0% found this document useful (0 votes)
5 views

CCSP QUESTIONS EXCEL

The document outlines various questions and answers related to cloud computing, covering topics such as attributes, characteristics, and roles of cloud services. It includes multiple-choice questions with corresponding correct answers, focusing on aspects like IaaS, PaaS, SaaS, security concerns, and deployment models. Additionally, it references frameworks and principles relevant to cloud computing environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

CCSP QUESTIONS EXCEL

The document outlines various questions and answers related to cloud computing, covering topics such as attributes, characteristics, and roles of cloud services. It includes multiple-choice questions with corresponding correct answers, focusing on aspects like IaaS, PaaS, SaaS, security concerns, and deployment models. Additionally, it references frameworks and principles relevant to cloud computing environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Question Type (multiple Answer Answer Answer Answer Correct

Question choice or multi-select) Option 1 Option 2 Option 3 Option 4 Response


Which of the following are attributes of Minimal High cost and Rapid Limited 1
Which of the following are distinguishing
cloud computing? management
Have some unique
Be able to provisioning
Have some access
Be ableandto 4
characteristics
Which of the following
of a managed
are cloud
service effortofand
form
Cloud a resources
remotely
CSP and and slow
form
Cloud ofservice
a help Cloud
serviceservice
remotely 2
provider?
computing
Which of the
roles?
following are essential shared
NOC
On-demand
customer but no Unmeasured
monitor and Resource
backup release
desk
broker but and
ofno Broad
providerand
auditor
monitor and 1 4
characteristics
Which of cloud are
of the following computing?
considered to resources
help
and
self-service
Data, financial
desk.
access manage
service
Storage, resources
NOC.
user
isolation
CPU, RAM, interaction
object
network
manage
Data, CPU, 3
(Choose
be
When
the using
building
two.)
an IaaS
blockssolution,
of cloudwhat is the auditor
control,
To provision objects
provider
networking,
To for
provision storage,
To provision and To objects
access
RAM, and
for
provision 4
When using
computing?
capability an IaaS to
provided solution, what is a key
the customer? virtualization
Metered
processing, and printing,
the customer
processing,
The ability andto Increased
networking
processing, Transferred
the customer
access
processing,control 1
When
benefitusing a PaaS
provided to solution, what is the
the customer? , and
priced
To
storage, services
deployusage anddeploy
virtualization
scale
storage,
To reactively
up energy
storage,
To deploy and cost
anddeploy
storage,
To of 3
capability
What provided
is a key to the
capability orcustomer?
characteristic of onto
on
Support thethe
networks, basis
for a maintain
infrastructure
Ability
onto
networks, to and Support
the cooling
onto
networks,theforand ownership
a Ability
proactively
networks,
onto theto and 2
PaaS? using a SaaS solution, what is the
When of
andunits
cloud other
homogenous
To use the other
these
services
reduce
cloud
To useobjects system
other
lock-in To
the single
clouduse the manually
other
maintain
cloud
To use the 1
What are the
capability four cloud
provided to thedeployment
customer? consumed
hosting
infrastructur
fundamental
provider’s
Public, under on
fundamental
based
infrastructure
External,
provider’s efficiencies
programming
fundamental Public,
infrastructure
Public,
consumer’s scale
these objects
fundamental
consumer’s
infrastructure 4
models?
What are the six stages of the cloud secure ecomputing
provider-
Create,
environment
applications
internal, use, Create,
management.
projected
applications
computing
private,
consumer- store, Create,
language
computing
private,
applications
consumer- share,
joint, Create,
under
computing
consumer-
applications
private, 2
data lifecycle?
What are SOC 1/SOC 2/SOC 3? created
store,
Risk
resources
running
hybrid, or
share,
and
on a use,
resources
usage
hybrid,
Access
created
running share,
and store,
on a Audit
or resources
and
created
running archive,
on a Software
reports
or archive,
management.
resources
hybrid,
running
created use,a
and
on
or 3
What are the five Trust Services archive,
management
acquired
where the
cloud
community
Security, and archive,
where the
community
controls
Security,
acquired
cloud and Security,
use,
where
community
cloud and
acquired the share,
development
where store,
Security,
cloud
community
acquired the 1
principles?
What is a security-related concern for a destroy
frameworks
Virtual
consumer is
applications
infrastructur
Availability, destroy
infrastructure
Auditability,
applications
Web
provider is destroy
Data access
Availability,
applications
provider
infrastructure is and
phases destroy
Availability,
System
consumer andis
infrastructure
applications 4
PaaS solution? created
machine
notThe
e. ableusing
Processing to application
Theto using and
able
Processing
.created Thepolicies
able
.created
Customer using resource
to deploy able
Processing
Theto using
.created
programmin
attacks
deploy and
applications
Integrity, security
deploy and
Integrity,
programming
applications and run
Integrity,
programming
applications Integrity,
isolation
deploy and
applications
programming
grun
Confidentiali
are languages,
arbitrary Confidentialit
arbitrary Confidentialit
languages,
are
run accessible accessible Confidentialit
languages,
arbitrary
are run accessible
are arbitrary
languages,
What are the three things that you must libraries,
accessible
software,
ty,
Management
and software,
y,
Function,
andvarious
from
libraries, Privacy Actors,
software,
y, andvarious
from
libraries,Privacy Lifecycle,
software,
y, andvarious
libraries,
from 2
Which of thebefore
understand following
you are
canstorage types
determine the Volume
services,
whichvarious
from
,Privacy canand
and location,
Structured
which devices
client
services, policies,
and Unstructured
which devices
services,
client and
and Volume
Nonrepudiati
function,
which devices
services,
client and
and
and 4
necessary
used
Which with
of the
an
controls
IaaS
following
solution?
