. Remove Java from all platforms
C. WAFs
D. Discontinue the use of Flash
A. Encrypt device drives
Which of the following is a term used to describe the practice of obscuring original raw data so that only a portion is displayed for operational purposes?
A. Data discovery
B. Hashing
C. Masking
D. Public key infrastructure
C. Masking
Explanation:
Masking is a form of confidentiality assurance that often replaces the original information with asterisks or Xs
Of the following bodies, which does not have a comprehensive federal privacy law that protects its citizens personal data?
A. United States
B. Europe
C. Singapore
D, Argentina
A. United States
Explanation:
The US is the only entity in this list that does not have a comprehensive policy directed at protecting its citizens privacy
Which of the following is a service that provides a replication of data across various locations?
A. Software defined networking (SDN)
B. Virtual network
C. Content delivery network (CDN)
D. Local Area Network
C. Content delivery network
Which of the following is something you cannot do when dealing with risk?
A. Mitigation
B. Transfer
C. Reverse
D. Accept
C. Reverse
Explanation:
Risk cannot be reversed. It can only be mitigated, transferred or accepted
Which of the following is a characteristic of liquid propane gas that makes it attractive as a fuel for backup generators?
A. Does not spoil
B. Burn rate
C. Price
D. Ubiquitous
A. Does not spoil
Explanation:
One primary advantage of LP gas is that it does not spoil the way gasoline and diesel fuel can
Of the following, which tpe of SSAE audit report is the cloud provider most likely to be willing to share without any additional participation from the cloud customer?
A. SOC 1 Type 1
B. SOC 3
C. SOC 2 Type 1
D. SOC 3 Type 2
B. SOC 3
Explanation:
SOC 3 is the least detailed report, designed for public dissemination. There is no SOC 3 Type 2 report
Of the following, which is not a consideration when planning for physical security concerns?
A. Local language variations
B. CCTV coverage
C. Traffic patterns
D. Chance of natural disasters
A. Local language variations
Explanation:
Local languages having nothing to do with physical security. All the others are valid concerns
Which of the following would be used to learn the critical paths, processes and assets of an organization?
A. Business impact analysis
B. Business requirements
C. Risk assessment
D. Pentest
A. Business impact requirements
Explanation: BIA is designed to identify and ascertain the value of assets in addition to the critical paths and processes
Of the following, which does not rpepresent a level of the CSA STAR ceritfication program?
A. Self assessment
B. SOC 2 Type 3
C. Third party assessment based certs
D. Continuous monitoring based cert
B. SOC 2 Type 3
Explanation:
SOC 2 Type 3 is not an actual report format. All of the other options are part of the levels of the CSA STAR cert program
Which of the following is a characteristic of modern data center design?
A. Weak physical security
B. Located in metro areas
C. Located in desert climates
D. Power redundancy
D. Power redundancy
Explanation:
One of the foundational design characteristics in modern data center design involves ensuring redundant power systems. Data centers can be located anywhere, and typically have strong physical security
When you are designing redundancy and contingency planning in a data center, which of the following is the most important consideration?
A. Power availability
B. Health and human safety
C. HVAC Capabilities
D. Redundant telco providers
B. Health and human safety
Explanation:
While the other options are important, they are all subordinate to human health and safety, which is the first priority of any security programs
Which of the following best represent the three distinct levels of the CSA STAR program?
A. Third party assessment, attestation and ongoing monitoring
B. Self assessment, SOC 2, and ongoing monitoring
C. Self assessment, attestation and ongoing monitoring cert
D. Self assessment, attestation and cert
C. Self assessment, attestation and ongoing monitoring cert
Explanation:
Self assessment, attestation and ongoing monitoring cert are the three levels of STAR cert
Which of the following has increased the viability of cloud services?
A. Smart bus hubs
B. Virtualization
C. Agile development
D. High speed switching
B; Virtualization
Explanation:
Virtualization allows scalable resource allocation, which has in turn dramatically increased the viability of cloud services
With regard to PII stored in the cloud, who is ultimately responsible for the security of that PII?
