Learnzapp Flashcards

1
Q

Maintenance mode

A

Generation of new instances is prevented.

Alerting mechanisms are suspended.

Events are logged.

Admin access continues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Remember EU member states

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maintenance mode :

Live migration
snapshots

A

Live migration is the term used to describe the movement of functioning virtual instances from one physical host to another and how VMs are moved prior to maintenance on a physical device.

VMs are moved as image snapshots when they are transitioned from production to storage;

During live migration, the VM moves in unencrypted form.

Live migration goes over the network; portable media is not necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tunneling

A

Generic routing encapsulation (GRE) is a tunneling mechanism, specifically designed for the purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSH tunnelling includes the services

A

Remote login
Port forwarding
Command Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TLS

A

TLS is a session encryption tool that uses asymmetric encryption to create a symmetric session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which risk can make - cloud env unviable

A

VM Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NAS ( Network attached Storage)

SAN (Storage Area Network)

A

NAS: file server that provides data access to multiple, heterogeneous machines and users on the network

NAS is designed basically for file sharing across the network.

SAN :A SAN typically presents storage devices to users as attached/mounted drives.

SAN is designed to meet high-performance needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dynamic Host Configuration Protocol (DHCP) servers

A

provide the clients:
-A temp IP Address
- A default gateway
- Time server synchronization

Doesn’t provide - encryption protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data in transit ( Secure)

TLS
DNSSEC
IPSec

A
  • TLS

-DNSSEC:
Domain Name System Security Extensions (DNSSEC) protects data in transit by reducing the risk of DNS poisoning

-IPSEC - Transport Layer Security (TLS) and Internet Protocol Security (IPSec) reduce the risk of eavesdropping and interception of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OS Hardening

A

Remove default accounts
remove unnecessary services
Disallow local save of credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cloud storage cluster

A

A tightly coupled cloud storage cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSD

A

Solid-state disks (SSDs) are used in cloud computing today because they operate at high speeds as compared to traditional spinning drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IETF

IANA

ISO/IEC

A

The IETF is an international organization of network designers and architects who work together in establishing standards and protocols for the Internet.

IANA oversees global IP address allocation among other Internet tasks.

the ISO/IEC develops, maintains and promotes standards in information technology and information communication technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ONF : An Organization Normative Framework (ONF)

ANF - application normative frameworks (ANFs)

A

An Organization Normative Framework (ONF) is a framework of so-called containers of application security best practices catalogued and leveraged by the organization and contains at least one or more subcomponents known as application normative frameworks (ANFs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brewer-Nash (Chinese Wall)

A

Brewer-Nash was specifically created for managed services arrangements, where an administrator for a given customer might also have access to a competitor’s data/environment; the model requires that administrators not be assigned to competing customers. In the modern cloud provider model, a cloud data center administrator will almost definitely have access to many customers from the same industry (i.e., competitors) but probably won’t even know it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ports : DNS

A

DNS:53
google dns server 8.8.8.8.

DNSSEC : Adds digital signatures to DNS , Verify clients to check authenticity of DNS records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Ports

0 - 1023 - Wellknown ports
1024 - 49151 : registered ports
49152-65535 - dynamic ports

A

16bit binary numbers
2 power 16 values : 0 - 65,535

0 - 1023 - Wellknown ports
webservers - 80,
secure webserver - 443, mailservers

1024 - 49151 : registered ports
Microsoft reservers 1433 for sql server DB connection

Oracle server - 1521 for its own dbs

49152-65535 - dynamic ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Administrative Services - Ports

21: FTP
22: SSH
3389 - RDP
137,138,139 - Windows -NetBIOS
53: DNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mail services:

25 : SMTP
110: POP (Post office protocol_
143 : IMAP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Webservices:

80: HTTP
443: HTTPS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ICMP - Internet Control Message Protocol

  • PIng
    -traceroute

eg: traceroute -I linkedin.com

A

PIng - identifies live system
-traceroute - identifies network path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ICANN

A

IP Addresses scarce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Private IP Address ranges

