LearnZapp Practice 2 Flashcards
Which of the following poses a secondary risk?
A. Fire exit signs
B. Oxygen displacing fire suppression
C. Automated fire detection systems
D. Failsafe fire egress paths
B. Oxygen displacing fire suppression
Explanation:
Secondary risk is any risks resulting from enacting a control/countermeasure to the original risk. In this case, a suppression system that displaces oxygen is a means to mitigate the original risk but adds a new risk
Which resiliency technique attenuates the possible loss of functional capabilities during contingency operations?
A. Cross training
B. Metered usage
C. Proper placement of HVAC temperature measurement tools
D. Raised floors
A. Cross training
Explanation:
Cross training offers attenuation of lost contingency capabilities by ensuring personnel will be able to perform essential tasks, even if they are not primarily assigned to those positions in a full time capacity. Metered usage is a benefit for cloud customers associated with ensuring value for payment but not resiliency
Which of the following is a tool that can be used to perform security control audits?
A. Federal Information Processing Standard (FIPS) 140-2
B. GDPR
C. ISO 27001
D. CSA CCM
D. CSA CCM
Explanation:
The Cloud Controls Matrix is an excellent tool for determiniing completelyness and possible replication of security controls
Which of the following characteristics is associated with DRM solutions?
A. Automatic expiration
B. Multilevel aggregation
C. Enhanced detail
D. Broad spectrum
A. Automatic expiration
Explanation:
Automatic expiration is the trait that allows DRM tools to prevent access to objects when a license expires or to remove protections when intellectual proerty moves into the public domain
Which of the following architecture fraemworks was designed for service delivery entities, from the perspective of how they serve customers?
A. SABSA
B. ITIL
C. COBIT
D. TOGAF
B. ITIL
Explanation:
ITIL was specifically designed to address service delivery entities
When you are accessing an electronic stroage file for forensic purposes, it is a best practice to use _______
A. Gloves
B. A trust comptuing base
C. Sysadmin access
D. A write blocker
D.A write blocker
Explanation:
It is important that any changes to the data only be made in purposeful, specific ways; a write blocker helps to ensure that extraneous changes arent made to the data
Alice is staging an attack against Bobs website. She has discovered that Bob has been sotring cryptograhic keys and violate confidentiality and access controls. This is an example of which type of attack?
A. SQL Injection
B. Buffer overflow
C. Using components with known vulnerabilities
D. Security misconfiguration
D. Security misconfiguration
Explanation:
This is likely a security misconfiguration, as crypto keys must not be disclosed or the cryptosystem does not provide protection
Clustering hosts allows you to do all the following except:
A. Meet high availability demands
B. Optimize performance with load balancing
C. Enhance scalability
D. Apply updated, patches or configuration modifications instantly
D. Apply updated, patches or configuration modifications instantly
Explanation:
Cluster does not preclude the time and dilligence necessary to perform patching or updates. All the other options are attributes provided by host clustering
What element of credit card holder information may never be stored for any length of time, according to the PCI DSS?
A. The full credit card number
B. The card verification value
C. The cardholders mailing address
D. The cardholders name
B. The card verification value
Explanation:
The PCI DSS disallows the storage of the CVV for any length of time; the CVV may only be used during the payment transaction, and not saved
Which of the following is not an element of the identification component of IAM?
A. Proviosning
B. Management
C. Discretion
D. Deprovisoining
C. Discretion
Explanation:
Discretion is not an element of IAM.
What is the term that describes the situation when an malicious user or attacker can exit the restrictions of a virtual machine and access another VM residing on the same host?
A. Host Escape
B. Guest Escape
C. Provider Exit
D. Escalation of privileges
B. Guest Escape
Explanation:
The question describes a guest escape
The OWASP Top Ten list sometimes includes missing function level access control. WHich of these is a technique to reduce the potential for a missing function level access control?
A. Run a process as both user and privileged user, compare results, and determine similarily
B. Run automated monitoring and audit scripts
C. Include browser buttons/navigation elements to secure functions
D. Enhance user training to include management personnel
A. Run a process as both user and privileged user, compare results, and determine similarily
Explanation:
The method in option A will help you determine if these function that regular users should not have access to and thereby demonstrate that you are missing necessary controls
The EU and GDPR addresses performance by _______________
A. Data subjects
B. Data controllers
C. Data processors
D. Data controllers and processors
D. Data controllers and processors
Explanation:
The GDPR describes requirements for data collection by and transfers to data controller and processors
An API gateway can typically offer all of the following capabilities except _______
A. Rate limiting
B. Access control
C. Hardware confirmation
D. Logging
C. Hardware confirmation
Explanation:
hardware confirmation is a meaningless term in this respect
Which of the following can be included in the cloud security architecture as a means to identify and reject hostile SQL commands?
