Lesson 10: Managing Cloud Security Flashcards
An administrator is installing a vulnerability scanner. In which instances can the administrator use the standard administrative console provided by the CSP? (Select all that apply.)
A.Standalone virtual machine
B.Standalone cloud instance
C.Public cloud instance
D.Hybrid cloud instance
C.Public cloud instance
D.Hybrid cloud instance
When an administrator implements a vulnerability scanner in a public cloud instance, the administrator can manage it through the standard administrative console provided by the cloud service provider.
When an administrator implements a vulnerability scanner in a hybrid cloud instance, the administrator can manage it through the standard administrative console provided by the cloud service provider.
A new user cannot access Microsoft Office 365, but no other users in the organization are having any issues. What is the most likely reason why the user cannot access it?
A.The organization’s subscription expired.
B.The organization’s subscription is out of licenses.
C.The user’s system is not compatible with Office 365.
D.The firewall is blocking the user from accessing Office 365.
B.The organization’s subscription is out of licenses.
The user cannot access Office 365 since the organization’s subscription is out of licenses. The software as a service model requires licensing just as on-premises software does.
A cloud administrator extended the on-premises network to a public cloud solution in AWS. Instead of using Amazon Inspector, the administrator opted to use Burp Suite with the AWS cloud. What are some possible reasons why the administrator made this decision? (Select all that apply.)
A.The administrator wanted to use the same tool for both the on-premises and cloud solutions.
B.Burp Suite is easier to implement.
C.Burp Suite’s integration into CI/CD pipelines.
D.The administrator wanted to centralize the scanning results for auditing purposes.
A.The administrator wanted to use the same tool for both the on-premises and cloud solutions.
C.Burp Suite’s integration into CI/CD pipelines.
D.The administrator wanted to centralize the scanning results for auditing purposes.
The administrator may have decided to use Burp Suite since using the same tool for both the on-premises and cloud solutions prevents the administrator from switching between multiple tools, it centralizes the collected information and is easier to manage.
One of Burp Suite’s greatest assets is its ability to integrate into the CI/CD pipelines for rapid and secure application release.
The administrator may have decided to use Burp Suite to centralize the scanning results for auditing purposes.
An IT education institution recently experienced an issue where a student logged into the institution’s Windows server that houses student records and changed some of the grades. How was the student most likely able to do this?
A.The student logged in with the server’s local administrator account.
B.The student logged in with the server’s root account.
C.The student logged in with the server’s guest account.
D.The student logged in with the student’s own account.
A.The student logged in with the server’s local administrator account.
The student most likely logged in with the server’s administrator account, which has full access to everything on the server. The local administrator account should not be enabled on Windows systems.
A newly hired cloud administrator was assigned an engineer to manage several virtual machine instances. To facilitate this, the administrator provided the engineer with a specific user account designed for managing these instances. However, when the engineer attempts to log in to any of the instances as an administrator, the login fails. What are the most likely reasons why the engineer cannot log in? (Select all that apply.)
A.The engineer does not need to log in to the VM instances as an administrator.
B.The engineer’s account does not exist.
C.The engineer is using an incorrect login.
D.The engineer’s role assignment does not allow logging in to the VMs as an administrator.
A.The engineer does not need to log in to the VM instances as an administrator.
C.The engineer is using an incorrect login.
D.The engineer’s role assignment does not allow logging in to the VMs as an administrator.
The engineer does not need to log in to the VM instances as an administrator to manage them but only needs to have the proper role assigned to allow management.
The engineer is using an incorrect login by attempting to log in with the wrong credentials. The administrator has assigned all personnel, including the engineer, their own accounts, which they should use to log in.
The engineer’s role assignment does not need to allow logging in to the VMs as an administrator; it only needs to provide VM management capabilities.
A user in the marketing department is unable to access a folder containing campaign files. The administrator views the folder properties and observes that the user is a member of a group that is inheriting read permissions to the folder. Why might the user not be able to access the folder?
A.The system has locked out the user’s account.
B.The folder owner has explicitly denied the user access to it.
C.The group inheriting access to the folder needs read and write permissions.
D.The administrator must assign the user permissions to the folder.
B.The folder owner has explicitly denied the user access to it.
This explicit denial overrides any other permissions the user may have had to the folder. The administrator may need to work with the folder owner to determine why the user was denied access and whether the access can be granted to the user in the future.
An administrator inadvertently discovered an unsecured device on the cloud network. What should the administrator check? (Select all that apply.)
A.WAF rules meet requirements
B.WAF positioned in front of web application servers
C.Configuration management settings on the NAC
D.Which network entry points are being checked
C.Configuration management settings on the NAC
D.Which network entry points are being checked
The NAC (Network Access Control) should detect all unsecured devices. The administrator should check the configuration management settings on the NAC.
The administrator should determine which network entry points the NAC is checking to ensure that on-site, remote access and VPNs are all checked.
When logging in to a cloud service provider (CSP) web interface using a smart card, the authentication fails. What can a user or administrator do to troubleshoot this issue? (Select all that apply.)
A.Check SSH key pair.
B.Check certificate status.
C.Check DLP policies.
D.Check the smart card.
B.Check certificate status.
D.Check the smart card
Check the certificate that was loaded onto the smart card. The certificate may be expired or revoked. Either case will cause authentication to fail.
Check the smart card itself for damage. If the chip is scratched, bent, or is missing, authentication will fail.
A cloud administrator is reviewing a list of necessary patches, hotfixes, feature updates, and rollups. Which of the following will the administrator most likely test and implement first?
A.Patches
B.Hotfixes
C.Feature updates
D.Rollups
B.Hotfixes
The administrator would most likely test and implement the hotfixes first since hotfixes address a specific issue and are more urgent than patches and updates.
A cloud administrator needs to troubleshoot a sales application that is no longer pulling information from the customer database. What should the administrator initially consider for the troubleshooting? (Select all that apply.)
A.Verify connectivity to the API endpoint.
B.Verify connectivity to the customer database.
C.Specify HTTPS for the connection.
D.Verify the correct API endpoint.
A.Verify connectivity to the API endpoint.
B.Verify connectivity to the customer database.
One of the first things the administrator should check is to verify connectivity to the API endpoint. If the API endpoint is unreachable, the administrator knows where to begin troubleshooting.
One of the first things the administrator should check is to verify connectivity to the customer database. If the database is unreachable, the administrator knows where to begin troubleshooting.
When deploying a virtual appliance onto the Microsoft Azure platform, what action can prevent an unauthorized person from signing on to the system with elevated privileges?
A.Deactivate default account
B.Run Azure Defender
C.Run Nessus scanner
D.Install a hotfix
A.Deactivate default account
Default settings and accounts are a particular vulnerability for newly deployed servers and network devices. It is critical to change or reset the passwords for these accounts or completely disable the accounts, if possible.
A cloud administrator is reviewing the results of a network vulnerability scan. What kind of results should the administrator NOT expect to see?
A.Listening ports
B.Connected network devices
C.Patched systems
D.Exposed network services
C.Patched systems
The administrator should not expect to see a list of patched systems. The network vulnerability scan would return a list of unpatched systems that the administrator should address instead.