A

10.0.0.1 - 10.255.255.255
172.16.0.1 - 172.31.255.255
192.168.0.1-192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
NAT ( Network address translation) NAT & Security PAT - Port address translation
PAT Allows mulitple systems to share the same public IP Address assigning unique ports to each communication
26
Subnetting : network, host
subdivides larget networks
27
Subnet mask
28
VLAN - Configuring VLANs
Enable VLAN Trunking Assign Switch ports to VLAN
29
Routers, switches, firewalls
30
DMZ, Bastion hosts
31
stateless firewalls , Stateful inspection firewall rule content NGFW ( Incorporate contextual information into their decision making)
firewall rule contents source, destination IP, Ports, action (allow , deny) implicit deny (default deny)
32
Firewall Role: NAT Gateway Content / URL Filtering Webapplication firewall
33
Network deployment options: -
1. Network hardware vs Host based software firewalls 2. Open source or proprietary 3.Hardware appliance vs Virtual Appliance
34
Network security groups
Serve as IaaS firewalls Maintaining network SG is customer's responsibility
35
VPN - Site to site , remote access VPN
36
VPN Endpoints
Firewalls Routers Servers VPN Concentrators
37
IPSec - Works at n/wk layer (layer3)
Works at n/wk layer (layer3) supports the layer 2 tunneling protocol provides secure transport difficult to configure
38
Full tunnel VPN, Split tunnel VPN
39
Always ON VPN (default)
40
IPS , IDS
41
IDS : False positives, false negative error
42
Signature detection systems / rule based detection systems
problem: fail to brand new attacks advantage: low false positive rate
43
Anomaly detection/ behaviour based detection/ heuristic detection systems (Same)
high false postiitve
44
IPS Deployment models In-band (inline) : device sits in the path of network commns out-of-band (passive) device connects to SPAN port on a switch
45
Zero trust networking IAM Platforms are the foundation of zero trust approaches
zero trust shifts the focus away from perimeter protection onto strong identity and access mgmt
46
SIEM SOAR
47
CASB
Enforce security policies in the cloud
48
EDR (Endpoint detection response) platforms
remediate endpoint security issues
49
Security baseline
baselines are generic they cover uncertain future
50
Accreditation Process
Initiation, security Certification, security Accreditation, continuous monitoring phase
51
SSH Tunneling
doesnt provide content filtering it provides remote log-on port forwarding command execution
52
Storage Clusters: Tightly coupled Loosely Coupled
storage devices are clustered in groups, providing increased performance, flexibility, and reliability.
53
Tightly coupled cluster
tightly coupled architecture also enhances performance a the tightly coupled cluster has a maximum capacity, whereas the loosely coupled cluster does not.
54
loosely coupled cluster,
A loosely coupled cluster, on the other hand, allows for greater flexibility.
55
DHCP - Dynamic host configuration protocol servers
provide the clinets - temp iP Address, default gateway, time server sync doesn't provide Encryption protocols
56
57
Domain 1:
58
Magnetic swipe cards
Data on Magnetic swipe cards is not usually encrypted
59
SOC reports
SOC reports are the audit reporting mechanisms dictated by SSAE 18. SOX is a federal law targeting publicly traded corporations in the United States. SSL is a way to conduct secure online transactions. SABSA is an architecture framework.
60
SSAE Report : SOC1 - Financial reporting SOC2- deals with CIA SOC3: attestation by the auditor
SOC1 - Financial reporting SOC2- deals with CIA SOC3: attestation by the auditor SOC 2 reports were not designed for dissemination outside the target organization
61
Statutory compliance
Statutory compliance refers to state and federal laws. They cannot force a customer to stay with a cloud provider.
62
CASB
provides services - Key escrow, single sign-on, IAM
63
*****Federal Express - Private company
Federal Express is a private company; only federal entities are required to comply with FedRAMP.
64
Elliptical curve cryptography (ECC)
Elliptical curve cryptography (ECC) uses algebraic elliptical curves that result in much smaller keys that can provide the same level of safety as much larger ones used in traditional key cryptography
65
******Virtual machine introspection (VMI)
Virtual machine introspection (VMI) is an agentless means of ensuring a VM's security baseline does not change over time by examining things such as physical address, network settings, and installed OS. These ensure that the baseline has not been inadvertently or maliciously tampered with.
66
Virtualization technologies - cloud computing
Virtualization technologies have been the driving force behind enabling cloud computing to become a real and scalable service due to the savings, sharing, and allocation of resources across multiple tenants and environments.
67
A demilitarized zone (DMZ)
A demilitarized zone (DMZ) isolates network elements that are public facing and would otherwise be vulnerable to attack.
68
Type 1 , Type 2 hypervisor
A Type 1 hypervisor uses a minimal piece of software to manage the underlying resources. A Type 2 hypervisor is a piece of software installed on top of or as part of a device's operating system.
69
A hybrid cloud
A hybrid cloud is a combination of two or more distinct cloud infrastructures that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
70
********Cloud migration
Cloud migration is the process of transitioning all or part of a company's data, applications, and services from onsite premises behind the firewall to the cloud. This enables information to be provided over the Internet on an on-demand basis.
71
Corporate governance
Corporate governance is defined as the relationship between shareholders and other stakeholders in the organization versus the senior management.
72
Auditability
Something is said to be auditable when it is in a state of readiness for auditing. Cloud providers are often required to maintain a state of auditability as a way of maintaining compliance
73
Cloud server hosting
Cloud server hosting is a type of hosting in which hosting services are available to customers on demand via the Internet as opposed to being provided by a single server or virtual server. In a cloud services model, multiple connected servers that a cloud server comprises provide the hosting environment.
74
Public key infrastructure (PKI)
Public key infrastructure (PKI) is a framework of programs, procedures, communication protocols, and public key cryptography that enables a diverse group of individuals to communicate securely.
75
Turnstiles egress monitoring encryption digital watermarking
Turnstiles are a physical security barrier to prevent piggybacking/tailgating (an unauthorized person coming through an entrance behind someone who is authorized), but they don’t really present much protection for intellectual property in this case. Egress monitoring (often referred to as “DLP” solutions) is a great way to reduce the likelihood of intellectual property leaving the owner’s control in an unexpected/unapproved manner. Likewise, strong encryption is useful in the cloud to reduce the impact of theft either from leakage to other cloud tenants or from insider threats (such as malicious admins in the employ of the cloud provider). Finally, digital watermarks aid protection of intellectual property by proving original ownership, which is essential for enforcing intellectual property rights (in the case of software design, mainly copyright protections).
76
PCI DSS CVV
PCI DSS requires that the CCV (or, sometimes, “CVV” for “card verification value”) only be used in the transaction, not stored. The data described in all the other options may be stored after the transaction is complete.
77
SSAE , AICPA
SSAE 18 is the current AICPA audit standard, as of 2018.
78
SABSA
SABSA is an IT architecture framework SABSA is a means of looking at security capabilities from a business perspective;
79
COBIT
COBIT is designed for all types of business, regardless of their purpose;
80
TOGAF
TOGAF is a means to incorporate security architecture with the overall business architecture;
81
ITIL
ITIL was specifically designed to address service delivery entities
82
NIST SP 800-53 - RMF
NIST SP 800-53 contains guidance for selecting security controls in accordance with the Risk Management Framework. NIST 800-53 is a standard, not a law,
83
SOX
SOX affects publicly traded corporations
84
SOC1
The SOC 1 report provides information about financial reporting mechanisms of the target only and is of little interest to the IT security professional, The SOC 1 audit report is not for security controls; it is for financial reporting controls.
85
The SOC 2, Type 2
The SOC 2, Type 2 report will provide details on IT security controls used by the target and how well those controls function.
86
The SOC 3 reporT
The SOC 3 report is only an attestation that the target was audited and that it passed the audit, without detail The SOC 3 report is an attestation that the target was audited and that it passed the audit, without detail; you could use the SOC 3 reports to quickly narrow down the list of possible providers by eliminating the ones without SOC 3s.
87
PCI DSS
Because PCI DSS is strictly voluntary, and the PCI Council is not a government body but a consortium of private interests, they cannot detain or imprison anyone. They can, however, assess fees, suspend processing privileges, and require more auditing, s
88
PCI Merchant levels
The PCI merchant levels are based on how many transactions a compliant entity engages in over the course of a year. Level 1: Merchants that process more than 6 million card transactions per year Level 2: Merchants that process between 1 million and 6 million card transactions per year Level 3: Merchants that process between 20,000 and 1 million card transactions per year Level 4: Merchants that process fewer than 20,000 card transactions per year
89
Merchant level 1
