Chapter 3 Domain 3: Cloud Platform and Infrastructure Security (Ben Malisow) Flashcards
You are in charge of creating the business continuity and disaster recovery (BC/DR) plan and procedures for your organization. Your organization has its production environment hosted in a cloud environment. You are considering using cloud backup services for your BC/DR purposes as well. What would probably be the best strategy for this approach, in terms of redundancy and resiliency?
A. Have your cloud provider also provide BC/DR backup.
B. Keep a BC/DR backup on the premises of your corporate headquarters.
C. Use another cloud provider for the BC/DR backup.
D. Move your production environment back into your corporate premises, and use your cloud provider to host your BC/DR backup.
C. Use another cloud provider for the BC/DR backup.
Explanation:
C. It’s best to have your backup at another cloud provider in case whatever causes an interruption in service occurs throughout your primary provider’s environment; this will be more complicated and expensive, but it provides the best redundancy and resiliency. Using the same provider for production and backup is not a bad option, but it entails the risk of the same contingency affecting both copies of your data. Having either the backup or the production environment localized does not provide the best protection, so neither option B nor option D is desirable.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
You are in charge of creating the business continuity and disaster recovery (BC/DR) plan and procedures for your organization. You decide to have a tabletop test of the BC/DR activity. Which of the following will offer the best value during the test?
A. Have all participants conduct their individual activities via remote meeting technology.
B. Task a moderator well versed in BC/DR actions to supervise and present scenarios to the participants, including randomized special events.
C. Provide copies of the BC/DR policy to all participants.
D. Allow all users in your organization to participate.
B. Task a moderator well versed in BC/DR actions to supervise and present scenarios to the participants, including randomized special events.
Explanation:
A trained and experienced moderator can guide the participants through the activity, enhancing their training and noting pitfalls and areas for improvement. Option A is not preferable because having the participants gathered together ensures their full attention and provides interaction that remote participation might not yield. Option C is a baseline; all participants should have copies of the policy as a matter of course. Option D is not useful in a tabletop exercise; only critical participants in the organization should take part in the tabletop.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
You are in charge of creating the business continuity and disaster recovery (BC/DR) plan and procedures for your organization. Your organization has its production environment hosted by a cloud provider, and you have appropriate protections in place. Which of the following is a significant consideration for your BC/DR backup?
A. Enough personnel at the BC/DR recovery site to ensure proper operations
B. Good cryptographic key management
C. Access to the servers where the BC/DR backup is stored
D. Forensic analysis capabilities
B. Good cryptographic key management
Explanation:
This is a difficult question that requires a great deal of thought. Option B is correct because appropriate cloud data security practices will require encrypting a great deal of the data, and having the keys will be necessary during contingency operations in order to access the backup; without the keys, you won’t be able to access your data. Option A is not correct because using the cloud for BC/DR will allow personnel to access the backup from anywhere they can get broadband connectivity, not specifically a recovery site. Option C is not correct because the customer will rarely have physical access to servers in the cloud environment. Option D is not correct because forensic analysis is not a significant consideration in BC/DR; it is much more important for incident response.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 246). Wiley. Kindle Edition.
You are in charge of creating the business continuity and disaster recovery (BC/DR) plan and procedures for your organization. You are going to conduct a full test of the BC/DR plan.
Which of the following strategies is an optimum technique to avoid major issues?
A. Have another full backup of the production environment stored prior to the test.
B. Assign all personnel tasks to perform during the test.
C. Have the cloud provider implement a simulated disaster at a random moment in order to maximize realistic testing.
D. Have your regulators present at the test so they can monitor performance.
A. Have another full backup of the production environment stored prior to the test.
Explanation:
A full test will involve both the production environment and the backup data; it is possible to create an actual disaster during a full test by ruining the availability of both. Therefore, it is crucial to have a full backup, distinct from the BC/DR backup, in order to roll back from the test in case something goes horribly wrong. Option B is incorrect because not all personnel will have tasks to perform; most personnel will have to evacuate from the facility only during a full test. Option C is incorrect because the cloud provider should not initiate the test, and the test should not take place at a random moment. Option D is not correct because the regulators’ presence will not add any value to the test.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
A Security Assertion Markup Language (SAML) identity assertion token uses the ___________________ protocol.
A. Extensible Markup Language (XML)
B. Hypertext Transfer Protocol (HTTP) Hypertext
C. Markup Language (HTML)
D. American Standard Code for Information Interchange (ASCII)
A. Extensible Markup Language (XML)
Explanation:
Security Assertion Markup Language (SAML) is based on XML. HTTP is used for port 80 web traffic; HTML is used to present web pages. ASCII is the universal alphanumeric character set.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
The minimum essential characteristics of a cloud data center are often referred to as “ping, power, pipe.” What does this term mean?
