Pocket Prep CCSP Flashcards
Recently, your organization has decided it will be using a third-party for its cloud migration. This third-party organization requires access to numerous of your organization’s file servers. You must ensure that the third-party has access to the necessary resources. What is the FIRST action your organization should take?
A. Provide minimal access for the third-party
B. Establish a written IT security policy for the third party
C. Monitor third-party access to resources
D. Conduct vendor due diligence on the third party
D. Conduct vendor due diligence on the third party
Explanation:
Before granting access to any resource, you should conduct vendor due diligence for the third-party organization. This diligence is very similar to a risk assessment, but it is usually in the form of a questionnaire completed by the vendor and analyzed by the organization.
All other options should occur after the due diligence has been conducted on the vendor.
As cloud customers will access the cloud environment over a network, the networking infrastructure plays a major role in a successful cloud environment. Which of the following is the MOST basic of physical network components?
A. Switches
B. Routers
C. Wiring and Cabling
D. Firewalls
C. Wiring and Cabling
Explanation:
The most basic aspect of networking in a cloud environment is the actual wiring that goes into the network.
Switches, routers, and firewalls would be the next step up from the wiring and cabling.
An emerging concept driven by the decentralized nature of cloud applications and services which have appended the traditional model of network with a perimeter is called:
A. SAN
B. SSL
C. SDP
D. SDS
C. SDP
Explanation:
The software-defined perimeter (SDP) is a security architecture that restricts access to resources based on user identity and a “need to know” access control methodology. Before granting access to applications and network services, this technique requires device authentication and user identity verification.
The purpose of labeling data is to accomplish which of the following?
A. Classify data based on where its located within the organization
B. Protect data that can be considered sensitive or classified
C. Know all of the locations within an organization where data could be stored
D. Group data elements together and provide information about those elements
D. Group data elements together and provide information about those elements
Explanation:
Labels are similar to metadata, but they are applied by users or processes and are more informal than metadata. Labels are used to group data elements together and provide information about those elements. However, labels can only be successful if they are applied consistently throughout the organization.
When is the MOST optimal time to determine if data is classified as secure?
A. Use Phase
B. Create Phase
C. Archive Phase
D. Store Phase
B. Create Phase
Explanation:
When data is created during the create phase, the sensitivity of the data is known. It should then be handled properly from the beginning, as all additional phases will build off of the create phase.
Data rights management (DRM) is a practice that is encapsulated within which concept?
A. Interoperability and Portability
B. Information Rights Management
C. Supply Chain Management
D. Mobile Security
B. Information Rights Management
Explanation:
Data rights management (DRM) is an extension of normal data protection where additional security measures and controls are placed upon sensitive data. It is an extension of the information rights management (IRM) concept.
Which is NOT a way to measure business requirements and capabilities for business continuity and disaster recovery in the cloud?
A. Computing Power for Systems?
B. How long are you down?
C. How much capacity for data?
D. How much data may you lose?
C. How much capacity for data?
Explanation:
How much data storage capacity is not a good indicator of business requirements and capabilities for continuity and disaster recovery in the cloud. Three metrics are used to assess business capabilities: RTO, which indicates how long systems are down, RPO, which indicates how much data may be lost, and recovery service level (RSL), which indicates how much processing power is required to maintain systems following a disaster.
Cloud security is a challenge. What aspect of cloud computing creates new complexities to security in the cloud?
A. Measured Service
B. Encryption
C. Broad network access
D. Multi-tenancy
D. Multi-tenancy
Explanation:
Multi-tenancy used in cloud computing creates new complexities to security in the cloud. Data transmissions between systems within the same cloud are potential security concerns and sources of vulnerability for data theft.
All other options are key cloud computing characteristics.
An organization has decided that the best course of action to handle a specific risk is to obtain an insurance policy. The insurance policy will cover any financial costs of a successful risk exploit.
Which type of risk response is this an example of?