to deploy
are data
forstorage
data tools
provisioning,
block
Raw
include
client that
and
devices
OSs actors
and
tools object
can include
Structured
through procedures
and
that the Unstructured
tools
can include
through that the Tabular
on
cost
object
can include
through
tools and
that the 2
protection
types
Which used
of the
in
with
following
a cloud
a PaaSenvironment?
can
solution?
be deployed to the provider
through
and
block
Encryption
location OSs and
and
SLAs
provider
either a thin Masking
OSs and
ephemeral
and
provider
either a thin Continuous
OSs and
object
consumer
either a thin 1 3
help ensure
Where wouldthe theconfidentiality of data
monitoring engine bein On a user’s
supports.
applications
either a thin In the storage
applications
unstructured
supports.
client The Near
applications
ephemeral
supports.
client the The On applications
client
monitoring
a VLANThe
supports. 3
When using
the cloud?
deployed whentransparent
(Choose
using two.)encryption of aDLP
a network-based Thethe
At
workstation
client On
systemthe does In
provider
interface, organizational
a key does Within
provider
interface, interface,
consumer the 4
database,
system?
What whereanalysis
are three does the encryption
methods used consumer
application
Metadata,
interface, instances
Metadata,
not manage
such as a web Statistical
gatewayas a web Bit
management
not manage
such database
does
such splitting,
nota web
as 1
engine
In thedata
with context of privacy
discovery and data
techniques? using
doeswho
such
labels,
One the
not
as and
a attached
structural
One
browser who(for
or control to
can
the The
analysis,
systemnatural
browser
or control (foror A
the natural
browser
labels,
manage and
oror
(for 3
reside?is the what
protection,
What CSA CCM?
is a controller? manage
database
content
A
cannot
web setbrowser
ofbe or the volume
analysis,
be identified,
example,
underlying
An inventory and
web- A ofandweb- An
underlying
labels,
legal
set person,
example, content
legalinventory
person,
example,
control theweb- 2
Which of the following are common control
(for
analysis
identified,
regulatory the
example,
Persistent cloud
labels
directly
Persistent
of cloud
based or
email), cloud email), Persistent
based
content
software
Persistent
public analysis
public
of cloud
underlying
based email), 1
What are the
capabilities offour
IRMelements
solutions?that a data requirement
Retention
underlying
web-based
protection,
directly or indirectly,
protection,
infrastructure
or
service
Retention
a program in Retention
analysis
authority,
development
infrastructure
protection,
or authority,
service
a program Retention
cloud
or a program
protection, 4
retention policy should define? cloud
sindirectly,
periods,
for CSPs
email),
dynamic ordata
ain particular
, including
interface.
static
security
periods, policy by periods,
The
data , including
dynamic
agency,
lifecycle
interface. data
or The periods,
agency,
security
dynamic
interface. or
data
infrastructureThe
infrastructur
program
access
particular
policy by consumer
reference
control,
network,that
controls
formats, to formats,
data requirements
network,
consumer
policy
any data formats,
control,
other any
controls
other
, including
policy
consumer that
data
control,
methods,
e, includingto
interface.
control,
reference an
automatic
servers,
does
are
security,
arranged
manageand security,
does
body
for
servers,thatand security,
CSPs
manual not body
are
does arranged
network,thatand
manage
automatic
Explanation Knowledge Area
Explanation: “Cloud computing is a model for enabling ubiquitous, convenient,
According tonetwork
on-demand the MSP access Alliance, to typically
a sharedMSPs pool of have the following
configurable computing
Explanation:
resources
distinguishing (e.g.,The following groups
networks,
characteristics: servers,form storage,the key roles and functions
applications, and services) associated thatwith
“The
can
■■beHave
cloud NIST
rapidly
computing. someDefinition
provisioned
They of
form ofNOC
do Cloud
not and Computing,”
released
constitute
service anwith
exhaustive the essential
minimal listmanagement
but highlight effort the main or
service
The
■■building
characteristics
roles and
Have provider
functions
some blocks interaction.”
of cloud
form ofof
within cloud
computing
cloud
help computing
desk are
computing: are composed of RAM, CPU,
as follows:
service
According
—“The
storage,
■■ On-demand Cloud
Can NIST
and tocustomer:
remotely “Theself-service:
Definition
networking. NIST
monitorAn Definition
of Cloud
andAmanage
individual oforCloud
Computing”1
consumer orComputing,”
all can
entity aunilaterally
that in
utilizesoforprovision
majority IaaS,
subscribes
the objects computing
to cloudbased
for the
IaaS
“the has
capabilities,
services a
capability
customeror resources. number of
provided key benefits
to the for
consumer organizations,
is to which
provision include
processing, but storage,
networks,
According
are
such
■■ notasCSP:
Can limited
serverto
A “The to these:
time
company
proactively NIST
and Definition
network
that
maintain provides
the ofcloud-based
storage,
objects Cloud
asunder Computing,”
needed automatically
platform,
management in PaaS,
for without
infrastructure,
the customer application,
PaaS
and
“the
■■
requiring
or
■■ should
other
capability
storageUsage
Canhuman have
fundamental
is
services the
provided
metered
deliverinteraction following
to other
these and computing
to the
priced key
with each
organizations
solutions on capabilities
consumerresources
with somethe basis
service is
form toofand
where
deploy
provider.