A. Cloud provider
B. Cloud broker
C. Cloud customer
D. System admin
C. Cloud customer
Explanation:
The cloud customer is always the data owner and therefore ultimately responsible for the security of PII
Of the following, which cloud data storage process uses encrypted chunks of data?
A. Data dispersion
B. RAID 5
C. RAID 0
D. RAID 3
A. Data dispersion
Explanation:
Data dispersion uses chunks of data, erasure coding and encryption
IN which cloud service model is the customer required to maintain and update only the applications?
A. SaaS
B. IaaS
C. PaaS
D. DaaS
C. PaaS
Explanation:
In PaaS, the customer is paying for access to a virtual machine with an OS on which to install applications. Since the customer owns the applications, it is their responsibility to keep the applications up to date
What is a technology that may lead to the ability to process encrypted data without having to decrypt it first?
A. AES encryption
B. MD5 hashing
C. Message authentication
D. Homomorphic encryption
D. Homomorphic encryption
Explanation:
Homomorphic encryption is an experimental technology that would allow ciphertext to be manipulated in processes and still produce the same results as when the unencrypted plaintext of the same data is processed.
How should cryptographic keys be protected?
A. AES 256
B. To a level at least high as the data they are protecting
C. SHA 2
D. As high as is possible
B. To a level at least as high as the data they are protecting
Explanation:
Cryptographic keys should always be protected with safeguards at least as stringent, if not more, than the level of the data they are protecting
Which of the following is most important in a BC DR incident?
A. Checklists
B. Redundant power
C. Backups
D. Spare hardware
A. Checklists
Explanation:
A BCDR event is no time to be scrambling around trying to figure out what to do. Having a plan in place and executing it is dependent on everyone understanding the plan and checklists are the way we work through steps of the plan in order
Of the following elements, which is the primary driver of security decisions?
A. Location
B. Access
C. Resiliency
D. Business requirements
D. Business requirements
Explanation:
BUsiness requirements will and should always be what drives security decisions
Which of the following is the best example of a countermeasure used to protect cloud operations against external attackers?
A. Continual monitoring for anomalous activity
B. Detailed and extensive background checks
C. Use of generic hardware in the building infrastructure components
D. Cameras inside the data center
A. Continual monitoring for anomalous activity
Explanation:
Continual monitoring for anomalous activity is a great way to detect potential external attacks. The other answers having nothing to do with protecting cloud operations from external threats
Which of the following has never caused a data center outage?
A. Squirrels
B. Changes in regulations
C. Construction
D. Hackers
B. Changes in regulations
Explanation:
A change in regulations has never resulted in a data center outage, but each of the other options has caused many outages
Object and volume storage are used with _______
A. IaaS
B. PaaS
C. SaaS
D. DaaS
A. IaaS
Explanation:
Object and volume storage are both related to infrastructurew
Of the following, which is not associated with vendor lock in?
A. Statutory Compliance
B. Poorly Written Contracts
C. Nonportable Data Formats
D. Market Forces
A. Statutory Compliance
Explanation:
Statutory compliance refers to state and federal laws. They cannot force a customer to stay with a cloud provider. HOwever, all the rest are problems that can lead to vendor lock in
What is a function common to many agress monitoring solutions?
A. Elasticity
B. Data Discovery
C. Metered Service
D. Satellite Links
B. Data Discovery
Explanation:
Egress monitoring has nothing to do with elasticity, metered service or satellite links. However, egress monitoring tools often feature data discovery functions
Of the following, which would be used to protect the intellectual property of manufacturing process?
A. Copyright
B. Trademark
C. Patent
D. Trade secret
C. Patent
Explanation:
Patent are designed to protect the intellectual property of processes
Security controls for all types of cloud services and models are driven primarily by which of the following?
A. Regulations
B. Business requirements
C. State laws
D. Best practices
B. Business requirements
Explanation:
Security controls should always be based on the needs of the business. Regulations, state laws, and best practices may all shape the business requirements but are not direct drivers themselves
Which of the following performed on an application or software product while it is being executed in memory?
