(ISC)² Certified Cloud Security Professional Exam 4 (CCSP) Practice (Aris Athanasiou) Flashcards
(50 cards)
Which of the following organisations would have to comply with FERPA?
A. A financial institution
B. A educational agency
C. A public company
D. A hospital
B. A educational agency
Explanation:
The Family Educational Rights and Privacy Act of 1974 (FERPA) is a federal law that protects the privacy of student education records. Therefore, the educational agency would have to comply with it.
Which of the following is not true about static application security testing (SAST)?
A. Can detect vulnerabilities like XSS and CSRF
B. Can analyse both source code as well as compiled binaries
C. Can be conducted as part of the continuous integration/continuous deployment pipeline
D. Can detect race conditions
D. Can detect race conditions
Explanation:
Static application security testing can not detect race conditions. We typically employ dynamic security testing techniques to identify race conditions. All the other statements are true.
What does “production” refer to in the context of digital forensics?
A. The temporary suspension of the organizations data retention policy due to legal
B. The process for generating the data requested in the warrant
C. The presentation of the requested data to the court
D. The environment that data needs to be collected from
C. The presentation of the requested data to the court
Explanation:
In the context of digital forensics “production” refers to the presentation of the requested data to the court or the requesting party.
Which mathematical problem does RSA rely on?
A. Finding the discrete logatirhm of a random elliptic curve element with respect to a publicly known base point
B. Discrete logarithm problem (DLP)
C. Factorization of the product of two large prime numbers
D. Traveling salesman problems (TSP)
C. Factorization of the product of two large prime numbers
Explanation:
RSA relies on the factorization of the product of two large prime numbers. Diffie–Hellman, and ElGamal rely on the discrete logarithm problem.
Which of the following is not a feature of an API gateway?
A. Policy Enforcement
B. Rate-Limiting
C. Metrics
D. Malware Analysis
D. Malware Analysis
Explanation:
Malware analysis is not a typical feature of an API gateway, the rest of the capabilities are typical features of these products.
A large enterprise recently defined, implemented, and fully tested their Business Continuity (BC)/Disaster Recovery (DR) procedures. The newly-appointed CIO has decided that the organisation needs a large number of the existing workloads to the cloud. Which of the following models would allow the organisation to replicate their existing (BC/DR) strategy, minimising rework?
A. BCaaS
B. PaaS
C. IaaS
D. SaaS
C. IaaS
Explanation:
Infrastructure-as-a-Service (IaaS) would allow the enterprise to replicate more of their existing (BC/DR) to the cloud environment compare to PaaS or SaaS.
A user attempts to log in to a customer relationship management (CRM) application offered as a SaaS. As the first step, the user is prompted to type in his username. Which of the following best describe the above?
A. Identity Verification
B. Authorization
C. Identification
D. Authentication
C. Identification
Explanation:
Identification occurs when a user (or any subject) claims an identity. By submitting their username, the users claim to be the identity/persona associated with that name.
Authentication is the process of proving your identity and it occurs when subjects provide appropriate credentials to prove their identity.
Once a user is identified and authenticated, they can be granted authorization based on their proven identity.
Identity Verification is the process that typically is performed once, during the creation of the persona/identity, and ties the physical person to the digital identity. This typically involves the physical person presenting their passport or some other proof of identity.
Which OSI layer does a web application firewall (WAF) operate?
A. 3
B. 4
C. 7
D. 1
C. 7
Explanation:
Web application firewall (WAF) operate at the OSI Layer 7. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection.
Which of the following media sanitisation techniques would provide the most assurance in a cloud environment?
A. Multiple passes with 0s and 1s
B. Crypto-shredding
C. Physical destruction of media mandated by the SLA/contract
D. Overwriting
C. Physical destruction of media mandated by the SLA/contract
Explanation:
The physical destruction of media is always the most effective way of minimising the chances of data remanence. This would be quite challenging in a cloud environment given the multitenancy aspects of it. However, if it is mandated from the SLA or the contract between the cloud provider and the customer, the CSP would have to destroy the media.
Which of the following best describes paravirtualization?
A. Running multiple type 2 hpervisors on the same host machine
B. A method for the hypervisor to offer interfaces to the guest OS that can use instead of the normal hardware interfaces
C. Running multiple Type 1 hypervisors on the same host machine
D. Paravirtualization is another term for container virtualization
B. A method for the hypervisor to offer interfaces to the guest OS that can use instead of the normal hardware interfaces
Explanation:
The definition for paravirtualization is a virtualization technique that presents a software interface to virtual machines which is similar, yet not identical to the underlying hardware interface.
Which CSA STAR certification framework level involves the CSP submitting a completed Consensus Assessments Initiative Questionnaire (CAIQ)?
A. Level Two
B. Level Four
C. Level Three
D. Level One
D. Level One
Explanation:
Level one of the CSA STAR requires that the cloud providers either submit a completed Consensus Assessments Initiative Questionnaire (CAIQ) or submit a report documenting compliance with the Cloud Controls Matrix (CCM).
Which of the following controls can both increase and decrease the risk for an organisation at the same time?
A. Hash customer password before storing them
B. Close down unnecessary ports on the Internet facing firewall
C. Store cryptographic keys outside the cloud service provider
D. Remove services which are not required from baseline images
C. Store cryptographic keys outside the cloud service provider
Explanation:
Storing cryptographic keys outside the cloud service provider can reduce risks such as an attacker gaining access to both the encrypted data and the respective keys, insider threat from the cloud service personnel, etc.