or individuals, unitscharacteristics:
the
(or
of predictable onto consumer
the
instances)
usually billing cloud
for a fee; is able
consumed. to
otherwise
model, This
where
deploy
According
infrastructure
■■
can
■■ also and
Support
Broad to run
beclients
billed“The
network arbitrary
multiplebackNIST software,
Definition
alanguages
toservice.”Cloud
access: specific and ofwhich
Cloudarecan
frameworks:
departments
Capabilities orinclude
Computing,”
available PaaS
functions. over operating
shouldin SaaS, Asystems
support multiple andentity
known
the customer to knows “as with great accuracy backup
what her service
regular ITthe
provider: network
management and accessed
third-party
According
applications.
consumer-created
“The
programming
■■ capability
It has to “The provided
languages NIST
or toacquired
and Definition
to up applications
the consumer
frameworks, of Cloud thus Computing,”
iscreated
to
byuse
enabling using
the theservices the thin
developers cloud
programming
provider’s applications
ortoon code
through
that
expense manages willanbe
standard andability
mechanisms
holds scale that and down
promote infrastructure
use heterogeneous based thick actual
The
As
languages,
running
deployment
in consumer
with
whichever systems models does
language and not
other
areasthey manage
asmobile
follows:
prefer or
organizational control
or the tablets,
design the
assets, underlying
data should cloud have infrastructure
a
usage.
client
operational platforms (such
responsibilities for phones,
cloud-based data requirements
laptops,services
backup specify.
and workstations). In recentto
and solutions
but
on
An
■■ a has
SOC
libraries, cloud control
1
is“Private is
services, over
infrastructure.
a report and operating
on controls
tools The systems,
applications
at
supported a service
bystorage,
are
the and
organization
accessible
provider. deployed
The that
from mayapplications;
various
consumer besource clientby
does and
not
times,
This
■■
customers significant
particularly
Resource acloud:
from pooling: strides
useful
central The and
and
The
data cloud
efforts infrastructure
beneficial
provider’s
center. havewhere been
computing is provisioned
taken
there to
areensure
resourcessignificantfor
areexclusive
that open
spikes
pooled touse
serve a
SOC
possibly
manage
devices
relevant
single 2organization
reporting
through
toboth a user was
either specifically
entity’s
comprising aand
thin
internal designed
client
multiple control
interface, forover
consumers IT-managed
suchfinancial
(e.g.,as a web service
reporting.
browser AnIt(e.g.,
SOC web-
2
stacks
and
■■dips
multiple are
CSB: within supported
Typicallythe usage curve
a third-party utilized,
for thus or reducing
infrastructure.
entity company thatbusiness
“lock-in” looks toor units).
issues
extend may
orwith
enhance
limited
or
based
reportcontrol
Explanation:
providers
be owned, control
andthePaaS
managed,cloudof select
underlyingsecurity
computing.
and networking
cloud
concernsThe byreport components
infrastructure
areorganization,
focused
specifically including
on(e.g.,
athe host
network,
areas
addresses firewalls).”2
shown
any orservers,
number (Figure A.2).
of the
interoperability
■■
consumers
value It
to has using
multiple when
a reduced acustomers costoperated
changing
multitenant CSPs.
ofofownership.
model,
cloud-based the
with There is nothrough
different
services need
physical third party,
torelationships
buy
and assets
virtual some
forwitheveryday
e-mail),
is
System
five
■■ based
operating and
so-called
combination or
onathe
Multiple program
of Trustexisting
them,
hosting Services
andinterface.
SysTrust
principles,
itliaison
may
environments: The
andThe
exist consumer
WebTrust
on-whichor follow:does
principles.
off-premises.The
ability to supportnot manage The
cloud purpose
or control
ofof an
infrastructure theSOC
is
use,
resources
multiple dynamically
CSPs. It acts assigned
as a and reassigned
between cloud according
services to aconsumer
wide
customers variety
and demand.
CSPs,
systems,
underlying
2
Resource
■■ or storage, but has control over the deployed applications and possibly
There lossSecurity:
provisioned
underlying
no
selecting is ofa asset
sensefor Theexclusive
value system
of location overuse is by
time, protected
and reduced
independence
against
in costs
that
unauthorized
theof maintenance
customer
access,and
generally
both physical and
support.
has no
configuration
cloud
report
Isolations infrastructure
is
logical.Availability:
ahosting
specific to
community settings
evaluate Theincluding
an
of for the
system
consumers application-hosting
organization’s
network,
iscooling
available
from information
servers,
for
organizationsoperation environment.”3
operating
systems
that and havesystems,
relevant
useshared asIT” storage,
to
committed security,
concerns or
■■
control
the It
bestor environments
has a reduced
knowledge
provider for for
energy the
overcustomer
each the platform
and
exact is
location
and keycosts
monitoringto
of meeting
along
thethe with
provided
the customer
“green
services. resources requirements
The but may environment
To
or determine
availability,
User even
agreed. individual the necessary
application controls to
capabilities, be deployed,
with you must
possible first
exception of limited
(e.g.,
and
effect
be
CSB able mission,
demands.
with
can tobe optimum
specify security
Whether
utilized userequirements,
location
as apublic
of atITacloud,
“middleman” resources
higher policy,
private
leveland and
toofcloud,
systems. compliance
abstraction
broker local
theSOC best (such considerations).
hypervisor,
deal asand or
country,
customize It
state,
IaaS
understand
■■ uses
user-specific
processing
Level the
Processing the following
integrity,
application
following:
Integrity: storage
confidentiality,
System types:
configuration or
processing settings.”4
privacy. An 3 report is also based
may
bare
or data
services be
metal, owned,
center).