Merchant level 1 is for the merchants that engage in the most transactions per year (six million or more). It carries with it the requirement for the most comprehensive, detailed, and repeated security validation actions.
90
Federal Information Processing Standard (FIPS) 140-2 security levels for cryptographic module
The Federal Information Processing Standard (FIPS) Publication 140-2 defines four levels of security for cryptographic modules, with each level offering increasing physical protection: Level 1 The lowest level of security, requiring production-grade equipment and externally tested algorithms Level 2 Improves physical security with pick-resistant locks and role-based authentication Level 3 Provides a high probability of detecting and responding to physical access attempts, with physical tamper-resistance and identity-based authentication Level 4 The highest level of security, with tamper-active hardware that erases its contents if it detects changes in normal operating conditions
91
Evaluation Assurance Level (EAL)
The EAL is a measure of how thoroughly the security features the product vendor claims the product offers have been tested and reviewed, and by whom.
92
Common criteria certification of an IT Product - who pays - vendor
The vendor/manufacturer of a given product will pay to have it certified, with the premise that certification costs are offset by premium prices that certified products command and that customers won’t purchase uncertified products.
93
****NIST Publishes
NIST publishes the list of validated crypto modules. The other choices are government or non-government organizations that are not involved with publishing the list of cryptographic modules that meet FIPS 140-2 requirements.
94
HSM Certification
Vendors seeking HSM certification under FIPS 140-2 send their products to independent laboratories that have been validated as Cryptographic Module Testing Laboratories under the National Voluntary Laboratory Accreditation Program (the Accreditation Program is run by NIST, which approves the laboratories). As of this writing, 21 labs in the United States and Canada are accredited.
95
FIPS 140-2
FIPS 140-2 is only for SBU Sensitive but unclassified (SBU) data FIPS 140-2 is the federal standard for the accreditation and distinguishing of secure and well-architected cryptographic modules produced by private sector vendors who see to or are in the process of having their solutions and services certified by the US government departments and regulated industries that collect, store, transfer, or share data that is deemed to be sensitive but not classified.
96
broken authentication and session management - risk reduce
method for reducing the risk of broken authentication and session management Do not use custom authentication schemes.
97
OWASP Top 10: insecure direct object references
Check access each time a direct object reference is called by an untrusted source.
98
OWASP Top 10: Injection
attacker trying to do with an injection attack: Trick the application into running commands.
99
OWASP Top 10:broken authentication and session management
reduce risk by: Do not use custom authentication schemes.
100
OWASP Top 10 : cross-site scripting (XSS) attacks
HTML escape all HTML attributes.
101
OWASP Top 10 : cross-site request forgery” (CSRF)
Remediation: Ensure that all HTTP resource requests include a unique, unpredictable token.
102
OWASP Top 10 : Security misconfiguration
Example: Having unpatched software in the production environment technique to reduce: Perform periodic scans and audits of the environment. Follow a published, known industry standard for baseline configurations. A repeatable patching process that includes updating libraries as well as software
103
OWASP Top 10 : missing function level access control
reduce by: Set the default to deny all access to functions, and require authentication/authorization for each access request.
104
OWASP Top 10 : using components with known vulnerabilities.
Remediation: Update to current versions of component libraries as soon as possible. Review all updates/lists/notifications for components your organization uses.
105
OWASP Top 10 : sensitive data exposure.
techniques to reduce : Destroying sensitive data as soon as possible Using proper key management when encrypting sensitive data Disabling autocomplete on forms that collect sensitive data Extensive user training on proper data handling techniques
106
Why org uses : using components with known vulnerabilities.
The particular vulnerabilities exist only in a context not being used by developers.
107
OWASP Top 10 : unvalidated redirects and forwards
Train users to recognize invalidated links. Don’t use redirects/forwards in your applications.
108
Redirects and Forwards
A forward is a situation when instead of an external URL, your website or web application causes the browser to go to different parts of the site. Redirects and forwards are technically identical, the only difference is the type of destination: external URLs vs. internal pages.
109
Lightweight Directory Access Protocol (LDAP)
LDAP is used in constructing and maintaining centralized directory services, which are vital in all aspects of IAM
110
Privileged user account access
Privileged users should have privileged access to specific systems/data only for the duration necessary to perform their administrative function; any longer incurs more risk than value
111
The Cloud Security Alliance (CSA) - Data Breach
The CSA points out that data breaches come from a variety of sources, including both internal personnel and external actors
112
Service traffic hijacking
Service traffic hijacking can affect all portions of the CIA triad.
113
Distributed denial of service (DDoS)
Denial-of-service attacks staged from multiple machines against a specific target is the definition of a DDoS.
114
Incidents versus Events
Events are anything that can occur in the IT environment, whereas incidents are unscheduled events.
115
PIPEDA - Canada
The Personal Information Protection and Electronic Documents Act (PIPEDA) is a Canadian law governing protection of personal information.
116
FIPS 140-2
The Federal Information Processing Standard (FIPS) 140-2 standard certifies cryptologic components for use by American federal government entities
117
HIPAA
The Health Information Portability and Accountability Act (HIPAA) is an American law regulating patient information for medical providers
118
The cross-certification model
The cross-certification model of federated identity requires all participants to review and confirm all the others
119
Community Cloud
The community cloud is defined by its joint ownership of assets among a member group.
120
A private cloud - Very sensitive assets.
A private cloud is the best option for work in highly regulated industries or industries that involve very sensitive assets.
121
A private cloud - European personal data privacy laws
European appliance rental company Because of European personal data privacy laws, it is extremely important for your company to be sure that the data does not leave the borders of a country approved to handle such data. A private cloud model is the best means for your company to be sure that the data is processed in a data center residing in a particular geophysical location.
122
Big data
Big data refers to extremely large data sets used to determine patterns and trends such as purchasing or travel trends of large groups of people.
123
Portability
Portability is the term used to describe the ease with which a customer can move from one cloud provider to another; the higher the portability, the less chance for vendor lock-in.
124
A cloud reseller
A cloud reseller is a firm that contracts with both cloud providers and customers in order to arrange custom services. The cloud computing reseller purchases hosting services and then resells them.
125
Cloud carrier
Cloud carrier is a term describing the intermediary between cloud customer and provider that delivers connectivity; this is typically an ISP.
126
Cash flow at Risk (CFaR)
when the amount of cash you receive from your operations is less than all expenditures and bills from the sales
127
X.509
X.509 is the certificate standard for communicating public key information.
128
Encryption in cloud computing
Storage, Remote access, Secure sessions The data on magnetic swipe cards isn't usually encrypted.
129
Erasure Coding
Erasure coding is the practice of having sufficient data to replace a lost chunk in data dispersion, protecting against the possibility of a device failing while it holds a given chunk; parity bits serve the same purpose in a traditional RAID configuration
130
Egress Monitoring Solutions
EMS resides on client machines Discovers data assets according to classification/categorization Egress monitoring solutions (often referred to as DLP tools, where DLP stands for data loss protection or data leak prevention, or some combination of these terms) will often include an agent that resides on client devices in order to inspect data being shared/sent by end users. E-discovery/forensics Data exfiltration Data categorization/classification
131
DRM Solutions
DRM is mainly designed to protect intellectual property. It can also sometimes be used for securing PII, but intellectual property is a better answer here. DRM is often deployed to ensure that copyrighted material (frequently software) is only delivered to and used by licensed recipients.
132
Homomorphic encryption
experimental technology that might lead to the possibility of processing encrypted data without having to decrypt it first
133
International traffic in arms regulations (ITAR)
International traffic in arms regulations (ITAR) is a Department of State program The International Traffic in Arms Regulations (ITAR) are a set of U.S. government regulations that control the export of defense articles and services. The ITAR are administered by the U.S. Department of State's Directorate of Defense Trade Controls (DDTC).
134
Export administration regulations (EAR)
The Export Administration Regulations (EAR) govern the export and re-export of some commodities, software and technology.
