Chapter 1 Domain 1: Cloud Concepts, Architecture, and Design (Ben Malisow) Flashcards
Alice is the CEO for a software company; she is considering migrating the operation from the current traditional on-premises environment into the cloud. Which cloud service model should she most likely consider for her company’s purposes?
A.Platform as a service (PaaS)
B.Software as a service (SaaS)
C.Backup as a service (Baas)
D.Infrastructure as a service (IaaS)
A.Platform as a service (PaaS)
Explanation:
PaaS will allow her developers to create and design their software on a variety of operating systems (OSs), increasing the breadth of the market she can sell to. Also, she can use geographically dispersed programmers to work on projects concurrently, and the provider will be responsible for maintaining and updating the OSs as necessary. IaaS is a less attractive option because it would retain the need for Alice’s company to administer the OSs in addition to building their software; it might be less expensive in terms of paying the cloud provider, but the time and effort and personnel necessary to maintain the OSs would offset that cost, probably in a net-negative way. SaaS is not an option; Alice wants her company to build software, not rent it or buy it. Backup as a Service (BaaS) would not be useful for creating, designing, or deploying Alice’s company’s software.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 200). Wiley. Kindle Edition.
Alice is the CEO for a software company; she is considering migrating the operation from the current traditional on-premises environment into the cloud. Which aspect of cloud computing should she be most concerned about, in terms of security issues?
A.Multitenancy
B.Metered service
C. Service-level agreement (SLA)
D.Remote access
A.Multitenancy
Explanation:
Of these four options, multitenancy poses the greatest risk to software developers in the cloud, because developers need to be concerned with two things: protecting their intellectual property (the software they’re making) and protecting resource calls their software makes to the underlying infrastructure (which, if detectable by other cloud customers, could provide information that constitutes a side-channel attack). Metered service doesn’t pose much of a security risk. The SLA might include some security aspects (such as response time), but it’s usually more of a performance-ensuring tool, and this choice is not as good as option A.
Remote access, in this particular case, provides more benefit than risk: Alice can utilize work from developers located across the country or across the planet. While she does have to consider the risks inherent in all remote access, those risks are not as significant as the risks due to multitenancy, so option A is still preferable.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 200). Wiley. Kindle Edition.
Alice is the CEO for a software company; she is considering migrating the operation from the current traditional on-premises environment into the cloud. In order to protect her company’s intellectual property, Alice might want to consider implementing all these techniques/solutions except ____________.
A.Egress monitoring
B. Encryption
C. Turnstiles
D. Digital watermarking
C. Turnstiles
Explanation:
Turnstiles are a physical security barrier to prevent piggybacking/tailgating (an unauthorized person coming through an entrance behind someone who is authorized), but they don’t really present much protection for intellectual property in this case. Egress monitoring (often referred to as “DLP” solutions) is a great way to reduce the likelihood of intellectual property leaving the owner’s control in an unexpected/unapproved manner. Likewise, strong encryption is useful in the cloud to reduce the impact of theft either from leakage to other cloud tenants or from insider threats (such as malicious admins in the employ of the cloud provider). Finally, digital watermarks aid protection of intellectual property by proving original ownership, which is essential for enforcing intellectual property rights (in the case of software design, mainly copyright protections).
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 200). Wiley. Kindle Edition.
Alice is the CEO for a software company; she is considering migrating the operation from the current traditional on-premises environment into the cloud. What is probably the biggest factor in her decision?
A. Network scalability
B. Off-site backup capability
C. Global accessibility
D.Reduced overall cost due to outsourcing administration
D.Reduced overall cost due to outsourcing administration
Explanation:
While all of these are traits of cloud computing and will likely benefit Alice’s company, from her position as senior manager of the organization she is likely to consider the financial benefit first and foremost.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 200). Wiley. Kindle Edition.
In which of the following situations does the data owner have to administer the OS?
A. IaaS
B. PaaS
C. Off-site archive
D.SaaS
A. IaaS
Explanation:
With infrastructure as a service (IaaS), the customer (data owner) will administer the OS and applications. In PaaS, the provider will manage the underlying hardware and the OS. In an on-premises enterprise, the data owner is also the system owner and will be responsible for everything. In an SaaS environment, the cloud provider will handle all aspects of processing, except for adding and manipulating the production data.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 200). Wiley. Kindle Edition.
You are setting up a cloud implementation for an online retailer who will accept credit card payments. According to the Payment Card Industry Data Security Standard (PCI DSS), what can you never store for any length of time?
