LearnZapp Practice 4 Flashcards
Access should be granted based on all of the following except _______
A. Policy
B. Business needs
C. Performance
D. Acceptable risk
C. Performance
Explanation:
Performance should not determine who gets access to which data
Which of the following methods of addressing risk is most associated with insurance?
A. Transference
B. Avoidance
C. Acceptance
D. Mitigation
A. Transference
Explanation:
Avoidance halts the business process, mitigation entails using controls to reduce risk, acceptance involves taking on the risk, and transference usually involves insurance
Which security technique is most preferable when creating a limited functionality for customer service personnel to review account data related to sales made to your clientele?
A. Anonymization
B. Masking
C. Encryption
D. Training
B. Masking
Explanation:
Masking allows customer service representatives to review clients sales and account information without revealing the entirety of those records
In order for American companies to process personal data belong to EU citizens, they must comply with the Privacy Shield program. The program is administered by the US Department of Transportation and the ____________
A. US State Department
B. Fish and Wildlife
C. Federal Trade Commission
D. Federal Communication Commission (FCC)
C. Federal Trade Commission
Explanation:
The FTC is the local US enforcement arm for the most Privacy Shield Activity
Which type of web application monitoring most closely measures actual activity?
A. Synethetic performance monitoring
B. Real user monitoring
C. SIEM
D. DAM
B. Real user monitoring
Explanation:
RUM harvests infomration from actual user activity, making it the most realistic depiction of user behavior
Which of the following is a risk posed by the use of virtualization?
A. Internal threats interrupting service through physical accidents
B. The ease of transporting stolen virtual images
C. Increased susceptibility of virtual systems to malware
D. Electromagnetic pulse
B. The ease of transporting stolen virtual images
Explanation:
Because virtual machines are stored as imaged files, an attacker able to access the stored files would have a
Your company operates in a highly cooperative market, with a high degree of information sharing between participants. Senior management wants to migrate to a cloud enviornment but is concerned that providers will not meet the companys collab needs. WHich deployment model would best suit the compmanys needs?
A. Public
B. Private
C. Community
D. Hybrid
C. Community
Explanation:
A community cloud entails all participants to have some degree of ownership and responsibility for the cloud environment; this is the preferred model for coop ownership and collaboration among a group with a shared
An event is something that can be measured within the environment. An incident is a ___________ event
Deleterious
B. Negative
C. Unscheduled
D. Major
C. Unscheduled
Explanation:
All the activity in the environment can be considered events. Any event that was not planned or known is an incident. In the security industry, we often ascribe negative effects to the term incident, but incidents are not always mlaicious
Why is the deprovisioning element of the identification component of identitiy and access management so important?
A. Extra accounts costs so much extra money
B. Open but assigned accounts are vulnerabilities
C. User tracking is essential to peformance
D. Encryption has to be mantained
B. Open but assigned accounts are vulnerabilities
Explanation:
Unused accounts that remain open can serve as attack vectors
According to the CSA, which of the followinig is not an aspect of due dilligence that the cloud customer should be concerned with when considering a migration to a cloud provider?
A. Ensuring that any legacy applications are not dependent on internal security contorols before moving them to the cloud environment
B. Reviewing all contract elements to approprioately define each parttys roles, responsibilities and requirements
C. Assessing the providers financial standing and soundness
D. Vetting the cloud providers administratiors and personnel to ensure the same level of trust as the legacy envioronment
D. Vetting the cloud providers administratiors and personnel to ensure the same level of trust as the legacy envioronment
Explanation:
The cloud customer will not have any insight into the personnel security aspects of the cloud provider; when an organization contracts out a service, the organization loses that granular leve2l of control
A hosted based firewall in a virtualized cloud environment might have aspects of all the following types of controls except ________
A. Administrative
B. Deterrent
C. Corrective
D. Preventive
B. Deterrent
Explanation:
A firewall uses aspects of adminnistrative controls. The firewall policy is a set of rules that dictate the type of traffic and source/destination of that traffic
What is an important term in the field of data forensics that refers to maintaining control of evidenbe?
A. eDiscovery
B. Probably cause
C. Chain of custody
D. The Doctrine of Property
C. Chain of custody
Explanation:
Chain of custody refers to documenting control of evidence from the time it is collected until it is presented to the court
Which of the follopwing factors would probably most affect the design of a cloud data center?
A. Geographic location
B. Functional purpose
C. Cost
D. Aesthetic intent
A. Geographic location
Explanation:
APIs are defined as which of the following?