135
ITAR versus EAR
EAR focuses on dual-use items, while ITAR targets defense-related items. Export administration regulations (EAR) is a Commerce Department program International traffic in arms regulations (ITAR) is a Department of State program.
136
A content delivery network (CDN)
A content delivery network (CDN) is a service that distributes data.
137
Data dispersion versus RAID Scalable cloud hosting
Data dispersion uses parity bits, data chunks, and encryption. Data dispersion uses chunks of data, erasure coding, and encryption. Parity bits and disk striping are characteristic of RAID implementations Cloud-bursting is a feature of scalable cloud hosting
138
Copyright
Copyrights are designed to protect tangible expressions of creative works, like books, articles, music, and so on Copyrights are protected tangible expressions of creative works.
139
Trademark
Logos and symbols and phrases and color schemes that describe brands are trademarks.
140
Tradesecrets
Confidential recipes unique to the organization are trade secrets. Confidential sales and marketing materials unique to the organization are trade secrets.
141
Patents
Patents protect processes (as well as inventions, new plantlife, and decorative patterns).
142
Personal cloud storage
Personal cloud storage is the storage of a single user's data in the cloud, allowing them access from anywhere on the Internet.
143
Volume Storage
Volume storage consists of volumes that are attached to virtual storage and act or behave just like a physical drive or array.
144
Secret sharing made short (SSMS) -- Bit splitting
SSMS is a method of bit splitting that uses the three phases: encryption, using an information dispersal algorithm, and splitting the encryption key using the secret sharing algorithm. The fragments are signed and distributed to different cloud storage services, making it difficult to decrypt without both arbitrarily chosen data and encryption key fragments.
145
Information rights management (IRM)
Information rights management (IRM) is a means to prevent unauthorized copying and limitation of distribution to only those who pay for content.
146
crypto-shredding
In crypto-shredding, the purpose is to make the data unrecoverable; saving a backup of the keys would attenuate that outcome because the keys would still exist for the purpose of recovering data. All other steps outline the crypto-shredding process.
147
Data dispersion - chunking/sharding RAID - Striping
Data dispersion is basically RAID in the cloud, with data elements parsed and stored over several areas/devices instead of stored as a unit in a single place. RAID (and data dispersion) does aid in BC/DR activities by increasing the robustness and resiliency of stored data, but BC/DR is a much more general discipline, so it is not the optimum answer for the question. SDN is used for abstracting network control commands away from production data, and CDN is usually used for ensuring quality of streaming media. Where RAID used data striping across multiple drives, with data dispersion this technique is referred to as “chunking,” or sometimes “sharding” when encryption is also used.
148
DRM Solution characteristics
Mapping to existing access control lists (ACLs) is the trait that allows DRM tools to provide additional access control protections for the organization’s assets. The other options are not characteristics associated with DRM solutions. Continuous audit trail is the trait that allows DRM tools to log and exhibit all access to a given object. The other options are not characteristics associated with DRM solutions. Automatic expiration is the trait that allows DRM tools to prevent access to objects when a license expires or to remove protections when intellectual property moves into the public domain. The other options are not characteristics associated with DRM solutions. Persistence is the trait that allows DRM protection to follow protected files wherever they might be stored/copied. The other options are not characteristics associated with DRM solutions.
149
Transparent encryption
Encrypting specific tables within the database is one of the options of transparent encryption;
150
Application-level encryption - database encryption techniques makes it difficult to perform database functions (searches, indexing, etc.
Application-level encryption involves encrypting the data before it enters the fields of the database; it is much more difficult to search and review data that has been encrypted, so this reduces the functionality of the database.
151
Event monitoring tools - SIEM SIM, SEM detect external hacking predict system outages Optimizing performance Detecting ambient heating, ventilation, and air-conditioning (HVAC) problems
Event monitoring tools can help detect external hacking efforts by tracking and reporting on common hack-related activity, such as repeated failed login attempts and scanning. Event monitoring tools can be used to predict system outages by noting decreases in performance; repeated performance issues can be an indicator a device is failing. Event monitoring tools can detect repeated performance issues, which can be used by administrators and architects to enhance performance/productivity. Event monitoring tools can detect repeated performance issues, which can be indicative of improper temperature settings in the data center; also, some system monitoring metrics, such as CPU temperature, can directly indicate inadequate HVAC performance Detecting ambient heating, ventilation, and air-conditioning (HVAC) problems Incident evidence
152
Digital Millennium Copyright Act (DMCA)
The DMCA deals with intellectual property and not specifically with personal privacy. It is not included in the CSA CCM.
153
DRM requires that every data resource be provisioned with ....An access policy
For DRM to work properly, each resource needs to be outfitted with an access policy so that only authorized entities may make use of that resource
154
Crypto-shredding
The proper procedure for crypto-shredding requires two cryptosystems: one to encrypt the target data, the other to encrypt the resulting data encryption keys. All the other answers are incorrect.
155
Code Signing
Digitally signing software code is an excellent method for determining original ownership and has proven effective in major intellectual property rights disputes.
156
Copyright Civil Court
Enforcement of copyright is usually a tortious civil action, as a conflict between private parties.
157
Homomorphic encryption
heoretical technique would allow encrypted data to be manipulated without decrypting it first
158
Quantum computing
theoretical technology would allow superposition of physical states to increase both computing capacity and encryption keyspace?
159
DLP / DRM
Every additional security measure might reduce a potential threat but definitely will reduce productivity and quality of service. There is always an overhead cost of security DLP tools can function better if appropriate and accurate classification and labeling is applied throughout the environment and done on a consistent basis.
160
161
Risk
A vulnerability combined with a specific threat is defined as a risk.
162
Business impact analysis (BIA)
Business impact analysis (BIA) is designed to identify and ascertain the value of assets in addition to the critical paths and processes.
163
Mean time to repair (MTTR)
Mean time to repair (MTTR) is the time required to repair a device that has failed or is in need of repair. The term mean indicates the average time as opposed to the actual or past experiences.
164
annual loss expectancy (ALE)
The term that best describes the amount an organization should expect to lose on an annual basis due to one type of incident is annual loss expectancy (ALE) and is calculated by multiplying the annual rate of occurrence (ARO) by the single loss expectancy (SLE).
165
Heating, ventilation, and air-conditioning (HVAC)
Heating, ventilation, and air-conditioning (HVAC) systems separate the cool air from the heat caused by servers. They provide air management including racks with built-in ventilation or alternate cold/hot aisles.
166
Hot aisle containment
The backs of the devices face each other and the ambient temperature in the work area is cool, it is called
167
Cold aisle containment
Cold aisle containment is a configuration where the fronts of devices face each other.
168
Recovery point objective (RPO)
Recovery point objective (RPO) is a term used in BC and DR describing the tolerable amount of data that might be lost due to an outage before severe consequences are experienced.
169
The maximum tolerable downtime/maximum allowable downtime (MTD/MAD)
The maximum tolerable downtime/maximum allowable downtime (MTD/MAD) is a point in time after an outage has occurred and beyond which recovery becomes extremely difficult or impossible.
170
SDN
SDN is the idea of separating the network control plane from the actual network forwarding plane. This allows for greater control over networking capabilities and for integration of such things as APIs. a means to centralize logical control of all networked nodes in the environment, abstracted from the physical connections to each
171
In software-defined networking (SDN), the northbound interface (NBI)
The NBI usually handles traffic between the SDN controllers and SDN applications.
172
Single sign-on (SSO) federation
Single sign-on (SSO) is similar to federation, but it is limited to a single organization; federation is basically SSO across multiple organizations.
173
Cross-certification
The cross-certification federation model is also known as a web of trust.
174
liquid propane
Liquid propane does not spoil, which obviates necessity for continually refreshing and restocking it and might make it more cost-effective
175
UPS
The UPS is intended to last only long enough to save production data currently being processed. The exact quantity of time will depend on many variables and will differ from one datacenter to the next.
176
Line conditioning
