Lesson 9: Understanding Cloud Security Concepts Flashcards
An organization has received formal notice that it must not allow any modifications to specific information within the organization. What kind of process is this?
A.File integrity monitoring
B.Role-based access control
C.Network segmentation
D.Legal hold
D.Legal hold
Legal hold is a formal process that prevents the modification of specific data in the expectation of legal proceedings.
What cloud records management feature or solution would be most beneficial in a use case where lawyers may want to go through years of data to convict a person suspected of money laundering? (Select all that apply.)
A.Retention
B.Versioning
C.Destruction
D.Write once read many
A.Retention
D.Write once read many
Data retention is managed on a schedule that defines how long specific types of data must be kept. This data may contain personal information or financial records.
Write once read many (WORM) solutions store data in a way that cannot be legitimately changed. This makes long-term storage of essential and immutable information possible. Legal and financial data benefit from WORM storage.
An HR supervisor has asked the cloud administrator to check the log files to find out when a particular employee logged off the system on the previous day. Which goal of IAM does this satisfy?
A.Authentication
B.Authorization
C.Auditing
D.Confidentiality
C.Auditing
Recording all user actions in log files or keeping a record of what an identity did and when it occurred, satisfies the IAM (Identity and Access Management) goal of auditing.
What term describes policies that are set to control the entire lifecycle of data, from creation through destruction?
A.Versioning
B.Retention
C.Records management
D.WORM
C.Records management
Records management refers to the policies that control data throughout its lifecycle and includes the creation of data, the use of data, the modification of data, and the deletion of data.
The helpdesk receives a call from a frustrated user. The system has required the user to change their password and the user has tried several different ones, but the system will not accept them. Why won’t the system accept the user’s passwords?
A.The user is not on the application allow listing.
B.The passwords do not meet the password policy requirements.
C.The system has locked out the user’s account.
D.The administrator hasn’t assigned the user any permissions.
B.The passwords do not meet the password policy requirements.
The system won’t accept the user’s passwords since the passwords that the user is attempting to use do not meet the password policy requirements.
A systems technician is enabling drive encryption for devices in the enterprise. What are the tools available for the technician to achieve this? (Select all that apply.)
A.Encrypting File System
B.LUKS
C.gzip
D.BitLocker
B.LUKS
D.BitLocker
Linux Unified Key Setup (LUKS) is also another tool for drive encryption. For drive encryption, the data is protected while the server is offline. If the drive is stolen, the contents are encrypted.
Bitlocker is a tool for drive encryption. For drive encryption, the entire drive (or partition) is encrypted during the shutdown process and decrypted during startup.
An administrator is reviewing the roles and features installed on the organization’s servers, comparing them to what each server’s purpose is, and removing the roles and features that are unnecessary. What practice is the administrator engaged in?
A.Baselining
B.Hardening
C.Endpoint detection and response
D.Configuration management
B.Hardening
The administrator is engaged in the practice of hardening. Hardening is removing everything unnecessary on the server and using the most current version of everything necessary for the server.
An employee sent a digitally signed resignation email to the HR department. Which goal of encryption proves that the employee sent the email?
A.Confidentiality
B.Digital signatures
C.Integrity
D.Non-repudiation
D.Non-repudiation
The goal of encryption that proves the employee sent the email is non-repudiation. In non-repudiation, the author encrypts the message using a method that nobody else could have used.
On the most fundamental level, every network allows access to system resources based on what?
A.Permissions
B.Passwords
C.Active Directory
D.Identity
D.Identity
On the most fundamental level, every network allows access to system resources based on identity. Organizations apply permissions and passwords to identities.
An administrator created a build and tested it extensively to correct the bugs and other issues, and then released it for use. What kind of build did the administrator create?
A.Stable
B.Long-term support
C.Beta
D.Deprecated
A.Stable
The administrator has released a stable build. A stable build is the final release of the build after testing, but before the build enters the long-term support lifecycle phase.
A cloud administrator receives an email alert. The alert only indicates suspicious activity and no action was taken. What type of software sent the alert?
A.HIDS
B.IPS
C.Antivirus
D.Firewall
A.HIDS
The administrator received the alert from a Host-Based Intrusion Detection System (HIDS). HIDS detects behavior that is different from standard behavior and alerts administrators.
The finance director recently learned how easy it is to intercept data and has concerns about someone tapping into the network to get the financial data. The cloud administrator assures the director that the financial data is encrypted before it leaves the program and that it stays encrypted unless being used by the program. What kind of encryption is the financial data using?
A.API endpoint
B.Operating system
C.Application
D.Filesystem
C.Application
The financial data is using application encryption, which encrypts the data before it leaves the application and protects the data on the network, in storage, and in databases.
An organization was unable to relocate all on-premises resources to the cloud and now has concerns about the potential for data loss between the on-premises and cloud networks. What solution can the cloud administrator implement to mitigate this risk?
A.RBAC
B.FIM
C.WORM
D.CASB
D.CASB
The administrator can implement a Cloud Access Security Broker (CASB) software. This software monitors the data flow between the cloud and on-premises networks specifically searching for potential data loss incidents.
A cloud administrator can manage permissions for users or groups to access cloud resources using which of the following?
A.Multifactor Authentication (MFA)
B.Identity and Access Management (IAM)
C.Single Sign-on (SSO)
D.Security Assertion Markup Language (SAML)
B.Identity and Access Management (IAM)
Identity and Access Management (IAM) begins with policies to govern user access to data and cloud resources. Those policies are enforced by technical methods such as centralized user management and non-technical means such as physical security.
A cloud server administrator is configuring NetIQ eDirectory for directory services. Given the system’s design, which protocol would be most suitable to ensure seamless operation and standard compliance?
A.LDAP
B.HTTPS
C.Secure Shell
D.X.500
D.X.500
X.500 is a set of protocols that define how global directories should be structured. Enabling it would ensure the seamless operation of NetIQ eDirectory with compliant systems.