A. A set of protocols, and tools for building software applications to access a web based sofdtware application or tool
B. A set of standards for building software applications to access a web based software application or tool
C. Aset of routiunes, standards, protocols and tools for building software applications to access a web based software application or tool
D. A set of routiunes and tools for building software applications to access web based software applications
C. Aset of routiunes, standards, protocols and tools for building software applications to access a web based software application or tool
Explanation:
Dynamic software security testing should include _________
A. Source code review
B. User training
C. Pentest
D. Known bad data
D. Known bad data
Explanation:
Also known as fuzz testing, dynamioc methods should ionclude known bad inputs in order to determine how the program will handle the wrong data
Which of the following best describes data masking?
A. A method where the last few numbers in a dataset are not obscured. These are often used for authentication
B. A method for creating similar but inauthentic datasets used for software testing and user training
C. A method used to protect prying eyes from data such as social security numbers and credit card data
D. Data masking involves stripping out all similar digits in a string of numbers so as to obscure the original number
B. A method for creating similar but inauthentic datasets used for software testing and user training
Explanation:
Where should multiple egress points be included?
A. At thee power distribution substation
B. Within the data center
C. In every building on the campus
D. In thje security operations center
C. In every building on the campus
Explanation:
Health and human safety is a paramount goal of securityy
Which of the following best represents the REST approach tyo APIs?
A. Built on protocol standards
B. Lightweight and scalable
C. Relies heavily on XML
D. Only supports XML output
B. Lightweight and scalable
Explanation:l
In the EU, with its implementation of privacy directives and regulations, treats individual privacy as _______
A. a passing fad
B. A human right
C .A legal obligation
D. A business expense
B. A human right
Explanation:
What artifact which should already exist within the organization - can be used to determine the critical assets necessary to protect in the BCDR activity?
A. Quantitative risk analysis
B. Qualitative risk analysis
C. Business impact analysis
D. Risk appetite
C. Business impact analysis
ExplanatiON:
The BIA is designed for this purpose; to determine the critical path of assets/resources/data within the organization
Which of the following is not a risk management framework?
A. NIST SP 800-37
B. ENISA
C. KRI
D. ISO 31000-2009
C. KRI
Explanation:
Key risk indicators are useful but they are not a framework
Which of the following is not a factor an organization might use in the cost benefit analysis when deciding whether to migrate to a cloud environment?
A. Pooled resources in the cloud
B. Shifting from IT investment as capital expenditures to operational expenditures
C. The time savings and efficiencies offered by the cloud service
D. Branding associated with whichc cloud provider might be selected
D. Branding associated with whichc cloud provider might be selected
Explanation:
The brand associated with the cloud provider should not influence the cost-benefit analysis
Which of the following best describes the Organizational normative Framework?
A. A container for components of an applications security, best practices, catalogued and leveraged by the organization
B. A framework of contpainers for all components of application security, best practioces, catalogued and leveraged by the organization
C. A set of application security and best practices catalogued and leveraged by the organization
D .A framework of containers for some of the components of application security, best practices, catalogued and lneveraged by the organization
B. A framework of contpainers for all components of application security, best practioces, catalogued and leveraged by the organization
Explanation:
Which kind of SSAEW audit report is a cloud customner most likely to receive from a cloud provider?
A. SOC 1 Type 1
B. SOC 2 Type 2
C. SOC 1 Type 2
D. SOC 3
D. SOC 3
Explanation:
The SOC 3 is the least detailed, so thje provider is not concerned about revealing it
REST is best described by which of the following?
A. Relies on stateful communications
B. Does not require caching
C. Does not rely on best practices for web services
D. Relies on stateless, client server, cacheable communications
D. Relies on stateless, client server, cacheable communications
Explanation:
RESt relies on stateless, client server, cacheable communications. It is a software architecture consisting of guidelines and best practices for creating scalable web services
What should the priomary focus of datacenter redundancy and contingency planning?
A. Critical path/operations
B. Health and human sdafety
C. Infrastructrure suyporting the production environment
D. Power and HVAC
B. Health and human sdafety
Explanation:
Regardless of the tier level or purpose of any datacenter, design focus for security should always consider health and human safety paramount
Which of the following is not typically included as a basic phase of the SDLC?
A. Define
B. Design
C. Describe
D. Develop
C. Describe
Explanation:
Describe is not a common phase in the SDLC
Which of the following is a good business case for the use of data masking?
A. The shipping department should get only a masked version of the customers address
B. The customer service department should get only a masked version of the customers social security number
C. The billing department should get only a masked version of the customers credit card number
D. HR department should get only a masked version of the employees driverss license number
B. The customer service department should get only a masked version of the customers social security number
Explanation:
The customer service reps may need to see a partial version of the customers SS number to verirfy that the customer is who they claim to be, but that representative does not need to see the full number, which would create an unnecessary risk
Anonymization is the process of removing _____ from data sets
A. Access
B. Cryptographic keys
C. Numeric values
D. identifying information
D. identifying information
Explanation:
Anonymization is the process of removing identifiers from data sets so that the data analysis tools and techqniues cannot be used by malicious entities to divine personal or sensitive data from non sensitive aggregated data sets. All the other answers are incorrect because they are not part of the anonytmization process
WHat does the doctrine of the proper law refer to?