A. Risk Mitigation
B. Risk Avoidance
C. Risk Transfer
D. Risk Acceptance
C. Risk Transfer
Explanation:
When an organization obtains an insurance policy to cover the financial burden of a successful risk exploit, this is known as risk transfer. It’s important to note that with risk transfer, only the financial losses would be covered by the policy, but it would not do anything to cover the loss of reputation the organization might face.
In a SaaS environment, if either SQL injection or cross-site scripting vulnerabilities exist within any SaaS implementation, every customer’s data becomes at risk. Of the following, what is the BEST method for preventing this type of security risk?
A. The provider should ensure that anti-virus software is up to date within their environment.
B. The provider should ensure that there is a patch scheduled in place and that it is adhered to
C. The provider should sign a contract stating that they are liable for any breaches
D. The provider should have different data stores for each customer and keep all customers as segregated as possible
D. The provider should have different data stores for each customer and keep all customers as segregated as possible
Explanation:
Without proper segmentation, all customers will be susceptible to vulnerabilities that exist anywhere in the environment. To mitigate this risk, the provider should have different data stores for each customer and keep all customers as segregated as possible.
As you are drafting your organization’s cloud data destruction policy, which of the following is NOT a consideration that may affect the policy?
A. Compliance and Governance
B. Data Discovery
C. Business Processes
D. Retention Requirements
B. Data Discovery
Explanation:
You should not consider data discovery when determining an organization ‘s data destruction policy. While you may discover data during other stages of the data lifecycle, this is irrelevant at the time of destruction. Compliance and governance standards, data retention requirements, and business processes should be considered while developing a data destruction policy.
WSUS and MDT can be used for maintaining which types of environments?
A. Windows
B. vSphere
C. Macintosh
D. Linux
A. Windows
Explanation:
WSUS (Windows server update service) and MDT (Microsoft deployment toolkit) can be used in conjunction to manage and maintain a Windows environment. WSUS is used to perform patch management. MDT is a collection of tools which can facilitate the automation of server and desktop deployments.
The OWASP Top 10 lists XML external entities (XXE) on their current list of security vulnerabilities. Which of the following is an example of XXE?
A. A developer has left sensitive data about the directory structure of the application inside their code
B. A malicious actor is able to send untrusted data to a user’s browser without going through any validation
C. An application is not performing any validation on the browser tokens used to access the application
D. A website is not using proper input validation on their data fields of their application
A. A developer has left sensitive data about the directory structure of the application inside their code
Explanation:
During development, it’s not uncommon for developers to leave comments or notes in their code. While this is not inherently an issue, it can become an issue when the comments and notes are not removed before the code is published. An XML external entity occurs when a developer leaves references to items such as the directory structure of the application, configuration about the hosting system, or any other information about the inner workings of the application itself, in the code.
In which security test does the tester try to actively attempt to attack or compromise a live system using the same types of tools that an actual attacker would use to simulate a real-life scenario?
A. RASP
B. Penetration test
C. Vulnerability Scan
D. SAST
B. Penetration test
Explanation:
During a penetration test, the tester is trying to actively break into the live systems. This is meant to simulate a real-life scenario and, therefore, the tester will use the same type of tools that an actual attacker would use to compromise a system.
During static application security testing (SAST), the tester has knowledge of and access to the source code, and all testing is done in an offline manner. Vulnerability scans are usually done by an organization against their own systems to ensure that their systems are hardened against known vulnerabilities. Runtime application self-protection (RASP) is a security mechanism that helps applications protect themselves by blocking attacks in real time.
Which of the following is focused on providing the required system resources needed to meet SLA requirements in a cost-effective manner?
A. Continuity Management
B. Service Level Management
C. Capacity Management
D. Change Management
C. Capacity Management
Explanation:
Capacity management is concerned with having and providing the required system resources to meet SLA requirements of customers in a cost-effective and efficient manner. It’s important to ensure that systems are not under-provisioned, leading to service and performance issues, but also not over-provisioned, leading to higher costs to the organization.