to the managed,
supporting
Examples
customer’s and
multiple
ofdata operated
hosting
resources
requirements. by one isstorage,
environments
includeMay
complete,
oralsomore of the
allows
resell
accurate,
processing,
cloud organizations
the timely, in
application
memory,
services.
and
and and
PaaS
on
Permissions
■■ the
authorized.utilizes
existing
Volume
Functions the following
SysTrust
storage:
of the A
data and
virtual storage
WebTrust
hard drivetypes:
principles,
that can belike a
attached SOC 2
to report.
a VM The
instance
the
network
■■ community,
developer Cloud or
bandwidth. a third
administrator
service party,
auditor: to or some
migrate combination
the application of them,
when andand asit may
required. exist onor
This
It
■■
be
■■ isused
important
difference
User Structured:
to
Locations host
Confidentiality: todata
ofbe theaware
Information
withindata
Informationa Third-party
of the
file a highorganization
relevant
withsystem.
designated dataassecurity
degree
Volumes ofattachedthat
organization,
confidential
verifies
technologies
toisIaaS attainment
such of SLAs.
thatasinclusion
instances
protected committed
off-premises.
can
■■ alsoRapid be used as
elasticity: a form of
Capabilities contingencycan be and continuity
elastically and
provisioned to ensure the ongoing
DLP
is
Access
you
in
■■
or
that maytool
aagreed.
behave the
relational
just
Actors implementations
needSOC
like toa3deploy
database
upon report
physical
the The typically
isordoesworknot
seamless
dataOnce drive with
or
you conform
detail
and
an to the
ensure
readily
array
understand totesting
does. the
searchable
and following
AIC
Examples performed.
document ofby datasimple,
include inand
these released,
theVMware
cloud.
straightforward
three items, in you
■■ “Public
availability.Flexibility:
some cloud: cloud
Traditionally, infrastructure
platform is provisioned
providers provided for open
features use by
and the
For
search
VMFS,
can database
Management
topologies:
Potential
designengine
Amazontheencryption,
controls and solutions
algorithms
EBS,
appropriate you
or other
Rackspace should
can search
RAID,understand
include operations. the following
andtheOpenStack
following: Cinder. options:
■■
general
requirementsPrivacy: Personal information is collected, used, retained, disclosed, and
cases
Data
Protection
■■
■■
controls automatically,
discovery
File-level
DIM:
Encryption:
Unstructured:
Objectand tools
Sometimes
storage:
apply For to
encryption: scale
differreferred
preventing
Information
Object
them tomanaged, by rapidly
technique
Database
storage
the systemto as outward
unauthorized
that does
is and
servers
network-based
like not
a
tooperated and
typically
file
safeguard data
reside inward
data-matching
share or
viewing
in
data a commensurate
reside
gateway abilities.
on
traditional
accessed
and control volume
DLP.
via Inwithdemand.
storage.
row-column
APIs
access this
or a web For
disposed
public.
that they It may
felt be
suited owned,
the client and
requirements, along bywitha business,
what suited academic,
their or
service
To
Where
Assume
this the
Against consumer,
the
you
deployment,
topology,
■■
database.
interface.
to it. DLP: purposes
wanted the tocapabilities
you aredata
For auditing
Unstructured andfind means
credit
encrypting
and preventing
files available
of
card
often processing
theinclude
volumefor
numbers.
unauthorizedprovisioning
text are
Data
or folder determined
discovery
data often
ofexfiltration
and(monitoring),
multimedia appear
by
tools
the database, national
for
content. databases
with
of in These
government
offering conformity
and
controls withcan
organization,
positioned thethembe of
as
a preventive,
provider’s
or some the privacy
combination
provider
detective
of policy.
of
choice,them. It
with exists
limited on orthecorrective
options premises
for login
The
or
Malware/
to
use
the
■■ be CSA
community
encryption
monitoring
Examples CCM
unlimited
a couple
File include isand
andofdatabase an
laws
methods
engine
engine essential
can
email
Amazonorand regulations,
beto
isaccesskeys
deployed
messages,
S3 andand
appropriated
find up-to-date
andnear
residing
monitor:word the
thenthe
Rackspace in
oncontroller
any
identify
For the security
quantity
detecting
processing cloud or
information.
instances
organizational controls
the
at
documents,
files. specific
any
attached
gateway
unauthorized time.
Most framework
toto
videos, criteria
use
the tofor
special
volume.
monitor
access photos, datahis
nature.
of the CSP.
the
■■ customers
nomination
Backdoors/
that
The following
isMeasured
credentials
External
outgoing addressed
fileto maytotable
scan
system
protocols move
beto
service:
internal easily.
designated
illustrates
the
encryption
such cloud
Cloud
as This
database
HTTP, keyby
systems has
community
protects
HTTPS, changed
national
capabilities and
automatically
structures,
from media
SMTP, drastically,
oritemize
community
common
stakeholders.
and control
theft,tables
FTP. towith
lost law.
IRM
and Aextensibility
backups, fundamental
optimize
columns, andcan and
resource
and
external
stored
audio in
files, files and
presentations, databases web pages, and many other kinds ofThe topology
business documents.
■■
flexibility
A
richness
The data
Trojans “Hybrid now
retention
customer
solutionsPersistentofdoesthe cloud:
afforded The cloud
toanagainst
meeting infrastructure
the needs and is a composition
requirements of of two
developer or more
use
then aby
attack
be
■■
Note leveraging
analyze
but
mixture
Obfuscation,
that althoughwhat policy
CCM
ofdetermines
not
proxyawasmetering
protect isits
sortsorganization’s
isbased,
protection
found.
anonymization,
these
ability
thecapability
Three
bridge,
of files
to
ultimate
Ensures provide
basic
attacks
network
tokenization,
may
purpose
atthat
some established
mapping
analysis
with
have
documents,
level
andmethods
access
tapping,
an orand
ofmasking:
the
of
to
internal protocol
the
SMTP cross
processing
messages,
abstraction
are for
relationships
employed:
application
structure,relays.