A UPS can provide line conditioning, adjusting power so that it is optimized for the devices it serves and smoothing any power fluctuations; it does not offer any of the other listed functions.
177
Mobile cloud storage
Mobile cloud storage is defined as a form of cloud storage that applies to storing an individual's mobile device data in the cloud and providing the individual with access to the data from anywhere
178
The purpose of the transfer switch
The purpose of the transfer switch is to redirect power consumption from utility power to generator power; this should be done fast enough to ensure power is available when the batteries fail.
179
controls
Controls are mechanisms designed to restrict a list of possible actions down to allowed or permitted actions.
180
Security Assertion Markup Language (SAML)
Security Assertion Markup Language (SAML) is based on XML. HTTP is used for port 80 web traffic; HTML is used to present web pages
181
Ping, Power, Pipe
Remote access for customer to racked devices in the data center; electrical utilities; connectivity to an Internet service provider (ISP)/the Internet
182
Cloud Carrier
The ISP between the cloud customer and provider
183
Challenge of operating in the cloud is that additional controls must be placed on file storage systems
VMs are snapshotted and simply stored as files when they are not being used; an attacker who gains access to those file stores could ostensibly steal entire machines in highly portable, easily copied formats. Therefore, these cloud storage spaces must include a significant amount of controls.
184
Object storage
Snapshotted VM images are usually kept in object storage, as files.
185
Host escape
the situation when a malicious user or attacker can exit the restrictions of a single host and access other nodes on the network
186
Guest Escape
the situation when a malicious user or attacker can exit the restrictions of a virtual machine (VM) and access another VM residing on the same host
187
automation of configuration helps
A secure baseline configuration, applied and maintained automatically, ensures the optimum security footprint with the least attack surface.
188
cross-certification federation model web of trust - federation model
The cross-certification federation model is also known as a web of trust. In a web of trust federation model, all of the participating organizations are identity providers; each organization will assign identity credentials to its own authorized users, and all the other organizations in the federation will accept those credentials. service providers : each organisation identity provider : each organisation
189
Proxy federation model
In the proxy federation model, the third party acts on behalf of the member organizations, reviewing each to ensure that they are all acceptable to the others
190
cloud data center audit - Challenges
Cloud providers may be reluctant to grant physical access, even to their customers, on the assumption that allowing access would disclose information about security controls. In some cases, cloud customers won’t even know the location(s) of the data center(s) where their data is stored a cloud audit will depend on which information a cloud provider discloses, which makes auditing difficult and less trustworthy They frequently rely on third parties: Because cloud audits are often the result of third-party assertions, recipients of cloud audit reports may be more skeptical of the results than they would have been of traditional audits, in which the recipients may have performed firsthand.
191
controls would be useful to build into a virtual machine baseline image for a cloud environment
Automated vulnerability scan on system startup Automatic registration with the configuration management system
192
Having your BC/DR backup stored with the same cloud provider as your production environment can help in
Having the backup within the same environment can allow easy rollback to a last known good state or to reinstantiate clean VM images after minor incidents (e.g., a malware infection in certain VMs).
193
The BC/DR plan/policy ( need not include)
you don’t need to include full copies of these governance documents include: Tasking for the office responsible for maintaining/enforcing the plan Contact information for essential entities, including BC/DR personnel and emergency services agencies Checklists for BC/DR personnel to follow
194
Opportunity ...Risk
Risk should always be considered from a business perspective. Risk is often balanced by corresponding oppurtunity
195
new risk in the cloud, not affecting the traditional, on-premise environment
Legal seizure of another firm’s assets Resource exhaustion Multitenancy
196
Inference Attacks
While it is possible that one guest VM seeing the resource calls of another VM could possibly allow one guest to see the other’s data, it’s much more likely that a user seeing another user’s use of resources, rather than raw data, would allow the viewer to infer something about the victim’s behavior/usage/assets.
197
ENISA --IAM
According to ENISA, custom IAM builds can become weak if not properly implemented.
198
Credential revocation
Revoking credentials that might be lost when a device goes missing is a way to mitigate the possibility of those credentials being used by an unauthorized person.
199
RTO , MAD
The RTO must always be less than the MAD. The RTO is the measure of time after an interruption at which the company needs to resume critical functions; any service migration must take place within that time. RTOs vary for every organization; there is no set answer for all organizations. Options A and B might be correct for a given organization but incorrect in the general case because it’s impossible to know an organization’s RTO without knowing more about the organization. The RTO is the measure of time after an interruption at which the company needs to resume critical functions; any service migration must take place within that time.
200
Social engineering - Pen testing
Cloud providers will probably not allow ____________social engineering_______ as part of a customer’s penetration test.
201
pen test, prosecution
A cloud customer performing a penetration test without the provider’s permission is risking ... Prosecution A penetration test requires the tester to analyze the security of an environment from the perspective of an attacker; this also includes actually taking action that would result in breaching that environment.
202
security controls, VM
Security controls operating on a guest VM OS are only active while the VM is active; when the VM is stored, it is snapshotted and saved as a file, so those controls won’t be active either.
203
Which of the following is a risk in the cloud environment that does not exist or is not as prevalent in the traditional environment
Legal liability in multiple jurisdictions Loss of availability due to DDoS
204
A virtual network interface card (NIC)
The virtualized NIC is part of the Data-Link layer.
205
CDN, SaaS
CDNs are often used in conjunction with SaaS services to deliver high-quality data of large sizes (often multimedia).
206
FM-200
FM-200 is used as a replacement for older Halon systems specifically because it (unlike Halon) does not deplete the ozone layer.
207
Converged networking model
Optimized for cloud deployments, the converged networking model combines the underlying storage and IP networks to maximize the benefits of a cloud workload.
208
DR Sites - Hot, cold, warm
Hot site: A fully functional data center that's usually kept ready around the clock. It's a near duplicate of an organization's primary site, with complete backups of user data and full computer systems. Hot sites are the most expensive option and are best for businesses with zero tolerance for downtime and data loss Warm site: A data center that's equipped with some or all of the hardware, software, and network services found in a working data center, but doesn't have live data. Warm sites are a good option for businesses with a lower budget and a need for flexible and fast recovery Cold site: An empty operational space with basic facilities like air conditioning, power, and communication lines. Cold sites have no or little equipment or hardware, and no network connectivity or data synchronization. Before a cold site can be used, backup data and additional hardware must be sent to the site and installed.
209
CDN - handles DDoS attacks
A content delivery network (CDN) run by a major provider can handle large-scale DDoS attacks more easily than any of the other solutions. Using DDoS mitigation techniques via an ISP is the next most useful capability, followed by both increases in bandwidth and increases in the number of servers in the web application cluster.
210
packet capture , most accurate reconstruction of user activity
full packet capture provides the most accurate reconstruction of user activity, but it is costly to implement due to data storage requirements.
211
2 different cloud providers - most significant risk one cloud provider for your operational environment and another for BC/DR backup/archive?
When using two different cloud providers, a cloud customer runs the risk that data/software formats used in the operational environment can't be readily adapted to the other provider's service, thus causing delays during an actual failover.
212
Organizational Normative Framework (ONF)
A framework of containers for all components of application security, best practices, catalogued and leveraged by the organization
213
APIs
A set of routines, standards, protocols, and tools for building software applications to access a web based software application or tool
214
ONF - ANF
there is a one-to-many ratio of Organizational Normative Framework (ONF) to Application normative framework (ANF); each organization has one Organizational Normative Framework (ONF) and many ANFs (one for each application in the organization). Therefore, the Application normative framework (ANF) is a subset of the Organizational Normative Framework (ONF).
215
SAML
A standard for exchanging authentication and authorization data between security domains