A. Personal data of consumers
B. The credit card verification (CCV) number
C. The credit card number
D. Home address of the customer
B. The credit card verification (CCV) number
Explanation:
PCI DSS requires that the CCV (or, sometimes, “CVV” for “card verification value”) only be used in the transaction, not stored. The data described in all the other options may be stored after the transaction is complete.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 201). Wiley. Kindle Edition.
The Payment Card Industry Data Security Standard (PCI DSS) distinguishes merchants by different tiers, based on ____________.
A. Number of transactions per year
B. Dollar value of transactions per year
C. Geographic location
D.Jurisdiction
A. Number of transactions per year
Explanation:
The four merchant levels in PCI are distinguished by the number of transactions that merchant conducts in a year. The dollar value of transactions per year, geographic location, and jurisdiction are not attributes that are evaluated for PCI DSS tier levels.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 201). Wiley. Kindle Edition.
What is usually considered the difference between business continuity (BC) efforts and disaster recovery (DR) efforts?
A. BC involves a recovery time objective (RTO), and DR involves a recovery point objective (RPO).
B. BC is for events caused by humans (like arson or theft), whereas DR is for natural disasters.
C. BC is about maintaining critical functions during a disruption of normal operations, and DR is about recovering to normal operations after a disruption.
D. BC involves protecting human assets (personnel, staff, users), whereas DR is about protecting property (assets, data).
C. BC is about maintaining critical functions during a disruption of normal operations, and DR is about recovering to normal operations after a disruption.
Explanation:
Technically, BC efforts are meant to ensure that critical business functions can continue during a disruptive event, and DR efforts are supposed to support the return to normal operations. However, in practice, the efforts often coincide, use the same plans/personnel, and have many of the same procedures. Option A is incorrect; both BC and DR use the RTO and RPO as metrics to determine success. Option B is incorrect; BC and DR efforts are not specific to the cause of a disruptive event. Option D is incorrect; health and human safety should be paramount in all security efforts, with very few exceptions.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 201). Wiley. Kindle Edition.
For business continuity and disaster recovery (BC/DR) purposes, the contract between the primary cloud provider and customer should include all of the following except _______________.
A. Which party will be responsible for initiating a BC/DR response activity
B. How a BC/DR response will be initiated
C. How soon the customer’s data can be ported to a new cloud provider in the event a disruptive event makes the current provider unable to continue service
D. How much a new cloud provider will charge the customer if data has to be ported from the current cloud provider because of a disruptive event
D. How much a new cloud provider will charge the customer if data has to be ported from the current cloud provider because of a disruptive event
Explanation:
The contract between the cloud customer and current cloud provider has no bearing on what the customer will have to pay to a new provider; that will be governed by the contract between the customer and the new provider. All the other options are topics that should be addressed in the contract between the current cloud provider and the cloud customer in order to properly address BCDR needs.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 201). Wiley. Kindle Edition.
When the cloud customer requests modifications to the current contract or service-level agreement (SLA) for business continuity/disaster recovery (BD/DR) purposes, who should absorb the cost of modification?
A. The customer absorbs the cost.
B. The provider absorbs the cost.
C. The cost should be split equally.
D. Modifications don’t cost anything.
A. The customer absorbs the cost.
Explanation:
The customer will have to pay for the costs of modification requested by the customer, regardless of purpose.
All the other options are simply incorrect, especially option D, which is never true.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 201). Wiley. Kindle Edition.
Which of the following is not a factor an organization might use in the cost–benefit analysis when deciding whether to migrate to a cloud environment?
A. Pooled resources in the cloud
B. Shifting from IT investment as capital expenditures to operational expenditures
C. The time savings and efficiencies offered by the cloud service
D. Branding associated with which cloud provider might be selected
D. Branding associated with which cloud provider might be selected
Explanation:
The brand associated with the cloud provider should not influence the cost–benefit analysis; the cloud provider’s brand (and even which cloud provider an organization uses) will most likely not even be known to the consumers who have a business relationship with the organization.
The provider does not absorb the cost when the customer’s requests a modification of the SLA. Though an even split of the cost between customer and provider may seem fair, the customer pays for all costs associated with modifications to the SLA by the customer. Finally, customer modifications to their SLA are chargeable expenses that will almost certainly be paid for by the customer.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 201). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 201). Wiley. Kindle Edition.