Which of the following is NOT considered one of the three main building blocks for a cloud environment’s management plan?
A. Rapid Elasticity
B. Orchestration
C. Scheduling
D. Maintenance
A. Rapid Elasticity
Explanation:
The three main building blocks that make up a cloud environment’s management plan include orchestration, maintenance, and scheduling.
Rapid elasticity is a concept that exists in cloud computing referring to the ability to quickly add more resources when necessary. It is not one of the building blocks of the management plan.
A security engineer is implementing mechanisms that are used to allow and deny possible actions on the network. What are these mechanisms called?
A. Security regulations
B. Firewalls
C. BCDR Plans
D. Security Controls
D. Security Controls
Explanation:
Mechanisms put in place to allow or deny specific actions on a network are known as security controls. It is the cloud security engineer’s responsibility to ensure that the proper security controls are put in place to keep their organization safe.
Cloud service providers will have clear requirements for items such as uptime, customer service response time, and availability. Where would these requirements MOST LIKELY be outlined for the client?
A. RTO
B. NIST
C. SLA
D. RPO
C. SLA
Explanation:
Requirements such as uptime, customer service response time, and availability should be outlined in a service level agreement (SLA). When a provider doesn’t meet their SLA requirements, it could lead to termination of the contract or financial benefits to the cloud customer.
A cloud administrator would like to reduce the risk of vendor lock-in. What cloud shared consideration should the administrator be looking for?
A. Availability
B. Reversibility
C. Versioning
D. Interoperability
B. Reversibility
Explanation:
Reversibility is a metric that indicates the ease with which your cloud services can be migrated between cloud environments. Due to the fact that solutions must be able to migrate between CSPs and to and from the cloud, reversibility reduces vendor lock-in.
An engineer is performing threat modeling. She is using a model that has “tampering with data” listed as one of the categories. Which model is this engineering using?
A. REST
B. TOGAF
C. DREAD
D. STRIDE
D. STRIDE
Explanation:
STRIDE is one of the most prominent models used for threat modeling. Tampering with data is included in the STRIDE model. DREAD is another model, but it does not include tampering with data as a category. TOGAF and REST are not threat models. STRIDE includes the following six categories:
Spoofing identify Tampering with data Repudiation Information disclosure Denial of service Elevation of privileges
Anyone who uses or consumes data which is owned by another data owner is considered which of the following?
A. Data custodian
B. Data steward
C. Data owner
D. Data Controller
A. Data custodian
Explanation:
A data custodian is anyone who uses or consumes data which is owned by someone else. The data custodians must adhere to any policies set forth by the data owner in regard to the use of the data.
In the cloud, data is frequently stored in order to be recovered later, if necessary. Which section of a data retention policy would outline the steps involved in this process?
A. Retention Formats
B. Retention Periods
C. Data Classification
D. Archiving and Retrieval Procedures
D. Archiving and Retrieval Procedures
Explanation:
The data retention policy’s archiving and retrieval procedures will detail how data should be stored in order to facilitate later recovery.
Violating the requirements of which type of PII is likely to result in criminal charges?
A. Regulated PII
B. Non-Disclosed PII
C. Contractual PII
D. Unrepresented PII
A. Regulated PII
Explanation:
There are two main types of PII (personally identifiable information) which include contractual PII and regulated PII. Failure to comply with requirements related to regulated PII could result in criminal charges in some jurisdictions, while violating contractual PII requirements is more likely to only result in a contractual penalty.
Non-disclosed PII and unrepresented PII are not recognized types of PII.
During which phase of the software development lifecycle should testing requirements be defined?
A. Requirement gathering and feasibility
B. Testing
C. Maintenance
D. Development/Coding
A. Requirement gathering and feasibility
Explanation:
During the first phase of the software development lifecycle, requirement gathering and feasibility, the risk and testing requirements are defined. Having these requirements in place before development and testing even begins helps to ensure the success of the project.