Different and
they
and
appropriate
To scan with
decides
layer,
alternatives
distinct
audiences.
the
on the
attachments
retaining outsourcing
informationare or
protected
for the delegation
operational of allrelational
ormechanisms
regulatory or part ofdatabases
compliance the concernedneeds. activities to
to
arethe
■■
the
encrypted
for the
still type
Metadata:
instance’s of service
HTTPS
protection
considered Data
OS, of or (such
that
traffic,
data the
unstructured as
describesstorage,
database
appropriate
without data;processing,
itself.
encryption
because all
the data they bandwidth,
to enable
containSSL and
does store notThe
active
interception objectives
fituser
metadataneatlythat
cloud
This
external
main
at rest, infrastructures
has inbeen
organizations.
industry-accepted
transit, (private, community, or public) that remain unique entities
areheavily
of and influenced
Therefore,
even security
after by open
the
standards,
they’re source,
customer
distributed which
actsto
regulations, allows
as aand
recipients relevant
controller.
controls Inorthis
frameworksrole,
in aa broker
data
accounts).
describes
■■
and database retention
Resource
tables
Transparent and
requiredpolicy
usage
column
encryption: toare can
be to bekeep
attributes.
Many
integrated important
monitored,
database-management
into the information
controlled,
system and for
systems
architecture. future
reported, haveuse
providing
the ability
but
such
the
DynamicareLabels:
plug-ins
reference, bound
topolicy
to together
beSometimes control
quickly
organize byAllows
and standardized
efficiently
information content or proprietary
owners
areitintroduced technology
to define
into athe and
platform. that
change enables
user
transparency
■■
to encrypt DAR: the for
Where
entirebothdatabase
the
data provider
elements
referred tosoand
or specificas can
the
grouped bebased.
consumer
portions,
storage searched
with such of
In and
the
tag
as
this thataccessed
utilized
tables. describes
topology, The at
service. athelater
encryption
the DLP date,
data.
engine
Which of the following methods for the Physical Encryption Overwriting Degaussing 2
safesupport
To disposalcontinuous
of electronic
operations,
records can
which destruction
Application Audit logging, Audit logging, Transaction 3
always
of the following principles should be logging, contract and contract and logging,
adopted as partaof
be used within the security
cloud operations
environment? contract and authority authority contract and
policies? authority maintenance, maintenance, authority
What is a cloud carrier? maintenance
A person, secure usage,
The secure
A person or The maintenance, 2
Which of the following statements about , secure
organization,
SDN enables and incident
intermediary
SDN’s disposal,
organization
SDN enables and SDN’s
secure
intermediary 1 4
With
SDN isregards
correct? to (Choose
management
two.) of the The
disposal,
or
you abilityand
entity
to to response
that
A guaranteed
provides
objective is to incident
A
that
youmaximum
to disposal,
that
A guaranteed
provides
objective and
is to 2
compute
What is the
resources
key issueofassociated
a host in awith
cloudthe execute
businessthe
responsible
arbitrate
Data the legal a
Access
connectivity
minimum
provide response
Data
execute
maintains
ceiling forthelegal
a Continuous
DR a clearly
business
maximum
offer 1
environment,
What
object types
storageof risks
type are
thattypically
the CCSPassociated
has to issues
continuity
for
control
consistency,
Loss making
of plane a preparation
control
and
resource
Guest transport
clearly preparation
resource
consistency,
business
control
Guest plane Guestpreparation
monitoring
continuity
resource
defined andof 3
whatvirtualization?
be
with
When does
usinga areservation
SaaS solution,
provide?
who is associated
preparation
service
which
governance,
Both
software the
is on of cloud
defined
allocation
breakout,
The allocation.
software
which
The CSPis only
relationship
breakout, on Both
cloudCSP
separate
allocation
breakout, and
services 4
aware of?
responsible
Which of thefor application
following security? of
are examples A
general-
with
available
achieved
snapshot
cloud specific
service
to
and services
snapshot
that
enterprise
Segmentation
networkmustand be achieved
A web
specific
This
with, and only
ceiling
snapshot uses Storage
and the enterprise
between
that
knowledge
networkmust ofbea 2 3
trust zones?
What are the(Choose
relevanttwo.)
cloud infrastructure compute
application
service
purpose
only
image
consumer
Rapid after between
met
image
according
Rapid
control
only by the to
plane may
after
Rapid
service
application
hardware,
image be
change
fixed, Continuous
from, cloudby
met
baseline
level
control service
the
required
plane 3
characteristics that can be considered resource
being
consumers
change
security,
and
elasticity,
hardware, theusedand CSPs
host
availability,
department
elasticity,
to with
and
manage allowing
or
propagation
elasticity,
CSPsit may
security,
with a two- for
and monitoring,
consumers
host
to
configuration
manage,
with
distinct to
contention
propagation
sprawl
enterprise
provider-
allowingcarry out for a cloud service
and
physical
broad
network to
broad
theabinding
tiered
be
sprawl specified of broad
on
manage
physical
and asprawl
advantages in realizing a BCDR plan situations.
general
theall replica
to
specific consumers
compute
compliance
network
traffic that is expandable,
percentage
network
architecture
specific of network
compute
workstation
objective
What is REST?