Which of the following is the least important factor an organization might use in the cost–benefit analysis when deciding whether to migrate to a cloud environment?
A. Depreciation of IT assets ?
B. Shift in focus from IT dependencies to business process opportunities
C. Whether the provider bills on a monthly or weekly basis
D. Costs associated with utility consumption
C. Whether the provider bills on a monthly or weekly basis
Explanation:
The timing of recurring payments to the provider will probably not be a significant factor in the cost–benefit analysis. All the other options are topics that are more important to review when an organization is considering cloud migration.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 201). Wiley. Kindle Edition.
Which of the following is an aspect of IT costs that will likely be reduced by moving from a traditional, on-premises IT environment into the cloud?
A. Number of users
B. Cost of software licensing
C. Number of applications
D. Number of clientele
B. Cost of software licensing
Explanation:
In a traditional environment, enterprise software costs can be exorbitant, and the price of licensing doesn’t even reflect the hidden costs associated with licensing, such as managing the license library. In a cloud arrangement, especially software as a service (SaaS), the customer pays only the contract fee to the cloud provider, and it is the provider’s responsibility to arrange for software licensing and to manage those licenses. Option A is incorrect because the number of users should not be affected whether the organization is operating in the cloud or a legacy environment. The exception would be the reduced number of privileged users, because the cloud provider will be handling more administrative tasks in the environment; however, because “privileged” was not specified, option B is still a better answer. Option C is incorrect because that may or may not be true of an organization’s migration to the cloud. Option D is incorrect because the organization certainly hopes it is not going to lose clientele by moving to the cloud!
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (pp. 201-202). Wiley. Kindle Edition.
Which of the following is an aspect of IT costs that will likely be reduced by moving from a traditional, on-premises IT environment to the cloud?
A. Utilities costs
B. Security costs
C. Landscaping costs
D. Travel costs
A. Utilities costs
Explanation:
Cloud providers are purchasing utilities (power, water, Internet connectivity) at such a massive rate that they can realize per-unit cost savings that would far exceed any smaller organizations’ pricing for individual data centers. In this case, economies of scale are very much in favor of the larger entity. Option B may or may not be true, depending on the degree of sensitivity and value of the organization’s data and what controls the organization will request/contract for in the cloud. Options C and D are not influenced by cloud migration in any way and are wholly dependent on other factors within the organization.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 202). Wiley. Kindle Edition.
Which of the following is an aspect of IT costs that will likely be reduced by moving from a traditional, on-premises IT environment to the cloud?
A. Personnel training
B. Personnel turnover
C. Capital expenses for IT assets
D. Loss due to an internal data breach
C. Capital expenses for IT assets
Explanation:
Constant reinvestment in IT assets (which are almost always obsolete by the time they’re marketed, much less by the time they’re deployed in operational environments) is plagued with sunk costs; money spent on hardware devices or software licenses is unlikely to be recovered. Avoiding expenditures for IT systems by moving to the cloud means reducing these costs considerably. Option A is incorrect; cloud migration should not affect the need for personnel training; employees will just need to be trained in a different manner. Options B and D should not be affected by cloud migration in any way; whether your organization has a high personnel turnover rate or risk from internal threat is not based on whether the IT environment is owned or leased.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 202). Wiley. Kindle Edition.
Although cloud migration might offer significant cost savings for an organization, which of the following factors might reduce the actual financial benefit the organization realizes in a cloud environment?
A. Altitude of the cloud data center
B. Security controls and countermeasures
C. Loss of ownership of IT assets
D. Costs of Internet connectivity for remote users
B. Security controls and countermeasures
Explanation:
Every security process, tool, and behavior entails a related cost, both financially and operationally. Although a “base price” cloud service might appear extremely affordable compared to the traditional environment, add-ons such as encryption, digital rights management (DRM), security incident/event management (SIM/SEM/SIEM), and intrusion detection/prevention systems (IDS/IPS) may all come with additional cost and may degrade performance, thus reducing the cost savings compared to the cost of operations prior to migration. This is extremely important for the organization to consider before migration, especially if the organization exists in a highly regulated industry. Option A is incorrect because the altitude of the cloud data center does not translate into a reduction of the actual financial benefit the organization would realize in moving to the cloud environment. Option C is wrong because it should be the opposite of the actual case: losing ownership of the IT assets, and paying only for the use of those assets, should lead directly to a savings over the costs of a traditional IT environment, if compared on a seat-to-seat basis. Option D should not be true; the cost of connecting users to the Internet should not be significantly greater if the organization operates in the cloud or with an on-premises data center—if the cost is considerably greater, the organization should never have migrated in the first place.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 202). Wiley. Kindle Edition.