A. How jurisdictional disputes are settled
B. The law that is applied after the first law is applied
C. The determination of what law will apply to a case
D. The proper handling of eDiscoverey materials
A. How jurisdictional disputes are settled
Explanation:
The doctrine of the proper law referes to how jurisdictional disputes are settled
Which of the following best describes SAST?
A. a set of technologies that analyze application source code, and bit code for coding and design problems that would indicate a security problem or vulnerability
B. A set of technologies that ananlyze bit code, and binaries for coding and design problems that would indicate a security problem or vulnerability
C. A set of technologies that analyze application source code, byte code and binaries for coding and design problems that would indicate a security problem or vulnerability
D. A set of technologies that analyze application source code for coding and design problems that would indicate a security problem or vulnerability
C. A set of technologies that analyze application source code, byte code and binaries for coding and design problems that would indicate a security problem or vulnerability
Explanation:
All the possible answers are good, and are, in fact, correct, however C is the most complete and therefore the best answer
Lack of industry wide standards for cloud computing creates a potential for ______
A. Privacy data breach
B. Privacy data disclosure
C. Vendor lock in
D. Vendor lock out
C. Vendor lock in
Explanation:
Without uniformity of data formats and service mechanisms, there is no assurance that a customer would be able to easily move their cloud operation from one provider to another; this can result in lock in
If personal financial account reviews are peerformed as an additional review control for privileged users, which of the following characteristics is least likely to be a useful indicator for review p]urposes?
A. Too much moneyh in the account
B. Too little money in thhe account
C. The bank branch being used by the privileged user
D. Specific senders/recipients
C. The bank branch being used by the privileged user
Explanation:
Which bank branch a privileged user frequents is unlikely to be of consequence. too much money can inidcate that the privileged user is accepting payment from someone other than the emp]loyer
To address shared monitoring and testing responsibilities in a cloud configuration, the provider might offer all these to the cloud customer except :
A. Access to audit logs and performance data
B. SIM, SIEM and SEM logs
C. DLP solution results
D. Security control administration
D. Security control administration
Explanation:
While the provider might share any of the other options listed, the provider will not share administration of security controls with the customer
To deploy a set of microservices to clients instead of buiilding one monolithic application, it is best to use an ______ to coordinate client requests
A. XML Gateway
B. API Gateway
C. WAF
D. DAM
B. API Gateway
Explanation:
An API Gateway translates requests from clients into multiple requests to many microservices and delivers the content as a whole via an API it assigns to that client/session
What is the intellectual property protection for the tangible expression of a creative idea?
A. Copyright
B. Patent
C. Trademark
D. Trade secret
A. Copyright
Explanation:
Copyrights are protected tangible expressions of creative works
Privileged user (administrators, managers and so forth) accounts need to be reviewed mroe closely than basic user accounts. Why is this?
A. Privileged users have more encryption keys
B. Regular users are more trustworthy
C. There are extra controls on privileged user accounts
D. Privileged users can cause more damage to the organization
Explanation:
The additional capabilities of privileged users make their activities riskier to the organization, so these accounts bear extra review
Tokenization is a method of obscuring data that, other than encryption, can be used to comply with ______ standards
A. GLBA
B. PCI
C. COPA
D> SOX
B. PCI
Explanation:
PCI requires that credit card numbers and other cardholder data be obscrubed when stored for any length of time
Patching can be viewed as a configuration modification and therefore subject to the organizations configuration management program and methods. What may also be an aspect of p]atching in terms of configuration management?
A. Patching doesnt need to be performed as a distinct effort; patching can go through the normal change request process like all other modifications
B. Any patches suggested or required by vendors to maintain compliance with service contracts must be made immaditately regardless of internal process restrictions
C. Any patches suggested by third parties should not be considered as they may invalidate service contracts or warranties
D. The configuration or change management committee or board may grant blanket approval for patches (at a certain impact level) without the need to go through the formal change process
D. The configuration or change management committee or board may grant blanket approval for patches (at a certain impact level) without the need to go through the formal change process
ExplanatIon:
In order to ensure timely application of patches, patching may receive blanket approval and only be reviewed by the committee of board after the fact for final approval
All of the following techniques are used in OS hardening except _______
A. Removinig default accounts
B. Disallowingff local save of credentials
C. Removing unnecessary services
D. Preventing all administrative access
D. Preventing all administrative access
Explanation:
Administrative access may be limited but not prevented