LearnZapp Practice 2 Flashcards
Which of the following poses a secondary risk?
A. Fire exit signs
B. Oxygen displacing fire suppression
C. Automated fire detection systems
D. Failsafe fire egress paths
B. Oxygen displacing fire suppression
Explanation:
Secondary risk is any risks resulting from enacting a control/countermeasure to the original risk. In this case, a suppression system that displaces oxygen is a means to mitigate the original risk but adds a new risk
Which resiliency technique attenuates the possible loss of functional capabilities during contingency operations?
A. Cross training
B. Metered usage
C. Proper placement of HVAC temperature measurement tools
D. Raised floors
A. Cross training
Explanation:
Cross training offers attenuation of lost contingency capabilities by ensuring personnel will be able to perform essential tasks, even if they are not primarily assigned to those positions in a full time capacity. Metered usage is a benefit for cloud customers associated with ensuring value for payment but not resiliency
Which of the following is a tool that can be used to perform security control audits?
A. Federal Information Processing Standard (FIPS) 140-2
B. GDPR
C. ISO 27001
D. CSA CCM
D. CSA CCM
Explanation:
The Cloud Controls Matrix is an excellent tool for determiniing completelyness and possible replication of security controls
Which of the following characteristics is associated with DRM solutions?
A. Automatic expiration
B. Multilevel aggregation
C. Enhanced detail
D. Broad spectrum
A. Automatic expiration
Explanation:
Automatic expiration is the trait that allows DRM tools to prevent access to objects when a license expires or to remove protections when intellectual proerty moves into the public domain
Which of the following architecture fraemworks was designed for service delivery entities, from the perspective of how they serve customers?
A. SABSA
B. ITIL
C. COBIT
D. TOGAF
B. ITIL
Explanation:
ITIL was specifically designed to address service delivery entities
When you are accessing an electronic stroage file for forensic purposes, it is a best practice to use _______
A. Gloves
B. A trust comptuing base
C. Sysadmin access
D. A write blocker
D.A write blocker
Explanation:
It is important that any changes to the data only be made in purposeful, specific ways; a write blocker helps to ensure that extraneous changes arent made to the data
Alice is staging an attack against Bobs website. She has discovered that Bob has been sotring cryptograhic keys and violate confidentiality and access controls. This is an example of which type of attack?
A. SQL Injection
B. Buffer overflow
C. Using components with known vulnerabilities
D. Security misconfiguration
D. Security misconfiguration
Explanation:
This is likely a security misconfiguration, as crypto keys must not be disclosed or the cryptosystem does not provide protection
Clustering hosts allows you to do all the following except:
A. Meet high availability demands
B. Optimize performance with load balancing
C. Enhance scalability
D. Apply updated, patches or configuration modifications instantly
D. Apply updated, patches or configuration modifications instantly
Explanation:
Cluster does not preclude the time and dilligence necessary to perform patching or updates. All the other options are attributes provided by host clustering
What element of credit card holder information may never be stored for any length of time, according to the PCI DSS?
A. The full credit card number
B. The card verification value
C. The cardholders mailing address
D. The cardholders name
B. The card verification value
Explanation:
The PCI DSS disallows the storage of the CVV for any length of time; the CVV may only be used during the payment transaction, and not saved
Which of the following is not an element of the identification component of IAM?
A. Proviosning
B. Management
C. Discretion
D. Deprovisoining
C. Discretion
Explanation:
Discretion is not an element of IAM.
What is the term that describes the situation when an malicious user or attacker can exit the restrictions of a virtual machine and access another VM residing on the same host?
A. Host Escape
B. Guest Escape
C. Provider Exit
D. Escalation of privileges
B. Guest Escape
Explanation:
The question describes a guest escape
The OWASP Top Ten list sometimes includes missing function level access control. WHich of these is a technique to reduce the potential for a missing function level access control?
A. Run a process as both user and privileged user, compare results, and determine similarily
B. Run automated monitoring and audit scripts
C. Include browser buttons/navigation elements to secure functions
D. Enhance user training to include management personnel
A. Run a process as both user and privileged user, compare results, and determine similarily
Explanation:
The method in option A will help you determine if these function that regular users should not have access to and thereby demonstrate that you are missing necessary controls
The EU and GDPR addresses performance by _______________
A. Data subjects
B. Data controllers
C. Data processors
D. Data controllers and processors
D. Data controllers and processors
Explanation:
The GDPR describes requirements for data collection by and transfers to data controller and processors
An API gateway can typically offer all of the following capabilities except _______
A. Rate limiting
B. Access control
C. Hardware confirmation
D. Logging
C. Hardware confirmation
Explanation:
hardware confirmation is a meaningless term in this respect
Which of the following can be included in the cloud security architecture as a means to identify and reject hostile SQL commands?