A. Tests performed on an application or software product while it is being executed in memory
B. Tests performed on an application or software product that involves a code review
C. TEsts performed on an application or software product without the users knowledge
D. Tests performed on a network while it being executed in memory
A. Tests performed on application or software product while it being executed in memory
Explanation:
Dynamic application security testing is testing conducted while the application is resident in memory and being executed
Which of the following is one example of a way to protect a data center frm the impact of external threats?
A. Masking and obfuscation
B. Redundant policies
C. Redundant ISPs
D. HVAC
C. Redundant ISPs
Explanation:
Having redundant ISPs or carriers provides the data center with protection against such external threats as DDoS international fiber cuts, and similar effects
What is a situation in which more users are connected to a system that can be fully supported?
A. Over-subscription
B. Bad luck
C. Temporal shift
D. Peak usage
A. Over-subscription
Explanation:
The question is the definition of over subscription. This can happen in a multi tenant environment like cloud computing if not properly managed
Which of the following is not a process used in device hardening?
A. Strict administrator access
B. Unused port closures
C. Dual power supplies
D. Deletion of unused/unnecessary services
C. Dual power supplies
Explanation:
While having secondary redundant power supplies helps with device redundancy, it has nothing to do with device hardening. Each of the other options helps in the hardening process.
Which is the highlest level of data center redundancy, according to the Uptime Institute?
A. 4
B. 5
C. 3
D. 10
A. 4
Explanation:
The Uptime Institute has four tiers of data center redundancy rating, with the highest being 4 and the lowest being 1
Of the following, which is most closely associated with financial controls?
A. SOC 1
B. SOC 2
C. SOC 3
D. SOC 4
A. SOC 1
Explanation:
The SOC 1 report is primarily for reporting on financial controls
Which type of intellectual property protection would apply to a secret recipe?
A. Trade secret
B. Copyright
C. Trademark
D. Patent
A. Trade secret
Explanation:
A recipe that is not secret could be protected by a patent
Which of the following is a DRM solution for protecting intellectual property rights?
A. Media present checks
B. Law enforcement notifications
C. eDiscovery
D. Digital forensics
A. Media present checks
Explanation:
Media present checks look to see if protected media is present before allowing content to be played or distributed
Of the following, which term is most closely associated with egress monitoring tools?
A. Data classification
B. Data scrubbing
C. Data sharing
D. Data management
A. Data classification
Explanation:
Data classification is vital in egress monitoring solutions. This typically occurs at the same time of data creation
What is the phase of an investigation where evidence is collected?
A. eDiscovery
B. eTriage
C. Forensic Analysis
D. Data collection
A. eDiscovery
Of the following, which is responsible for determining an organizations risk appetite?
A. Risk appetite assessment
B. Senior management
C. Legislative mandates
D. SLAs
B. Senior management
Explanation:
Senior management determines the risk appetite of an organization
Which of the following is not a feature of a secure KVM component?
A. Sealed exterior case
B. A TPM Chip
C. Push button selectors
D. Welded chipsets
B. A TPM Chip
Explanation:
A TPM is a security device found on an individual machine and is designed to store encryption keys securely. Options A, C and D are all features of secure KVMs
Battery backups or UPSs serve many purposes. Along with providing power, which of the following do they provide?
A. Line conditioning
B; User discipline
C. Elevated Access
D. Cost Savings
A. Line conditioning
Explanation:
Battery backups also provide a critical function in that they condition the line. What this means is that they add and suppress power curves that are a part of normal minute by minute fluctuations in volytage and amperage delivered. THis smoothing out, or conditioning, helps equipment to last much longer since it is no longer subjected to varying voltages or amps
Which of the following is an example of best practices for storing encryption keys?
A. Storing them separately from data
B. Using AES
C. At least 256 bits
D. Putting on a thumb drive and removed
A. Storing them separately from data
Explanation:
You never want to store encryption keys with the data they are protecting, They should always be stored on a seprate system3
Which of the following is not a common cloud service model?