with regards to cloud computing Resource
function
A protocolhas
instances
network
decoupling not
resources
connectivity,
A software
separated to network
allowing
replica
connectivity,
The namefor of The
connectivity,
resources
traffic thattois 2
What are the phases of a software
environments? such
Planning
from as
contention
specification
taken
connectivity,specific
placeand Defining,
allow
and
architecture
fromathea guest instances
and
hardware
the a pay-per-
process
Planning has Planning
and and a apay-per-
intermediary
allow
separated and
guest 1
development
When does anlifecycle
XSS flawprocess
occur? model? implies
printing
for
requirement
Whenever
network
and thatan
a pay- planning
Whenever
to power and
multitenancy
style
forwarding onan acquisition
taken
use
Whenever
model
anplacean
requirements
configurations
that of Whenever
use
requirements
to model
power
process
from thethatonan 2
What are the six components that make there
sexchanging
application
Spoofing,
analysis,
per-use
hardware are too requirements
application
Spoofing,
and
model
consisting
plane.operate.
Thisof . Further, the Spoofing,
more
organization
application
Spoofing,
analysis, provides
analysis,
application
and operate.
forwarding 1
In
upathe
federated environment,
STRIDE threat model?who is the defining,
takes
configuration
many
structured
tampering,
The
model trusted
relying analysis,
tampering,
The
takes relying
guidelines
approach takes
useperson
compute
or
tampering,
The of
defining,trusted The
relying designing,
business
takes relying
tampering,
plane. This 3
relyingare
What party,
the five
and steps
what does
used it
todo?
create an requests
information
designing,
data
Specifying
s
repudiation,
party and
is thefor designing,
untrusted
nonrepudiatio
party
and
allows isfor
best
Assessing the resources
data
party
Specifying
and
is thethe Specifying
designing,
who
repudiation,
moves
software- defining,
untrusted
party
continuity
repudiation,
approach is theofthe 4
ASMP? resources
in
developing,
sends
information
identity
the
and the it to a
allowing developing,
data
n,
serviceand for
practices
network
application application
basedbetween
through
data
sends
information
service
testing, it to
a a application
cloud
developing,
data
information
customer;
permits and
services
he
testing,
web
for the
based
implementati
disclosure,
provider;
applicationbrowser
on and
use it of
the testing,
information
provider;
sends
controlitto
creating
security and
to ita
risks, web browser
controllers
borrowing
CSPs
disclosure,
provider;
requirements
developing, testing,
consumes
usesitto requirements
between
sends it and
disclosure,
network to the
a
actual
on
maintenance
without
requirement
commodity
DoS,
consumes and maintenance
web
disclosure,
consumes
scalable
become browser
specifying webthe scheme
with
consumes
and
permitsand
document
DDoS, afromthe and
maintenance
web
tokens
cloud
DoS,
control browser
and that
to
At which of the following levels should sthe and
available
of
proper
elevation
Compute
web
servers.tokensof without
DoS,
tokens
Storageand
services
directly
applicationthat viewroot
the
what
proper
elevation
tokens
environment,
Control of
hethat
maintenance the
plane
isof Management
consumers
with
social
the
becomeidentity
environment, 1
logical design
Which for data separation
of the following be name
is the correct validation
nodes
Concurrently
Further,
resources
services
privilege
that
environment
the andthe
in or elevation
the
nodescustomer
proper and
Fault-Tolerant
programmabl
requirements validation
Basic
network
resource
doing
privilege
the
assessing
and Sitethat
identity
session or Redundant
provider
plane
and
proper and
engineering
CSPs
directly
assessing 4
incorporated?
Which
for TierofII the following
of the UptimeisInstitute
the Data currently
computer
escaping
,service
network
Maintainable
creating
Between
use of 62° in validation
of
generates.
application
Site
e and
Between
and privilege
for 64° or escaping
provider
application
Infrastructure
presents (the
Between validation
generates.
presentation
Site
a64° Between
programmabl
application or
60° 2
Center of
recommended
Which Site the
Infrastructure
following
operatingarerange
Tier
supported
Standard
for the
networks
provider
and
Kerberos
FSite
andsystem.
software- 81° F escaping
TLS
FInfrastructure
dynamic
and 81° F
environment, logical
host).
generates.
SRP
Fsecurity
and 84°risks, F escaping
L2TP
FInfrastructure
e and 85°
security distinct
F
risks, 1 3
temperature
authentication
are the and
Topology?
What methods
two biggestfor iSCSI?
challenges Infrastructur
and
based 40
generates.
maintaining
Access and 40 andof
Auditability
adjustment
creating and
switch
provisioning
Configuration Capacity
30 to the Training
and
from40 and
creating 3
humidity
(Choose
associated
When two.)
inwith
setting a data
upthecenter?
resource
use of sharing
IPSec inwithin
cloud a ethe
Reservations
ANF,and
percent
controllers
control and and
Limits
traffic flows
percent
maintainingand and
Clusters
operating
percent
applications
management and SharesComponents
percent
customers
forwarding,
maintaining andon 4
computing
host cluster, which option would you assessing
patch
65 percent
permits a governance
to address
60
thepercent
ANF, running
the
and
60 percent allowing
60
how
the percent
to use
ANF, for
environments?