A. WAF
B. API Gateway
C. DLP
D. DAM
D. DAM
Explanation:
A DAM can recognize and block malicious SQL traffic
You are the security manager for an online marketing company. Your company has recently migrated to a cloud production environment and has dpeloyed a number of new cloud absed protection mechanisms offered by both third parties and cloud provider, including DLP and SIEM solutions. After one week of operation, your security team reports an inordinate amount of time responding to potential incidents that have turned out to only be false positive reports. Management is concerned that the cloud migration was a bad idea and that it is too costly in terms of misspent security efforts.
What do you recommend?
A. Change the control set so that you use only security products not offered by the cloud provider
B. Change the control set so that you use only security products offered by cloud provider
C. Wait three weeks before making a final decision
D. Move back to an on premises environment as soon as possible to avoid additional wasted funds and effort
C. Wait three weeks before making a final decision
Explanation:
Many security solutions, particularly DLP and similar tools require a learning curve as they become accustomed to new data sources
Due to their reliance on vulnerability signatures, vulnerability scanners will not detect ___________
A. User error
B. Improper control selection
C. Cloud vulnerabilities
D. Unknown vulnerabilities
D. Unknown vulnerabilities
Explanation:
Because scanning tools require vulnerability signatures to operate effectively, unknown vulnerability that might exist in the scanned system wont be detected
Which federal standard is for the accreditation of secure and well architected cryptographic modules produced by private sector vendors?
A. FIPS 120
B. ISO 27002
C. COBIT
D. FIPS 140-2
D. FIPS 140-2
Explanation:
FIPS 140-2 is the federal standard for the accreditation and distinguishing of secure and well architected cryptgraphic modules produced by private sector vendors who see to or are in the process of having their solutions and services certified by the US government
In which of these options does the encryption engine reside within the application accessing the database?
A. Transparent encryption
B. Symmetric key encryption
C. Application level encryption
D. Homomorphic encryption
C. Application level encryption
Explanation:
In appplication level encryption, the application will encrypt data before it is placed in the data.
Why as PaaS environments at a higher likelihood of suffering backdoor vulnerabilities?
A. They rely on virtualization
B. They often used for software development
C. They have multitenancy
D. They are scalable
B. They often used for software development
Explanation:
PaaS environments are attractive for software development because they allow testing of software on multiple OS that are administered by the cloud provider
Which of the following techniques for ensuring cloud datacenter storage resiliency uses encrypted chunks of data?
A. Cloud bursting
B. RAID
C. Data dispersion
D. SAN
C. Data dispersion
Explanation:
Data dispersion uses parity bits, data chunks and encryption. Parity bits and disk striping are characteristic of RAID implementations. Cloud bursting is a feature of scalable cloud hosting. SAN is data storage technique but not focused on resiliency
Event monitoring tools SIEM/SEM can aid in which of the following efforts?
A. External hacking detection
B. Prediction of physical device theft
C. Data classification/categorization issues
D. Social engineering attacks
A. External hacking detection
Explanation:
Event monitoring tools can help detect external hacking efforts by tracking and reporting on common hack related activity, such as repeated failed login attempts and scanning.
WAFs can be used to reduce the likelihood that _________ attacks will be successful
A. Social Engineering
B. Physical Theft
C. Obverse inflection
D. Cross Site Scripting
D. Cross Site Scripting
Explanation:
WAFs can be used to attenuate the possibility that cross site scripting attacks will be successful. WAFs do not protect against social engineering or physical attacks in any way, so options A and B are incorrect
Option C is a nonsense term and is therefore incorrect
In addition to having it for business continuity and disaster recovery purposes, data archiving might also be useful for ________
A. Ensuring profitability
B. Increasing performance
C. Motivating users
D. Correcting accidental errors
D. Correcting accidental errors
Explanation:
If users inadvertently erase or modify data, an archived backup copy could be useful for restoring the original, correct version
A cloud environment that lacks security controls is vulnerable to exploitation, data loss, and interruptions. Conversely, excessive use of security controls:
A. Can lead to data breaches
B. Causes electromagnetic interference
C. Will affect quality of service
D. Can cause regulatory non compliance
C. Will affect quality of service
Explanation:
Security and operations are always inversely related; excessive controls necessarily degrade performance. Excessive use of controls should not lead to more data breaches; if anything, it may reduce their occurrence. However, it is more likely that there will be no effect.
What are the activities involving the generation, storage, distribution, deletion archiving, and application of keys in accordance with a formal security policy?
A. Key management
B. Security management
C. Application management
D. SDLC
A. Key management
Explanation:
These are all activities associated with encryption key management and are critical for the safety and security of key usage
Where is isolation failure probably least likely to pose a significant risk?