216
the purpose and scope of International Organization for Standardization (ISO)/International electrotechnical commission (IEC) 27034 1
Provides an overview of application security that introduces definitive concepts, principles, and processes involved in application security
217
Database activity monitoring (DAM) can be
Host based or network based A DAM can recognize and block malicious SQL traffic.
218
WAF - Layer 7
WAFs operate at Layer 7 of the OSI model.
219
DAST Fuzz testing
Test performed on an application or software product while it is being executed in memory in an operating system. Also called fuzz testing, dynamic testing methods should include known bad inputs in order to determine how the program will handle the “wrong” data (will it fail into a state that is less secure than normal operations, etc.).
220
Sandbox
A test environment that isolates untrusted code changes for testing in a nonproduction environment Sandboxing is often used for testing applications in development or carving out resources that cannot then touch other parts of the same system. A sandbox can be used to run malware for analysis purposes as it won’t affect (or infect) the production environment; it’s worth noting, though, that some malware is sandbox-aware, so additional antimalware measures are advisable.
221
three types of training
Initial, Recurring, Refresher
222
Federation
Federation is an arrangement that can be made among multiple enterprises allowing them to use the same identification data to obtain access to all enterprises' resources within the group.
223
REST
Representational State Transfer (REST) relies on stateless, client-server, cacheable communications. It is a software architecture consisting of guidelines and best practices for creating scalable web services.
224
OpenID
OpenID is one form of authentication used to enable SSO and enables the user to log into more than one application or website using the same credentials.
225
Return on investment (ROI)
Return on investment (ROI) is a term used to describe a profitability ratio. It is generally calculated by dividing net profit by net assets.
226
A cross-site scripting (XSS)
A cross-site scripting (XSS) attack occurs when an application receives untrusted data and then sends it to a web browser without proper validation, allowing an attacker to execute scripts in the user's browser, hijack sessions, or engage in other malicious behavior. reduce techniques: Put untrusted data in only allowed slots of HTML documents. HTML escape when including untrusted data in any HTML elements. Use the attribute escape when including untrusted data in attribute elements. Use an auto-escaping template system. HTML escape JSON values in an HTML context and read the data with JSON.parse. Sanitize HTML markup with a library designed for the purpose.
227
Layer 7
API Gateway Database WAF
228
Process isolation
Process isolation can reduce the possibility of side-channel attacks in an environment with shared resources.
229
ISO 27034 mandates a framework for application security within an organization
Organizational Normative Framework (ONF), Application Normative Framework (ANF)
230
RESTful responses can come from the server
Extensible Markup Language (XML), JavaScript Open Notation (JSON)
231
Data owners
The data owner is responsible for the disposition of the data under their control; this includes access decisions.
232
Forklifting
an informal industry term for moving applications from a traditional environment into the cloud
233
Cloud migration
Cloud migration is the process of transitioning all or part of a company's data, applications, and services from onsite premises behind the firewall to the cloud. This enables information to be provided over the Internet on an on-demand basis.
234
OpenID Connect
OpenID Connect is a federation protocol that uses representational state transfer (REST) and JavaScript Object Notation (JSON); it was specifically designed with mobile apps in mind, instead of only web-based federation. WS-Federation is a federation protocol that is part of the WS-Security family of standards and reliant on Simple Object Access Protocol (SOAP)
235
federated protocols : OAuth2 OpenID SAML
open federated protocols like SAML, OAuth 2.0, and OpenID Connect.
236
multifactor authentication
For high-risk operations and data that is particularly sensitive
237
The XML gateway
Which security tool can perform content inspection of Secure File Transfer Protocol (SFTP) communications? The XML gateway can provide this functionality"; it acts as a reverse proxy and can perform content inspection on many traffic protocols.
238
Application virtualization can typically be used for
Running an application on an endpoint without installing it Running an application in a non-native environment
239
TLS
TLS maintains the confidentiality and integrity of communications, often between a web browser and a server. TLS uses symmetric key crypto for each communications session in order to secure the connection; the session key is uniquely generated each time a new connection is made
240
Vulnerability scans vulnerability signatures
Vulnerability scans use signatures of known vulnerabilities to detect and report those vulnerabilities.
241
DAST : SAST:
DAST:Path coverage SAST: Code coverage
242
Tokenization
Compliance with the Payment Card Industry Data Security Standard (PCI DSS) By offloading privacy data to a tokenizing third party, merchants can free themselves of the contractual burdens for protecting cardholder data at rest.
243
A cloud-based sandbox should not be used for _ƒISO
Installing malware on systems owned by someone else may be illegal in many jurisdictions. While on-premises sandboxes are fine for this purpose, it may be a felony if performed in the cloud.
244
ISO 27034
ISO 27034 addresses the sets of controls used in software throughout the environment.
245
Open source open source review
Open source software includes programs where customers (or even the public) can view the software’s source code. Open source review can detect flaws /programming defects that a structured testing method might not.
246
247
REST
REST calls web resources by using uniform resource identifiers (URIs).
248
The Agile method
The Agile method reduces the dependence and importance of documentation in favor of functioning software versions.
249
Threat modelling STRIDE DREAD ATASM PASTA
Threat modeling (e.g., Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE), Disaster, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD), Architecture, Threats, Attack Surfaces, and Mitigations (ATASM), Process for Attack Simulation and Threat Analysis (PASTA))
250
Overview of the CSA STAR framework
The STAR program's open certification framework contains three levels: self-assessment (Level 1), third-party audit (Level 2), and continuous auditing (Level 3).
251
252
Which of the following SOC report subtypes represents a point in time - Type 1 Which of the following SOC report subtypes spans a period of time?
An SOC Type I report is designed around a specific point in time as opposed to a report of effectiveness over a period of time. An SOC Type II report is designed around a period of time as opposed to a specific point in time.
253
The doctrine of the proper law
The doctrine of the proper law refers to how jurisdictional disputes are settled.
254
The silver platter doctrine
The silver platter doctrine allows law enforcement entities to use material presented voluntarily by the owner as evidence in the prosecution of crimes, without a warrant or a court order.
255
The doctrine of plain view
The doctrine of plain view allows law enforcement to act on probable cause when evidence of a crime is within their presence
256
The Restatement (Second) Conflict of Law
The Restatement (Second) Conflict of Law is the basis used for determining which laws are most appropriate in a situation where conflicting laws exist.
257
The Stored Communication Act (SCA)
The Stored Communication Act, passed in 1995, is old, in bad need of updating, and unclear with regard to newer technologies.
258
KRI stands for key risk indicator.
KRI stands for key risk indicator. KRIs are the red flags if you will in the world of risk management. When these change, they indicate something is amiss and should be looked at quickly to determine if the change is minor or indicative of something important.
259
International Organization for Standardization (ISO) 31000:2009 design implementation and management
International Organization for Standardization (ISO) 31000:2009 specifically focuses on design implementation and management
260
International Organization for Standardization (ISO) 27017 cloud specific security controls
International Organization for Standardization (ISO) 27017 is about cloud specific security controls
261
ISO 27050 - eDiscovery
is an industry standard that provides guidance for eDiscovery programs.
262
263
National Institute of Standards and Technology (NIST) 800-92 Log management
National Institute of Standards and Technology (NIST) 800-92 is about log management,
264
ENISA - the top 8 security risks based on likelihood and impact.
European Union Agency for Network and Information Security (ENISA) specifically identifies the top 8 security risks based on likelihood and impact. European Union Agency for Network and Information Security (ENISA) identifies 35 types of risks organizations should consider but goes further by identifying the top eight security risks based on likelihood and impact.
265
International Organization for Standardization (ISO)/International electrotechnical commission (IEC) 28000:2007
to addressing security risks in a supply chain
266
International Organization for Standardization (ISO) 31000:2009
International Organization for Standardization (ISO) 31000:2009 is an international standard that focuses on designing, implementing, and reviewing risk management processes and practices
267
National Institute of Standards and Technology (NIST) SP 800-37