choose to mediate resource contention? relative
view of the
application
management relative
changing
provisioning relative
above,
application,
performance relative
dynamic
provisioning
IPSec and
security
humidity
network that patterns
humidity
and of
operating auditing
allowing the
humidity for documentatio
humidity
adjustment
and operating of
To safely dispose of electronic records, the following options are
To support continuous operations, the following principles should be
available:
adopted
■■ Physical as partdestruction:
of the security operations
Physically policies:the media by incineration, shredding,
destroying
■■
or other Audit means. logging: Higher levels of assurance are required for protection, retention,
and
■■ Degaussing: Using strong magnets for scrambling data on magnetic media such
According
lifecycle
as hard drives to NIST’s
management and tapes. ofCloud
auditComputing
logs. They Synopsis must adhere andtoRecommendations,
applicable legal, statutory,
According
the
or
■■ following
regulatory to
Overwriting: OpenNetworking.org,
first-level
compliance Writing terms
obligations
randomare importantsoftware-defined
dataandover providetothedefine: networking
uniquedata.
actual user The access ismore accountability
times the
The
defined
■■
to use as
Cloud of
detect potentially
overwriting reservations,
the physical
service
process occurs, consumer:
suspicious limits,
separation and
Person
the network of
more thorough shares
the or network provides
organization
behaviors the orcontrol the
that planecontextual
maintains
file integrity
destruction from
of the the
a
anomalies ability
dataforwarding
business
is through
The
for
plane, anfeatures
relationship
forensic administrator
and where you a get in
to
control an
allocateobject
plane the storage
controls
investigative capabilities in the event of a security breach. compute severalsystem resourcesare
devices. typically
of a host.minimal.
considered
Although
You
A can
reservation otherservice
store, risks
retrieve,
creates might copy,
a guaranteed
ofnot appear
This architecture decouples the and delete
network incontrol
minimumvirtualized
files,and as well
resourceenvironments
forwarding controlaswhich
asallocation that thus usersbe
must can
with,
The and
to be.continuous uses operation from, CSPs.
audit logging is composed of three functions,important processes:
aundertake
met
Implementation
result
enabling by ofthe choices
network ofmade controlsby the
control requires
to architect,
become cooperation
implementer,
directly and anda clearcustomer, virtualization
■■
■■ Cloud
Detecting
Encryption: service new Usingprovider:
events: ThePerson,
an encryption goal organization,
ofmethod
auditing toprogrammable
is or
to entity
rewrite detect andinthe
the responsible
information
data an underlying
for making a
security
encrypted
these
A
demarcation
thetrust
risks host actions.
zonewith
traditionally
infrastructure can If you
be
physicalare want
defined
seencompute
as the as ability
a
including network
resources to
the search
segment
to
following: or
allow to have
within
a guest a central
which
to power data repository
on and
service
events.
format to maketoitshould
available
Policies be abstracted
tounreadable
service for applications
consumers.
be created without thatthe defineencryption and network
what securityservices.
a key.Crypto-shredding:event isThe and SDN howBecause
Cloud
flows
■■ object
operate.
of infrastructure
relatively
responsibility
Guest
architecture
■■ Cloud metadata
breakout:
has
carrier: freely,
thebetweenhas
that
This
following
The a number
whereas
other
the
occurs
intermediary CSP of
applications
data
whenand
characteristics:characteristics
flowing
that the
there
providescan
cloud
is ina and
drawthat
breakout out
consumer. can
on,
connectivity ofofbe
you the
a distinct
generally
trust
Without
guest
and OS zone
transportso haveisof to
that it can
to
theaddress
first three it.Adding
optionsnew are rules:
not fully Rules are builttoto detect new events. Rules allow
applicable for
implement
subject
that,
This
advantages
access
■■ there
reservation
Directly is realizing
in
the hypervisor aprogrammable:
real risk for certain
is traditionally
orBCDR,
other depending
guests.
Network important
available This on
control the iscontrols
isforpresumably
eitherscenario:
directly to orbeRAM,
CPUfacilitated
programmableabsent. by For
or aboth, example,
as it is
hypervisor
because
cloud
mapping
cloud services
computing, between the CSPs
only and
reasonable cloud consumers.
method remaining is encrypting the data.
them
to
IaaS
■■ stronger
needed.
flaw. yourself.
Rapid restrictions.
Amazon
elasticity andS3 Some andexamples
on-demand otherself-service
object of trust storage zones
lead systems
to ainclude
flexible provide
demilitarized REST APIs
infrastructure that
decoupled
In
of
The the
expectedNISTfrom
process Cloud
values forwarding
of encrypting Computing
to log files
the functions.
reference
and
data detect
to dispose model,
events. the network
itIniscontinuous
ofhardening called andoperation
digital communication
shredding or be
that
zones
A
can
■■ limit
providersallowcreates
beSnapshot
quickly programmers
typically a maximum
deployed
and do
image notto to work
ceiling
consider
execute
security: with
anfor
The guest athe
actual resource
OS
portabilitycontainers
DRrole. without and
allocation. their
hitting
ofInadministrators
images objects.
This
andthis ceiling
responsibility.
unexpected
snapshots may
function
mode, Agile:
rules
crypto-shredding. Abstracting
is provided
have to be control
as updated
part of the tofromcloud
address forwarding
carrier
new risks.lets practice, is an IPmakes
dynamically service,
APIs
The
(DMZs);
fixed,
Consider
ceilings.
people can
key or be
issue
site-specific
it
this
maybroken
forgetdelivered that
visual
that be into
the
images multiple
zones,
CCSP
expandable,
responsibility such
has
and snapshots formats,
to as
allowingbesegmentation
matrix aware
can two
for
across of
of
the
contain which
with
the follow:
according
object
acquisition
cloud
sensitive storage
to
environment
of
information department
more systems
compute
andpart or
is
adjust
increasingly
■■ Reducing
Crypto-shredding false through
positives:
is the process IPv4
The and
quality
of deliberately IPv6. of This
the IP network
continuous
destroying the might
operations
encryption not be
audit
keys thatof
logging
Planning
that
function;
(Figure
resources
■■
■■ REST:
Broad andnetwork
A.3). requirements
A software analysis:
architecture
connectivity Business
reducesstyle operational and
consisting security
ofrisk. requirements
guidelines and best and practices
need
the protecting.