A. Public cloud
B. Private cloud
C. PaaS Environment
D. SaaS environment
B. Private cloud
Explanation:
Guest escape is less likely to occur and to have a significant impact in an environment provisioned for and used by a single customer
Data dispersion uses ________, where the traditional implementation is calling striping
A. Chunking
B. Vaulting
C. Lumping
D. Grouping
A. Chunking
Explanation:
Where RAID used data striping across multiple drives, with data dispersion this technique is referred to as chunking, or sometimes sharing when encryption is also used.
You are the security manager of a small firm that has just purchased an egress monitoring solution to implement in your cloud based production environment. What should you not expect the tool to address?
A. Sensitive data sent inadvertently in user emails
B. Sensitive data captured by screenshots
C. Sensitive data moved to external devices
D. Sensitive data in the contents of files sent via FTP
B. Sensitive data captured by screenshots
Explanation:
Its unlikely that any egress monitoring tools will be able to detect sensitive data captured, stored and/or sent as graphic image files, which is the usual form of screenshots
Which of the following can enhance data portability?
A. Interoperable export formats
B. Egress monitoring solutions
C. Strong physical protections
D. Agile business intelligence
A. Interoperable export formats
Explanation:
Data formatted in a manner that allows its reuse in other environments is essential for portability. None of the other options are relevant to the issue of data portability
You are the IT security manager for a video game software development company. Your development team hired an external game development lab to work on part of the game engine. A few weeks before the initial release of your game, the company that owns the lab publishes a strikingly similar game, with many of the features and elements that appear in your work. Which of the following methods could be used to determine if your ownership rights were violated?
A. Physical surveillance of their property and personnel
B. Communications tapping of their offices
C. Code signing
D. Subverting insiders
C. Code signing
Explanation:
Digitally signing software code is an excellent method for determining original ownership and has proven effective in major intellectual property rights disputes
When a programs source code is open to review by the public, what is that software called?
A. Freeware
B. Malware
C. Open source
D. Shareware
C. Open source
Explanation:
Open source software includes programs where customers (or even the public) can view the softwares source code
The American Society of Heating, Refrigeration and Air Conditioning Engineerins (ASHRAE) guidelines for internal environmental conditions within a data center suggest that a temperature setting of _______ degrees (F) would be too high
A. 93
B. 80
C. 72
D. 32
A. 93
Explanation:
The range suggested by the ASHRAE Technical COmmittee 9.9 is 64 to 81 degrees Fahrenheit. All the other options are distractors
To optimize airflow within a data center according to industry standards, a raised floor used as an air pienum must have at least _______ of clearance
A. One foot
B. One meter
C. 24 inches
D. 30 inches
C. 24 inches
Explanation:
THe industry standard is 24 inches
What is a key component of Gramm LEach Billey Act (GLBA)?
A. The right to be forgotten
B. EU Data Directives
C. The information security program
D. The right to audit
C. The information security program
Explanation:
The most important aspect of GLBA was the creation of a formal information security program
Perhaps the best method for avoiding vendor lock out is also a means for enhancing BCDR capabilities. This is _______
A. Having a warm site within 250 miles of the primary production environment
B. Using one cloud provider for primary production and another for backup processes
C. Building a data center above the flood plain
D. Cross training all personnel
B. Using one cloud provider for primary production and another for backup processes
Explanation:
Using distinct cloud providers for production and backup ensuresd that the loss of one provider, for any reason, will not result in a total loss of the organizations data
In a PaaS mdoel, who should most likely be responsible for the security of the applications in the production environment?
A. Cloud customer
B. Cloud provider
C. Regulator
D. Programmers
A. Cloud customer
Explanation:
In PaaS, the customer is responsible for the administration (and security) of applications. Neither regulators nor programmers are responsible for the security of the applications in the production environment. That is the responsibility of the cloud customer
Which of the following is a federation standard/protocol that does not rely on SOAP, SAML or XML?
A. WS Federation
B. OpenID Connect
C. SOC 2
D. OWASP
B. OpenID Connect
Explanation:
OpenID connect is a federation protocol that uses REST and JSON; it was specifically designed with mobile apps in mind, instead of only web based federation
In protections afforded to PII under the US Health Information Portability and Accountability Act, the subject must _____ in order to allow the vendor to share their personal data
A. Opt in
B. Opt out
C. Undergo screening
D. Provide a bio metric template
A. Opt in
Explanation:
Under HIPAA, the subject must opt in to information sharing - that is, the subject (patient) must explicitly state, in writing and with a signature, who the vendor is allowed to share personal information with, such as family members, spouses and children
Which of the following is not commonly considered a form of privacy data processing?
A. Storing
B. Computing
C. Destroying
D. Buying
D. Buying
Explanation:
Purchasing is not normally an activity related to privacy data processing. All the other options fall into the definition of processing