What is the international standard that dictates creation of an organizational information security management system (ISMS)?
A. NIST SP 800-53
B. PCI DSS
C. ISO 27001
D. NIST SP 800-37
C. ISO 27001
Explanation:
ISO 27001 mandates an ISMS; organizations can be certified according to compliance with 27001. National Institute of Standards and Technology (NIST) SP 800-53 is the list of security controls approved for use by U.S. government agencies and a means to map them to the Risk Management Framework. The Payment Card Industry Data Security Standard (PCI DSS) is the payment card industry’s framework of compliance for all entities accepting or processing credit card payments. NIST SP 800-37 is the Risk Management Framework.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.
ISO 27001 favors which type of technology?
A. Open source
B. PC
C. Cloud-based
D.None
D.None
Explanation:
The ISO 27001 standard is designed to be product agnostic. The other answers suggest ISO 27001 favors a type of technology, and are therefore incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.
Why might an organization choose to comply with the ISO 27001 standard?
A. Price
B. Ease of implementation
C. International acceptance
D. Speed
C. International acceptance
Explanation:
The ISO standards are almost universally accepted and recognized, and they’re even mandated for certain industries/locales.
They are not, however, cheap, fast, or easy to adopt, implement, and audit against, so all the other answers are incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.
Why might an organization choose to comply with NIST SP 800-series standards?
A. Price
B. Ease of implementation
C. International acceptance
D.Speed
A. Price
Explanation:
The NIST standards are not particularly easy or fast to implement (in fact, they require continual improvement), and they are not widely recognized or mandated outside of the U.S. government federal sector. However, they are in the public domain, so an organization would not have to pay for the standards material if the organization chose to use NIST standards.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.
Which standard contains guidance for selecting, implementing, and managing information security controls mapped to an information security management system (ISMS) framework?
A. ISO 27002
B. Payment Card Industry Data Security Standard (PCI DSS)
C. NIST SP 800-37
D. Health Insurance Portability and Accountability Act (HIPAA)
A. ISO 27002
Explanation;
ISO 27002 is used for choosing security controls in order to comply with the ISMS, which is contained in ISO 27001. PCI DSS is the payment card industry’s framework of compliance for all entities accepting or processing credit card payments. NIST SP 800-37 is the Risk Management Framework. HIPAA is the U.S. law regarding patient data privacy in the medical sector.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.
The current American Institute of Certified Public Accountants (AICPA) publishes the _______________ standard, from which the Service Organization Control (SOC) reports are derived.
A. Sherwood Applied Business Security Architecture (SABSA)
B. Statement on Standards for Attestation Engagements (SSAE) 18
C. Biba
D. NIST SP 800-53
B. Statement on Standards for Attestation Engagements (SSAE) 18
Explanation:
SSAE 18 is the current AICPA audit standard, as of 2018. All the other options are distractors: SABSA is an IT architecture framework, Biba is an access control model, and NIST SP 800-53 contains guidance for selecting security controls in accordance with the Risk Management Framework.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.
Which U.S. federal law affects banking and insurance companies?
A. NIST 800-53
B. HIPAA
C. Sarbanes-Oxley Act (SOX)
D. Gramm-Leach-Bliley Act (GLBA)
D. Gramm-Leach-Bliley Act (GLBA)
Explanation:
GLBA is a U.S. federal law pertaining to financial and insurance customer information. NIST 800-53 is a standard, not a law, so option A is incorrect. Health Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law concerning medical information, so option B is incorrect. SOX affects publicly traded corporations, making option C incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.
The Statement on Standards for Attestation Engagements 18 (SSAE 18) Service Organization Control (SOC) reports are audit tools promulgated by the American Institute of Certified Public Accountants (AICPA).
What kind of entities were SOC reports designed to audit?
A. U.S. federal government
B. Privately held companies
C. Companies that provide services
D. Nonprofit organizations
C. Companies that provide services
Explanation:
The SSAE 18 is an audit standard, and the SOC reports were specifically designed to report on the suitability of organizations that provide services. This is not to say that SOC reports are not used to assess other types of organizations— organizations—they are, but they were not designed for that purpose, so all the other answers are incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 203). Wiley. Kindle Edition.