A. Remote access for customer to racked devices in the data center; electrical utilities; connectivity to an Internet service provider (ISP)/the Internet
B. Application suitability; availability; connectivity
C. Inrastructure as a service (IaaS); software as a service (SaaS); platform as a service (PaaS)
D. Anti-malware tools; controls against distributed denial-of-service (DDoS) attacks; physical/environmental security controls, including fire suppression
A. Remote access for customer to racked devices in the data center; electrical utilities; connectivity to an Internet service provider (ISP)/the Internet
Explanation:
Option A is the definition of the term;the other answers are not.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
To support all aspects of the CIA triad (confidentiality, integrity, availability), all of the following aspects of a cloud data center need to be engineered with redundancies except ___________________.
A. Power supply
B. HVAC
C. Administrative offices
D. Internet service provider (ISP)/connectivity lines
C. Administrative offices
Explanation:
The administrative offices of a cloud data center rarely are part of the critical functions of the operation; a data center could likely endure the loss of the administrative offices for a considerable length of time, so redundancy here is probably not cost effective. All the other items are part of the critical path and need redundancies.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Who is the cloud carrier?
A. The cloud customer
B. The cloud provider
C. The regulator overseeing the cloud customer’s industry
D. The ISP between the cloud customer and provider
D. The ISP between the cloud customer and provider
Explanation:
Option D is the definition of a cloud carrier, from National Institute of Standards and Technology (NIST) Special Publication (SP) 500-292. All the other options are incorrect, as defined by NIST SP 500-292.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Which of the following terms describes a means to centralize logical control of all networked nodes in the environment, abstracted from the physical connections to each?
A. Virtual private network (VPN)
B. Software-defined network (SDN)
C. Access control lists (ACLs)
D. Role-based access control (RBAC)
B. Software-defined network (SDN)
Explanation:
The question describes a software-defined network (SDN). A VPN is used for creating an encrypted communications tunnel over an untrusted medium, so option A is incorrect. ACLs are used as centralized repositories for identification, authentication, and authorization purposes, so option C is incorrect. RBAC is an access control model used to assign permissions based on job functions within an organization, so option D is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
In software-defined networking (SDN), the northbound interface (NBI) usually handles traffic between the ___________________ and the ___________________.
A. Cloud customer; ISP
B. SDN controllers; SDN applications
C. Cloud provider; ISP
D. Router; host
B. SDN controllers; SDN applications
Explanation:
B. The NBI usually handles traffic between the SDN controllers and SDN applications. Options A and C are incorrect because neither of those options lists any of the SDN infrastructure, be that the controllers or the applications. Option D may be arguably correct, as there might be an NBI handling that traffic between those nodes, but option B is more specific and always true for this definition, so it is the better choice.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Software-defined networking (SDN) allows network administrators and architects to perform all the following functions except ___________________.
A. Reroute traffic based on current customer demand
B. Create logical subnets without having to change any actual physical connections
C. Filter access to resources based on specific rules or settings
D. Deliver streaming media content in an efficient manner by placing it closer to the end user
D. Deliver streaming media content in an efficient manner by placing it closer to the end user
Explanation:
D. Option D is really a definition of a CDN (content delivery network). All the other options are aspects of SDNs.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Which of the following is a device specially purposed to handle the issuance, distribution, and storage of cryptographic keys?
A. Key management box (KMB)
B. Hardware security module (HSM)
C. Ticket-granting ticket (TGT)
D. Trusted computing base (TCB)
B. Hardware security module (HSM)
Explanation:
The question describes an HSM. KMB is a nonsense term used as a distractor, so it is incorrect. TGT is a term associated with Kerberos single sign-on systems and is incorrect.
The TCB includes the elements of hardware and software (usually in the operating system) that ensure that a system can only be controlled by those with the proper permissions (i.e., admins with root control), so it is also incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 247). Wiley. Kindle Edition.
When discussing the cloud, we often segregate the data center into the terms compute, storage, and networking. Compute is made up of ___________________ and ___________________.
A. Routers; hosts
B. Application programming interface (APIs); northbound interface (NBIs)
C. Central processing unit (CPU); random-access memory (RAM)
D. Virtualized; actual hardware devices
C. Central processing unit (CPU); random-access memory (RAM)
Explanation:
The compute nodes of a cloud data center can be measured in terms of how many central processing units (CPUs) and how much random access memory (RAM) is available within the center. Option A is incorrect because routers would be considered a part of the networking of a data center (and because option C is a better answer). Option B involves applications and how traffic flows between them and storage controllers; it has nothing to do with the compute nodes and is therefore wrong.
Option D might obliquely be considered correct because it’s technically true (compute nodes will include both virtual and hardware machines), but option C is a much better and more accurate choice.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
All of the following can be used to properly apportion cloud resources except ___________________.