National Institute of Standards and Technology (NIST) SP 800-37 is the Guide for Implementing the Risk Management Framework (RMF), a methodology for handling all organizational risk in a holistic, comprehensive, and continual manner.
268
KPIs, KRIs
Key risk indicators (KRIs) try to predict future risk, while key performance indicators (KPIs) examine events that have already happened. The other answers are just distractors.
269
Cloud Security Alliance Cloud Controls Matrix (CCM)
An inventory of cloud service security controls that are arranged into separate security domains
270
The acceptable use policy (AUP)
The acceptable use policy (AUP) is designed to make clear to employees what is acceptable as well as unacceptable use of company-owned computing equipment and data such as email.
271
ISO 20000-1
ISO 20000-1 describes service management. ISO 27001 describes an information security management system. ITIL is not an ISO standard, nor is COBIT—in fact, they're their own standards.
272
ISO 27001
ISO 27001 describes an information security management system (ISMS) as a set of interrelated elements that organizations use to manage and control information security risks to protect and preserve the confidentiality, integrity, and availability of information.
273
ISO/IEC 27037:2012
ISO standard for collecting, preserving, and identifying electronic evidence.
274
The Cloud Security Alliance (CSA)
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.
275
ISO - Common criteria
ISO publishes and maintains the Common Criteria program.
276
The Diffie-Hellman RADIUS TACACS
The Diffie-Hellman key exchange process is designed to allow two parties to create a shared secret (symmetric key) over an untrusted medium RADIUS is an outmoded access control service for remote users. RSA is an encryption scheme. TACACS is a network access protocol set used through a centralized server.
277
The Organisation for Economic Cooperation and Development (OECD) Characteristics of OECD : The collection limitation principle The data quality principle Purpose specification principle The use limitation principle The security safeguards principle The openness principle
The collection limitation principle requires any entity that gathers personally identifiable information (PII) about a person to restrict data collection to only information that is necessary for the transaction, and only with the knowledge and permission of the individual. The data quality principle requires any entity that gathers personally identifiable information (PII) about a person to ensure that the data remains valid and accurate and allows for corrections by the data subject The purpose specification principle requires any entity that gathers personally identifiable information (PII) about a person to clearly state the explicit purpose for which the PII will be used. The use limitation principle requires any entity that gathers personally identifiable information (PII) about a person to restrict the use of that PII to that which was permitted by the data subject and the reason given when it was collected. The security safeguards principle requires any entity that gathers personally identifiable information (PII) about a person to protect that data against unauthorized access and modification The openness principle requires any entity that gathers personally identifiable information (PII) about a person to allow that person to access the information.
278
The Privacy Shield program is
Voluntary for non–European Union (EU) entities
279
Department of Commerce
The Department of Commerce manages the Privacy Shield program in the United States; the Departments of State and Interior do not. There is no Department of Trade.
280
ISO 27001 , 27002 NIST SP 800-53 - NIST SP 800- 37
The 27002 standard contains sets of controls to be used in order to allow the organization to match the security program created for the organization with 27001 NIST SP 800-53 allows the organization to craft a set of controls to meet the requirements created for and by the organization when using NIST SP 800-37
281
The EuroCloud Star Audit (ECSA) program
282
The silver platter doctrine
The silver platter doctrine allows law enforcement entities to use material presented voluntarily by the owner as evidence in the prosecution of crimes, without a warrant or a court order.
283
File hashes
File hashes can serve as integrity checks for both configuration management (to determine which systems are not configured to the baseline) and audit purposes (as artifacts/common builds of systems for audit review).
284
The Reporting phase of forensic investigation -- The court
The Reporting phase of forensic investigation usually involves presenting findings to
285
Federal Trade Commission (FTC)
The FTC is in charge of the Privacy Shield program.
286
The Capability Maturity Model (CMM)
The CMM is a way of determining a target’s maturity in terms of process documentation and repeatability
287
How many controls are listed in the PCI DSS - over 200
The PCI DSS is extremely thorough and wide reaching. Merchants at different tiers are required to have more or fewer audits in the same time frame as merchants in other tiers, depending on the tier. All PCI DSS–compliant merchants must meet all the control and audit requirements of the standard;
288
Patent , copyright trade mark validity trade secret
patent : 20 years copy right : life of the author + 70 years then Copyrights expire after a certain duration and then fall into the public domain, where they can be used by anyone for any purpose. This material certainly exceeds the time of any copyright protection. trademark: 10 years from the date of registration, with a potentially unlimited number of 10-year renewal terms. renew it with the U.S. Patent and Trademark Office (USPTO) trade secrets: Unlike patents, which typically have a shelf life of twenty years, trade secrets last indefinitely. Trade secrets last as long as the secret can be kept
289
ISO 31000, NIST 800-37 - RMF (Risk management frameworks)
Both ISO 31000 and National Institute of Standards and Technology (NIST) 800-37 are risk management frameworks.
290
The Cloud Security Alliance - CSA
The Cloud Security Alliance is a volunteer organization that includes members from various industries and sectors and is focused on cloud computing. It relies largely on member participation for developing standards
291
Cloud Security Alliance Cloud Controls Matrix (CSA CCM) - TOOL
The Cloud Controls Matrix is an excellent tool for determining completeness and possible replication of security controls.
292
Civil Suit
Intellectual property disputes are usually settled in civil court, as a conflict among private parties.
293
Trademark protection
Trademark protection is provided to those who apply for it, to either a state or federal trademark registration body. In the case of conflicting usage (or infringement), courts will take many criteria into account, including which party has first claim on the trademark (that is, who used it the longest), the location(s) where the trademark is used, the possibility for confusion among customers, and so forth. But for a specific location and specific business purpose, the deciding element will probably be which party first registered the trademark in question.
294
which elements are appropriate to include in a service-level agreement (SLA)
SLA elements should be objective, numeric values, for repeated activity. Eg: The specific amount of data that can be uploaded to the cloud environment in any given month
295
Criminal law
Criminal law is set out in rules and statutes created by a government, prohibiting certain activities as a means of protecting the safety and well-being of its citizens. Violations generally consist of both monetary and/or loss of liberty punishments.
296
Tort law
Tort law refers the body of laws that provide remedies to individuals who have been caused harm by unreasonable acts of others. Negligence is the most common type of tort lawsuit.
297
Spoliation
Spoliation is the term used to describe the destruction of potential evidence (intentionally or otherwise); in various jurisdictions, it can be a crime, or the grounds for another lawsuit.
298
The Digital Millennium Copyright Act (DMCA)
The DMCA criminalizes the production or dissemination of technology, devices, or services intended to circumvent copyright techniques used to protect digital media such as video and audio recordings; this includes some decryption tools.
299
Discovery tool
Typically, a discovery tool is a primary component of a DLP solution. This might be employed for purposes of identifying and collecting pertinent data
300
Contracts
Contracts are agreements between parties to exchange goods and services
301
Extradition
legal practice of removing a suspect from one jurisdiction to another in order for the suspect to face prosecution for violating laws in the latter
302
International Organization for Standardization (ISO) 31000:2009
focuses on design implementation and management.
303
The Privacy Shield program is
Voluntary for non–European Union (EU) entities
304
The AICPA, the OECD, and the EU GDPR have all outlined certain basic expectations
The AICPA, the OECD, and the EU have all outlined certain basic expectations for entities that are privacy data controllers; these expectations are extremely similar in the documentation produced by all three
305
One of the characteristics the OECD suggests that privacy laws include is the
Purpose specification principle Use limitation principle
306
Cryptography for the two main types of APIs
Cryptography for the two main types of APIs is required; this is TLS for representational state transfer (REST) and message-level encryption for Simple Object Access Protocol (SOAP).
307
SLA Elements
SLA elements should be objective, numeric values, for repeated activity.
308
Private cloud
Your company operates under a high degree of regulatory scrutiny
309
Acquiring and managing software licenses SaaS, PaaS