A. Software as a Service
B. Programming as a Service
C. Infrastructure as a Service
D. Platform as a Service
B. Programming as a Service
Explanation:
Programming as a Service is not a common offering; the others are ubiquitous throughout the industry
The US government program that mandates a standardized approach to security assessments, authorization and continuous monitoring of cloud products and services is called:
A. FISMA
B. HIPAA
C. FedRAMP
D. GLBA
C. FedRAMP
Explanation:
FedRAMP is a US federal program that mandates a standardized approach to security assessments, authorization and continuous monitoring of cloud products and services
Who performs the review process for hardware security modules in accordance with the Federal Information Processing Standard (FIPS) 140-2?
A. The National Institute of Standards and Technology (NIST)
B. The National Security Agency (NSA)
C. Independent (private) Labs
D. The European Union Agency for Network and Information Security (ENISA)
C. Independent (private) Labs
Explanation:
Vendors seeking HSM certs under FIPS 140-2 send their products to independent labs that have been validated as Cryptographic Module Testing Labs under the National Voluntary Lab Accreditation Program
Which of the following are not examples of personnel controls?
A. Background checks
B. Reference checks
C. Strict access control mechanisms
D. Continuous security training
C. Strict access control mechanisms
Explanation:
While physical controls that inhibit movement affect personnel, they are not regarded as personnel controls. All the other options are examples of personnel controls
Who pays for the Common Criteria certification of an IT product?
A. NIST
B. The vendor/manufacturer
C. The cloud customer
D. The end user
B. The vendor/manufacturer
Explanation:
The vendor/manufacturer of a given product will pay to have it certified, with the premise that cert costs are offset by premium prices
Software that includes security elements from the outset of the software development life cycle process will:
A. Be less expensive to operate securely in the production environment
B. Be more expensive to operate securely in the production environment
C. Be more expensive to operate securely in the production environment
D. Have a greater likelihood of interoperability with other software and systems in the production environment
A. Be less expensive to operate securely in the production environment
Explanation:
When security is created as an aspect of the software itself, there is less need to acquire and apply additional security controls to mitigate the risks after deployment
Which of the following is not a common identity federation standard?
A. WS Federation
B. OpenID
C. OLSame
D. SAML
C. OLSame
Explanation:
This is a nonsense term with no meaning
The Restatement (Second) Conflict of Law refers to which of the following?
A. The basis for deciding which laws are most appropriate in a situation where conflicting laws exist
B. When judges restate the law in an opinion
C. How jurisdictional disputes are settled
D. Whether local or federal laws apply in a situation
A. The basis for deciding which laws are most appropriate in a situation where conflicting laws exist
Explanation:
The Restatement (Second) Conflict of Law is the basis used for determining which laws are most appropriate in a situation where conflicting laws exists
Which of the following SOC report subtypes represents a point in time?
A. SOC 2
B. Type I
C. Type II
D. SOC 3
B. Type I
Explanation:
A SOC Type 1 report is designed around a specific point in time as opposed to a report of effectiveness over a period of time
Which of the following best describes SLE?
A. The amount of expected loss due to any specific single incident
B. The amount of expected damage or loss due to any and all incidents in a year
C. The amount of expected loss or damage due to security incidents
D. The amount of expected damage due to any single storage failure incident
A. The amount of expected loss due to any specific single incident
Explanation:
The single loss expectancy is the amount of expected damage or loss from any single specific security incident
In which phase of the cloud secure data life cycle should classifications and labels be assigned to the data?
A. Create
B. Store
C. Use
D. Share
A. Create
Explanation:
Data should be labeled and classified as soon as it is created/collected. All the other options are incorrect
When should cloud providers allow PaaS customers shell access to the servers running their instances?
A. Never
B. Weekly
C. Only when the contract stipulates that requirements
D. Always
A. Never
Explanation:
PaaS customers should never be given shell access to underlying infrastructure because any changes by one customer may negatively impact other customers in a multitenant environment
Which of the the following best describes a way for customers to rent hardware, OS, storage and network capacity over the Internet from a cloud service provider?