A. WAF
B. API Gateway
C. DLP
D. DAM
D. DAM
Explanation:
A DAM can recognize and block malicious SQL traffic
You are the security manager for an online marketing company. Your company has recently migrated to a cloud production environment and has dpeloyed a number of new cloud absed protection mechanisms offered by both third parties and cloud provider, including DLP and SIEM solutions. After one week of operation, your security team reports an inordinate amount of time responding to potential incidents that have turned out to only be false positive reports. Management is concerned that the cloud migration was a bad idea and that it is too costly in terms of misspent security efforts.
What do you recommend?
A. Change the control set so that you use only security products not offered by the cloud provider
B. Change the control set so that you use only security products offered by cloud provider
C. Wait three weeks before making a final decision
D. Move back to an on premises environment as soon as possible to avoid additional wasted funds and effort
C. Wait three weeks before making a final decision
Explanation:
Many security solutions, particularly DLP and similar tools require a learning curve as they become accustomed to new data sources
Due to their reliance on vulnerability signatures, vulnerability scanners will not detect ___________
A. User error
B. Improper control selection
C. Cloud vulnerabilities
D. Unknown vulnerabilities
D. Unknown vulnerabilities
Explanation:
Because scanning tools require vulnerability signatures to operate effectively, unknown vulnerability that might exist in the scanned system wont be detected
Which federal standard is for the accreditation of secure and well architected cryptographic modules produced by private sector vendors?
A. FIPS 120
B. ISO 27002
C. COBIT
D. FIPS 140-2
D. FIPS 140-2
Explanation:
FIPS 140-2 is the federal standard for the accreditation and distinguishing of secure and well architected cryptgraphic modules produced by private sector vendors who see to or are in the process of having their solutions and services certified by the US government
In which of these options does the encryption engine reside within the application accessing the database?
A. Transparent encryption
B. Symmetric key encryption
C. Application level encryption
D. Homomorphic encryption
C. Application level encryption
Explanation:
In appplication level encryption, the application will encrypt data before it is placed in the data.
Why as PaaS environments at a higher likelihood of suffering backdoor vulnerabilities?
A. They rely on virtualization
B. They often used for software development
C. They have multitenancy
D. They are scalable
B. They often used for software development
Explanation:
PaaS environments are attractive for software development because they allow testing of software on multiple OS that are administered by the cloud provider
Which of the following techniques for ensuring cloud datacenter storage resiliency uses encrypted chunks of data?
A. Cloud bursting
B. RAID
C. Data dispersion
D. SAN
C. Data dispersion
Explanation:
Data dispersion uses parity bits, data chunks and encryption. Parity bits and disk striping are characteristic of RAID implementations. Cloud bursting is a feature of scalable cloud hosting. SAN is data storage technique but not focused on resiliency
Event monitoring tools SIEM/SEM can aid in which of the following efforts?
A. External hacking detection
B. Prediction of physical device theft
C. Data classification/categorization issues
D. Social engineering attacks
A. External hacking detection
Explanation:
Event monitoring tools can help detect external hacking efforts by tracking and reporting on common hack related activity, such as repeated failed login attempts and scanning.
WAFs can be used to reduce the likelihood that _________ attacks will be successful
A. Social Engineering
B. Physical Theft
C. Obverse inflection
D. Cross Site Scripting
D. Cross Site Scripting
Explanation:
WAFs can be used to attenuate the possibility that cross site scripting attacks will be successful. WAFs do not protect against social engineering or physical attacks in any way, so options A and B are incorrect
Option C is a nonsense term and is therefore incorrect
In addition to having it for business continuity and disaster recovery purposes, data archiving might also be useful for ________
A. Ensuring profitability
B. Increasing performance
C. Motivating users
D. Correcting accidental errors
D. Correcting accidental errors
Explanation:
If users inadvertently erase or modify data, an archived backup copy could be useful for restoring the original, correct version