The customer is still responsible for some software licensing and maintenance activities (and therefore costs) in infrastructure as a service (IaaS) and platform as a service (PaaS) models; In a software as a service (SaaS) model, the cloud provider is tasked with acquiring and managing the software licenses; the scale of a cloud provider’s operations can allow them to reduce the per-seat cost of software considerably.
310
DC Tier 1
for contingency backup and archiving purposes. Tier 1 data center should suffice; it is the cheapest, and you need it only for occasional backup purposes (as opposed to constant access). The details of location and market are irrelevant. Tier 1: to support an organization that wants to conduct IT operations Tier 1 data centers are expected to help protect Lime Highlight created at 1:29 PM on 9/6/24against human error, not outages or disasters. They're also expected to have redundancy for chillers, pumps, UPS devices, and generators but are likely to have to shut down for maintenance activities.
311
DC Tier 2:
Tier 2 facilities provide more redundancy than Tier 1 facilities. Tier 2 facilities are intended to ensure that critical operations are not interrupted due to planned maintenance.
312
DC Tier 3:
The Tier 3 design is known as a “concurrently maintainable site infrastructure.” As the name indicates, the facility features both the redundant capacity components of aTier 2 build and the added benefit of multiple distribution paths where only a sole path is needed to serve critical operations at any given time.
313
DC Tier 4:
Tier 4 data centers are the highest level described by the Uptime Institute. They have independent and physically isolated systems providing redundancy and resiliency at both the component and distribution path levels, ensuring that events that compromised one system would not take out the redundant system.
314
Data Center Tier
Uptime Percentage: Tier 1: 99.671 Tier 2: 99.741 Tier 3: 99.982 Tier 4: 99.995
315
Your company will not be allowed to use a cloud data center in which of the following countries? (if EU data is thr)
south korea The United States
316
Community cloud
company’s collaboration needs.
317
Private cloud
highly sensitive industries, including aerospace and pharmaceuticals.
318
TCI
The TCI does not, specifically, require cost-effectiveness of cloud services.
319
Risk in managed cloud env
Management plane breach allows an attacker to gain full control of the environment and can affect all aspects of the CIA triad.
320
Private cloud storage
One type of cloud storage wherein cloud and enterprise storage both reside inside the enterprise behind the firewall.
321
Public cloud storage
This form of cloud storage involves the enterprise and storage service being separate, with data stored outside the confines of the enterprise environment.
322
Mobile cloud storage
This form of cloud storage applies to storing mobile device data in the cloud while providing access to the stored data from anywhere.
323
Enterprise risk management
A set of processes and structures used to effectively manage all risks to an enterprise.
324
Which of the following circumstances would not commonly result from humidity issues
Situations where humidity is too high may result in the buildup of moisture and corrosion of equipment. If humidity falls too low, it may result in static electricity issues. Humidity issues generally do not contribute to fires or physical access control failures
325
Inert gas systems
Inert gas systems use no water and are unlikely to damage sensitive electronic equipment, even if discharged. Wet pipe, dry pipe, and preaction systems all use water and may damage or destroy electronic equipment if activated or damaged.
326
Which one of the following hash algorithms would not trigger this vulnerability? MD4 MD5 SHA-1 SHA-256
To be used in a secure manner, certificates must take advantage of a hash function that is not prone to collisions. The MD2, MD4, MD5, and SHA-1 algorithms all have demonstrated weaknesses and would trigger a vulnerability. The SHA-256 algorithm is still considered secure.
327
Asymmetric encryption--public , private key receiver' uses his private key to decrypt
The recipient of a message encrypted using an asymmetric encryption algorithm decrypts that message using their own private key. Therefore, Alice should use her own private key to decrypt the message that Bob encrypted using Alice's public key.
328
minimum amount of time to expect UPS to provide power to the systems in the datacenter 10mins
The purpose of an uninterruptible power supply (UPS) is to provide power to systems for a short period of time. They provide immediate backup power from a battery that should be quickly replaced by long-term backup power from a generator or similar source. For this reason, you should only expect the UPS to last for about 10 minutes
329
For IRM: Digital certificate revocation : 2 ways OCSP Online Certificate Status Protocol (OCSP) -- FASTER adding the certificate to a Certificate Revocation List (CRL)
There are two possible techniques for revoking a digital certificate: updating the certificate's status using the Online Certificate Status Protocol (OCSP) and adding the certificate to a Certificate Revocation List (CRL). Of these, OCSP provides faster updates and is the preferred method. It is not possible to change the public or private keys associated with an existing digital certificate.
330
Ephemeral storage: Terminating a server completely deletes it and the ephemeral storage.
Ephemeral storage is temporary storage associated with a server instance. It will be deleted if the server is terminated, but it will not be deleted if the server is simply stopped or rebooted. Stopping a server allows it to be restarted at a later time, which requires access to the ephemeral storage. Terminating a server completely deletes it and the ephemeral storage.
331
Tokenization
Tokenization is an approved alternative to encryption for complying with Payment Card Industry (PCI) requirements.
332
RAID : Business Continuity Action Disaster recovery actions: restoring from backup tapes, relocating to a cold site, and restarting business operations
RAID technology provides fault tolerance for hard drive failures and is an example of a business continuity action. Restoring from backup tapes, relocating to a cold site, and restarting business operations are all disaster recovery actions.
333
SOAP - Interoperability
SOAP uses an XML-based approach to interoperability, allowing systems to interact more easily
334
VLAN Characteristics
Broadcast packets sent by a machine inside the VLAN will reach all other machines in that VLAN. Broadcast packets sent from a machine outside the VLAN will not reach machines inside the VLAN. Broadcast packets sent by a machine inside the VLAN will not reach machines outside the VLAN.
335
goal of site survey
Threat definition Target identification Facility characteristics
336
Access control to virtualization management tools should be
Role-based
337
Synthetic performance monitoring may be preferable to real-user monitoring (RUM) because
Synthetic agents can simulate user activity in a much faster, broader manner and perform these actions 24/7 without rest.
338
Inference
Inference is an attack strategy, not a reason for implementing tokenization. All the other answers are good reasons to implement tokenization, and they are therefore not correct
339
negative aspect of bit-splitting
It may require trust in additional third parties beyond the primary cloud service provider. Significantly greater processing overhead Some risk to availability, depending on the implementation
340
Agile analytics/business intelligence
a data discovery approach that offers insight to trends of trends, using both historical and predictive approaches
341
Real-time analytics
a data discovery approach used by e-commerce retailers to discern and predict shoppers’ needs?
342
tools might be useful in data discovery efforts that are based on content analysis
Egress monitoring solutions
343
Hashing
a cryptographic one-way function applied to data in a database to allow it to be referenced without using the actual data
344
Service Provider Engineers
management plane of a cloud datacenter
345
XML Firewall
SAML is an XML-based protocol, and Kristen knows that an XML firewall that is SAML-aware with appropriate rules for identity-based protection would be her best option. IDS systems cannot rate-limit even if they are SAML-aware. WAFs are designed for web applications rather than specifically for XML and SAML-based filtering, and a DAM is a database-specific tool.
346
ASVS application security verification standard
A. ASVS uses a three-level code validation assurance level model, with level 3 requiring critical applications to meet in-depth validation and testing requirements.
347
Virtual TPM boot security
A virtual trusted platform module (vTPM) is the only solution that will meet Jack's needs. HSMs (hardware security modules) are used to create, store, and manage secrets, including cryptographic keys and certificates, but aren't used for boot security.
348
ISO ISAE SSAE
ISO 20000-1 describes service management. ISO 27001: information security management system (ISMS), the organisation’s entire security program, cyber security control objectives ISO 27002: covers cybersecurity control implementation ISO 27017: designed for cloud service providers ISO 27018 describes privacy requirements for cloud providers ISO 27034 mandates a framework for application security within an organization (ONF, ANF) ISO 27037 : collecting, preserving, and identifying electronic evidence. ISO 27050 : guidance for eDiscovery programs ISO 27701 : industry standard guidance for information privacy programs. ISO 28000 : specifies security management systems ISO31000 - focuses on design implementation and management. ISAE 3402 : International Standard on Assurance Engagements ISAE 3410 - Assurance Engagements on Greenhouse Gas Statements SSAE 16 SSAE 18 : Statement on Standards for Attestation Engagements 18, is a set of auditing standards that help businesses evaluate the controls of their service providers