A. IaaS
B. AaaS
C. SaaS
D. PaaS
D. PaaS
Explanation:
PaaS is what cloud customer use when they need to rent hardware, OS, storage and network capacity over the Internet
Generator fuel storage for a cloud datacenter should last for how long, at a minimum?
A. 10 minutes
B. Three days
C. Indefinitely
D. 12 hours
D. 12 hours
Explanation:
The Uptime Institute dictates 12 hours of generator fuel for all cloud datacenter tiers
Domain Name System Security Extensions (DNSSEC) provides all of the following except:
A. Payload encryption
B. Origin authority
C. Data integrity
D. Authenticated denial of existence
A. Payload encryption
Explanation:
DNSSEC is basically DNS with the added benefit of certificate validation and the usual functions that certificates offer. This does not include payload encryption - confidentiality is not an aspect of DNSSEC
Which of the following is an international organization of network designers and architects who work together in establishing standards and protocols for the Internet?
A. Internet Assigned Numbers Authority (IANA)
B. International Organization Standardization (ISO)/ International Electrotechnical Commission (IEC)
C. National Institute of Standards and Technology
D. Internet Engineering Task Force
D. Internet Engineering Task Force
Explanation:
The IETF is an international organization of network designers and architects who work together in establishing standards and protocols for the internet
Which of the following is a device specially purposed to handle the issuance, distribution and storage of cryptographic keys?
A. Key management box (KMB)
B. Hardware security module (HSM)
C. Ticket granting ticket (TGT)
D. Trusted computing base (TCB)
B. Hardware security module (HSM)
Explanation:
Digital rights management (DRM) tools should enforce ______. Which is the practice of capturing all relevant system events
A. Continuous audit trail
B. Limiting printing output
C. Persistence
D. Automatic Expiration
A. Continuous audit trail
Explanation:
Capturing all relevant system events is the definition of a continuous audit trail, one of the required traits for a DRM solution of any quality.
You are the security officer for a cloud deployment. In order to secure data in transit, you can choose to implement all of the following techniques and technologies except:
A. DNSSEC
B. TLS
C. IDS/IPS
D. IPSec
C. IDS/IPS
Explanation:
IDSs/IPSs do not secure data, they detect attack activity
Which of the following is a true statement about the virtualization management toolset?
A. It can be regarded as something public facing
B. It must be on a distinct, isolated, management network
C. It connects physically to the specific storage area allocated to a given customer
D. The responsibility for securely installing and updating it falls on the customer
C. It connects physically to the specific storage area allocated to a given customer
Explanation:
All management functions should take palce on a highly secure, isoalted network
Which of the following controls would be useful to build into a virtual machine baseline image for a cloud environment?
A. Automatic registration with the configuration management system
B. Enhanced user training and awareness media
C. Mechanisms that prevent the file from being copied
D. Keystroke loggers
A. Automatic registration with the configuration management system
Explanation:
Version control can be difficult in a virtual environment because saved VMs dont receive updates. Ensuring that each VM is the correct version is a function of configuration management, and CM controls can be built into the baseline
What does a cloud provider offer customers?
A. An application hosting environment
B. Reduced BCDR pricing
C. Managed services on premise
D. Access to an IT environment usually via the Internet
D. Access to an IT environment usually via the Internet
Explanation:
Cloud providers offer customers access to an IT environment, usually via the Internet
Which form of cloud storage applies to storing an individuals data in the cloud while providing access from anywhere?
A. Object storage
B. Cloud file storage
C. Personal cloud storage
D. Enterprise cloud storage
C. Personal cloud storage
Explanation:
Personal cloud storage is the storage of a single users data in the cloud, allowing them access from anywhere on the Internet
Which of the following contract terms most incentivizes the cloud customer to meet the requirements listed in the contract?
A. Financial penalties
B. Regulatory oversight
C. Suspension of service
D. Media attention
C. Suspension of service
Explanation:
The cloud provider is usually allowed to suspend service to the customer if the customer fails to meet the contract requirements. This can be fatal to a customers operations and is a great motivation to make timely payments