At the same time, it can create new risks for the organisation such as unavailability of the data when connectivity between the cloud service provider and the keys storage service is lost, keys might have to be transferred between the cloud provider and the key storage provider from time to time which increases the chances of a key being compromised, etc.
Several countries and unions have developed their own privacy standards. Which country enacted PIPEDA?
A. Canada
B. Japan
C. Argentina
D. USA
A. Canada
Explanation:
The Personal Information Protection and Electronic Documents Act (PIPEDA) is the federal privacy law for private-sector organizations in Canada.
Which aspect of information security is ensured from encryption?
A. Integrity
B. Confidentiality
C. Resiliency
D. Availability
B. Confidentiality
Explanation:
Encryption can protect the confidentiality of data. Although encryption can also provide integrity (through Message Authentication Codes), confidentiality is the most common use-case and therefore the best answer out of the four.
What is the difference between SOC Type 1 and Type 2 reports?
A. Type 1 is intended for external stakeholders, type is 2 intended for internal stakeholders
B. Type 1 focuses on the operating effectiveness of the controls, type is 2 presents the auditors opinion regarding the accuracy of managements description of the system
C. Type 1 is intended for internal stakeholders, type 2 is intended for external stakeholders
D. Type 1 presents the auditors opinion regarding the accuracy of managements description of the system, type 2 focuses on the operating effectiveness of the controls
D. Type 1 presents the auditors opinion regarding the accuracy of managements description of the system, type 2 focuses on the operating effectiveness of the controls
Explanation:
The main difference between SOC Type 1 and 2 is that the first is an attestation of controls at a specific point in time, whereas the latter is an attestation of controls over a minimum six-month period focusing on their effectiveness.
Which of the following HTTP status codes is associated with client-side errors?
A. 2XX
B. 5XX
C. 3XX
D. 4XX
D. 4XX
Explanation:
HTTP 4xx codes denote client-side errors, some of the code include
400 Bad Request
401 Unauthorized
402 Payment Required
403 Forbidden
404 Not Found
405 Method Not Allowed
Full list of HTTP codes can be found here
In cloud environments, automated configuration is usually achieved by consuming a set of APIs provided by the CSP. What does API stand for?
A. Application Programming Interface
B. Applied Programming Infrastructure
C. Applied Programmatic Infrastructure
D. Application Programmatic Interface
A. Application Programming Interface
Explanation:
API stands for Application Programming Interface
What does cloud reversibility refer to?
A. The ability to reverse a misconfiguration and roll back to a well known state
B. The ability for an organization to retrieve and delete its data stored in a cloud service provider
C. The ability for an organization to transfer its data stored in a cloud service to a different cloud service provider
D. The ability to trace the source of an attack and unleash a hack-back
B. The ability for an organization to retrieve and delete its data stored in a cloud service provider
Explanation:
The definition of reversibility is the ability of an organisation to retrieve and delete its data stored in a cloud service provider.
Which of the following actions is not part of defining the objectives of an audit?
A. Define frequency and tools to be used
B. Refine processes from lessons learned
C. Define the audit output format
D. Define number of auditors involved
B. Refine processes from lessons learned
Explanation:
Refine processes from lessons learned happens after the audit has been completed and is not part of defining the objectives of an audit.
A large system integrator (SI) decided to start offering more services around cloud computing. Their business model is purchasing cloud services in bulk and then offering those services to their own customers with a 10% markup over the original price. Which of the following describes the SI?
A. Cloud integrator
B. Cloud Access Broker
C. Cloud computing reseller
D. Cloud operator
C. Cloud computing reseller
Explanation:
This is a typical example of a cloud computing reseller.
Which of the following actions does NOT take place during an SSL/TLS handshake?
A. Verifying the validity of a certificate
B. Usage of public key cryptography
C. Establishing a symmetric key
D. Symmetrically encrypting data
D. Symmetrically encrypting data
Explanation:
The SSL/TLS handshake is the process of establishing the symmetric encryption key. The symmetric encryption of data does not start until the handshake is complete
The “Trust Services Principles and Criteria” include security, availability, processing integrity, confidentiality, and privacy. Which institute has developed the above framework?
A. National Institute of Standards and Technology (NIST)
B. Internal Organization for Standardization (ISO)
D. Cloud Security Alliance
C. American Institute of Certified Public Accounts (AICPA)
Explanation:
The “Trust Services Principles and Criteria” have been developed from the American Institute of Certified Public Accountants (AICPA).
Which of the following term describes a set of cloud computing services optimised for use in a particular industry?
A. Vertical Cloud
B. Elastic Cloud
C. Horizontal Cloud
D. Tailored Cloud
A. Vertical Cloud
Explanation:
A vertical cloud, or vertical cloud computing, is the phrase used to describe the optimization of cloud computing and cloud services for a particular vertical (e.g., a specific industry) or specific application use.
The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification. What is a Security Target (ST) as described in ISO/IEC 15408?
A. How thoroughly the product is tested on a sliding scale from one to seven, with oine being the lowest-level evaluation and seven being the highest
B. A standard set of security requirements for a specific type of product, such as firewall, IDS, or unified threat management (UTM)
C. An overview, provided by the vendor, of the product and products security features, an evaluation of potential security threats, and the vendors self-assessment detailing how the product conforms to the relevant protection profile
D. The vendor product to be examined against a specific profile by a third-party evaluation lab using a common evaluation methodology (CEM)
C. An overview, provided by the vendor, of the product and products security features, an evaluation of potential security threats, and the vendors self-assessment detailing how the product conforms to the relevant protection profile
Explanation:
The Security Target is a complete and rigorous description of a security problem in terms of target description, threats, assumptions, security objectives, security functional requirements, security assurance requirements, and rationales.