LearnZapp Practice 1 Flashcards
Which of the following is a feature of SAST?
A. Testing applications while running in RAM
B. Pentesting
C. Team building efforts
D. Source code review
D. Source code review
Explanation:
Static Application security testing examines source code while the application is not running
Which of the following takes advantage of the information developed in the business impact analysis?
A. Calculating ROI
B. Risk analysis
C. Calculating TCO
D. Securing asset acquisition
B. Risk analysis
Explanation:
Among other things, the BIA gathers asset valuation information that is crucial to risk management analysis and further selection of security controls
Which term best describes when a cloud provider goes out of business and leaves the customer unable to retrieve data?
A. Vendor lock in
B. Vendor lock out
C. Bankruptcy
D. Vendor closure
B. Vendor lockout
Explanation:
This is the definition of vendor lockout; when the cloud provider goes out of business and you can no longer access your data. This must be considered when you are determining whether to cloud migration
When monitoring for performance reasons, which of the following should not be included?
A. Free disk space
B. Disk IO
C. CPU Usage
D. Printer queue information
D. Printer queue information
Explanation:
Print spooling is not an accepted performance measure. All the others are critical to keeping the environment running at peak efficiency
Which of the following cloud service models requires the least amount of maintenance, administration and support by the cloud customer?
A. SaaS
B. PaaS
C. IaaS
D. DaaS
A. SaaS
Explanation:
The SaaS model requires the least intervention because the provider is responsible for maintaining the operating system, hardware and software
Of the following SOC reports, which is the most commonly advertised?
A. SOC 1
B. SOC 2 Type 2
C. SOC 2 Type 1
D. SOC 3
D. SOC 3
Explanation:
The SOC 3 report is merely an attestation by an auditor. It does not contain any confidential information and is therefore readily available upon request and often even advertised on websites
After a cloud migration, risks must be reviewed. However, a complete analysis is not necessary because much of the material has already been compiled in which of the following?
A. The cost benefit analysis completed prior to migration
B. The recent BIA
C. The last risk assessment
D. NIST 800-54r4
A. The cost benefit analysis completed prior to migration
Explanation:
Most of the risks associated with the cloud migration are examined in the cost benefit phase of evaluation and therefore do not need to be revisited
Compliance with ASHRAE data center standards for humidity can help reduce the risk of which of the following?
A. Static discharge
B. Malicious users
C. Increased power usage
D. Increased heating cooling expenses
A. Static discharge
Explanation:
The ASHRAE standards provide for humidity standards that reduce the chances of static discharge, which could be catastrophic in a data center environment
Egress monitoring solutions can aid in reducing the potential for loss due to
A. Data seizure
B. Crypto shredding
C. Malicous disclosure
D. Encryption
C. Malicious disclosure
Explanation:
Egress monitoring tools identify outbound traffic that violates an organizations policies, such as when a malicious user attempts data exfiltration
Of the following data center redundancy characteristics, which will be in place regardless of tier?
A. All hardware
B. Power
C. Emergency Egress
D. Cooling
C. Emergency Egress
Explanation:
Human life is always the first priority so all data centers must have an emergency egress. The other characteristics will only be in place and associated with specific tiers
Gathering business requirements aid in determining information about organizational assets. WHich of the following is not determined by this process?
A. Criticality
B. Robustness
C. Value
D. ROI
C. Robustness
Explanation:Robustness is not a trait measured by the process of reviewing business requirements
Of the following, which is a valid readon for a baseline to change?
A. New hardware
B. Numerous change requests
C. New hypervisor
D. New database
B. Numerous change requests
Explanation:
The best reason for changing a baseline is numerous change requests. If too many changes are being requested, it is a sign that the baseline needs to be reviewed and changed in order to meet these new demands
In which of the following does the customer have the most control of their data and systems while the cloud provider will have the least amount of responsibility?
A. PaaS
B. SaaS
C. IaaS
D. DaaS
B. IaaS
Explanation:
In the infrastructure as a service model, the provider offers and manages the physical plant and connectivity to underlying hardware. All systems and data are the responsibility of the customer
What term best describes a set of technologies that analyze application source code, byte code and binaries for coding and design problems that would indicate a security problem or vulnerability?
A. DAST
B. SAST
C. MFA
D. STRIDE
B. SAST
Explanation:
DAST stands for dynamic application security testing and cannot analyze source code as it analyzes code while it is running. MFA stands for multifactor authentication and STRIDE is a threat model concept
How long should an uninterruptable power supply be able to run during a sustained power outage?
A. Long enough for administrative intervention
B. Long enough to complete a graceful system shutdown
C. Until the power resumes
D. 4 hours
B. Long enough to complete a graceful system shutdown
Explanation:
A UPS is configured to safely shut down systems in order to save data in the event of a power failure
Poorly negotiated contacts can cause many problems. Of the following, which is not an example of what can happen when contracts are not properly negotiated?
A. Unfavorable terms
B. Malware
C.Vendor lock in
D. Paying for services not used
B. Malware
Explanation:
MAlware is not the result of a poorly negotiated cloud contract.
Which of the following is the most important mechanism to ensure trust in the cloud providers performance and duties?
A. The contract
B. Statutory Law
C. CSA Security Alliance Cloud Controls Matrix
D. SLA provisions
A. The contract
Explanation:
The contract between the provider and the customer provides trust between the two parties by holding the provider legally responsible for its contractual obligations
Of the following, whose advice should be given the most weight on the decision to patch a live production system?
A. Customer
B. Vendor
C. Internal Compliance
D. Supervisor
B. Vendor
Explanation:
The vendor should be the one advising when and how to patch a system as they will have the most up to date information and it will be their patches you are applying
What is the term used to describe the ease and efficiency of moving data from one provider to another?
A. Portability
B. Mobility
C. Forklifting
D. Vendor Lock Out
A. Portability
Explanation:
This is the term used to describe the ease and efficiency of moving data from one cloud provider to another
WHich of the following is not a countermeasure designed to protect against internal threats?
A. Separation of duties
B. Data masking
C. DLP Solutions
D. Scalability
D. Scalability
Explanation:
All except option D are designed to protect against unreliable personnel actions, including by cloud admins
Which of the following does not represnt an attack on a network?
A. Syn flood
B. Denial of Service
C. Nmap Scan
D. Brute force
C. Nmap scan
Explanation:
All of the rest of these options represent specific network attacks. Nmap is a relatively harmless scanning utility designed for network mapping. Although it can be used for info gathering
WHich of the following is not an acceptable practice for user access control administration?
A. Customer directly administers access
B. Provider provides administration on behalf of the customer
C. Customer provides access administration on behalf of provider
D. Third party provides administration on behalf of the customer
C. Customer provides access administration on behalf of the provider
How quickly should data center transfer switches bring backup power online in the event of a main failure?
A. 3 seconds
B. 1 minute
C. 5 minutes
D. Before the battery backup fails
D. Before the battery backup fails
Of the following, which would be used to protect a companys sales lead information?
A. Trademark
B. Copyright
C. Patent
D. Trade secret
D. Trade secret
Explanation:
Information specific to a company and that is unique to them would be covered under the term trade secret