A. Reservations
B. Shares
C. Cancellations
D. Limits
C. Cancellations
Explanation:
Cancellations is not a term used to describe a resource allotment methodology. All of the other options are such terms.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Which of the following is a method for apportioning resources that involves setting guaranteed minimums for all tenants/customers within the environment?
A. Reservations
B. Shares
C. Cancellations
D. Limits
A. Reservations
Explanation:
The question is the definition of reservations. Options B and D are also resource apportioning methods, but they do not fall under the definition described in the question. Option C is incorrect because it has no meaning in this context.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Which of the following is a method for apportioning resources that involves setting maximum usage amounts for all tenants/customers within the environment?
A. Reservations
B. Shares
C. Cancellations
D. Limits
D. Limits
Explanation:
The question describes limits.
Options A and B are also resource apportioning methods, but they do not fall under the definition described in the question. Option C is because it has no meaning in this context.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Which of the following is a method for apportioning resources that involves prioritizing resource requests to resolve contention situations?
A. Reservations
B. Shares
C. Cancellations
D .Limits
B. Shares
Explanation:
The question describes shares. Options A and D are also resource apportioning methods, but they do not fall under the definition described in the question. Option C is incorrect because it has no meaning in this context.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
A bare-metal hypervisor is Type ___________________.
A. 1
B. 2
C. 3
D. 4
A. 1
Explanation:
A bare-metal hypervisor is a Type 1 hypervisor. Option B describes another type of hypervisor; the other options are incorrect because there is no such thing as a Type 3 or Type 4 hypervisor.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
A hypervisor that runs inside another operating system (OS) is a Type ___________________ hypervisor.
A. 1
B. 2
C. 3
D .4
B. 2
Explanation:
The question describes a Type 2 hypervisor.
Option A describes another type of hypervisor; the other options are incorrect because there is no such thing as a Type 3 or Type 4 hypervisor.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
A Type ___________________ hypervisor is probably more difficult to defend than other hypervisors.
A. 1
B. 2
C. 3
D. 4
B. 2
Explanation:
A Type 2 hypervisor relies on the underlying operating system (OS) to operate properly; the underlying OS offers a large attack surface for aggressors. A Type 1 hypervisor boots directly from the hardware; it’s much easier to secure a machine’s Basic Input/Output System (BIOS) than an entire OS, so option B is better than option A. Options C and D are incorrect because there is no such thing as a Type 3 or Type 4 hypervisor.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 248). Wiley. Kindle Edition.
One of the security challenges of operating in the cloud is that additional controls must be placed on file storage systems because ___________________.
A. File stores are always kept in plain text in the cloud
B. There is no way to sanitize file storage space in the cloud
C. Virtualization necessarily prevents the use of application-based security controls
D. Virtual machines are stored as snapshotted files when not in use
D. Virtual machines are stored as snapshotted files when not in use
Explanation:
VMs are snapshotted and simply stored as files when they are not being used; an attacker who gains access to those file stores could ostensibly steal entire machines in highly portable, easily copied formats. Therefore, these cloud storage spaces must include a significant amount of controls. Options A and C are simply untrue. Option B is untrue when crypto-shredding is utilized.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
What is the main reason virtualization is used in the cloud?
A. Virtual machines (VMs) are easier to administer.
B. If a VM is infected with malware, it can be easily replaced.
C. With VMs, the cloud provider does not have to deploy an entire hardware device for every new user.
D. VMs are easier to operate than actual devices.
C. With VMs, the cloud provider does not have to deploy an entire hardware device for every new user
Explanation:
While options A and B are both also true, C is the most significant reason cloud data centers use VMs. If the cloud provider had to purchase a new box for every user, the cost of cloud services would be as much as running a traditional environment (or likely cost even more), and there would be no reason for any organization to migrate to the cloud, especially considering the risks associated with disclosing data to a third party. Option D is simply untrue. VMs are not easier to operate than actual devices.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Orchestrating resource calls is the job of the ___________________.
A. Administrator
B. Router
C. VM
D .Hypervisor
D .Hypervisor
Explanation:
The question describes what the hypervisor does. (Note that the answer “operating system” would also work here but was not one of the options.) Option A is incorrect; the allocation of resources is not performed manually. The router directs traffic between networks; it does not apportion resources. Therefore, option B is incorrect. A VM makes resource calls; option C is incorrect.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.
Which of the following terms describes a cloud storage area that uses a filesystem/hierarchy?
A. Volume storage
B. Object storage
C. Logical unit number (LUN)
D. Block storage
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 64). Wiley. Kindle Edition.
B. Object storage
Explanation:
Object storage is, literally, a means of storing objects in a hierarchy such as a file tree. All the other options are terms used to describe cloud storage areas without file structures.
Malisow, Ben. (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (p. 249). Wiley. Kindle Edition.