network-wide
public
depends traffic
Internet. flow to meet changing needs.
were
data
and
XSS
for flaws
through
standards usedon to the
application-defined
consistencyoccur
aareborrowing
beingability
encrypt whenever to
the
isdetermined.
achievedgradually
data
scheme anoriginally.
zones, only reduce
application
from such
This eventually.
the
phase the
asBecause
the
root number
takes
is three
the the
Whenever
resourceuntrusted
main offocus
data
tiers false
is you
of
provider positives
aencrypted
data
of web update
the and with
application.
(the
project the you
a file,
host).
■■
■■
2. Which Cloud
Sprawl:
Centrallyof infrastructure
the This occurs
managed:
following providers
when
Network
statements you have
lose
intelligence
about resilient
control
SDN is of infrastructure,
the
(logically)
are amount
correct? of and
centralized
(Choose contentantwo.)
external
in on your
to
In maintain
keys,
the
mayhave
sends
Shares
managers
creating the
STRIDE
it to
are data
to
andaoperational
scalable is
wait
web
used rendered
threat
to until
browser
stakeholders.
web efficiency.
model,
the
arbitrate unreadable
services6 the
change
without
the
Meetings This
following
is
issues (at
proper requires
least
propagated
with six
associated until
managers, constant
threats
validation the
to are
all
with or improvement
encryption
considered
the escaping.
compute
stakeholders, replicas protocol
and XSS of
before
resource the
used
allows
users
BCDR
image
a. SDN provider
store
softwarebased enables has the
you potential
totoexecute the for being plane
control experienced software and oncapable
general-purpose because
rule
can
requests
and
are
■■ set
be
attackers
In aheld
controlsin
broken
federated
contention SOAP: to use.
returnare orenvironment,
determine
A is capable
used
protocol addressof being
requirements.
specificationthere
the brute-forced
isforan
threats:
The identity
software
exchanging byprovider
an
development attacker).
structured and aTorelying
lifecycle
information perform
calls in the
their
SDN
hardware,technical
controllersallowing and that people
formaintain
the resourcesa
decoupling global arefrom beingspecific
view of shared
the across awhich
network,
network number
hardware ofconfigurations
appears tenants.
■■
proper
the
to
ISO/IEC
■■
for executeContract
latest
situations.
party. crypto-shredding,
The 27034-1
Spoofing:
allPay-per-use version.
scripts
Resource
identityand
business requirements
implementation authority
defines
in
Attacker
of can Thisthe
provider
webmean consider
makes
assumes
services maintenance:
victim’s
an
contention ASMP
holds
(functional
in the
object
identityfollowing:
browser,
to
implies
all
computer manage
storage
theand Points
the
of which
identities of contact
unsuitable
and
existence
subject
nonfunctional)
networks7 can
maintain
and hijack
of for
for
too
generates applicable
user
each
data
many
tobebea defined sessions,
that
a regulatory
changes
requests
token
eventhandeface
forfor
■■
to
and applications
allowing for and the policy
use of that
engines
commodity theas total
a BCDR
single,
servers. logicalstrategy
Further, switch.
thecanuse of lot cheaper
softwarebased
authorities,
■■
frequently.
websites,
ANF.
known
resources
before The
Tampering:
initial national
data
ASMP
or
based should
redirect
design ison and
Attacker be
created
the
the
begins. local
encrypted
user
actualin
alterslaw
five
Planningto enforcement,
data completely
malicious
steps:
available or messages
for the and other
without
sites.
resources
quality legalrequirements
leaving
currently
assurance jurisdictional
clear
in thetext system. andIf
alternative
■■
controllers solutions.
Programmatically
permits a During
view of normal
configured:the network operation,
SDN lets
that the BCDR
network
presents managers
a solution
logical is likely
configure,
switch to to
manage,
authorities
However,
1.
users.
resource
remaining.
■■ Theitshould
Specifying provides
thethe
relying be
application
partymaintained
a good
is thesolution andwith
requirements
service regularly
offor thedata
provider andupdated
that
environment
and isdoesas per
consumes not thechange
business
these much,need
tokens.
have
secure,
the aRepudiation:
identification
low
and
applications cost.of
optimize
Illegitimate
running
risks
network
associated
above,
denial
resources
allowing
an
quickly
for
event
project
access via
also
dynamic,
via APIs
done in
automated
that can
the planning
be SDN
used to
such
2.
■■ Assessing
contention
(that
stage. as
is,
The
The abackups,
change application
takes
technique
Informationrequirements inarchives,
place,
impacted
mustare
disclosure: security
share
make video
then values
scopesure
Informationrisks
andorthat
analyzed audio
aarechange
the
is used
for files,
intoany
encryption
obtained
their and VM
prioritize
compliance
keys
without
validity andimages.
compute
are resource
obligation).
totally
authorization
the possibility of
Of course,
programs,
configure, as
which part
manage, of
they due
and can diligence
write
secure in
themselves
network your BCDR
because
resources. plan, you
the programs should do validate
not all
depend
Logical
3.
ThisCreating
access ensures
unrecoverable.
■■ design
for
Denial ofthemand
directfor data
maintaining
service: separation
complianceAttacker the needs
ANF
liaisons to
have be incorporated
been established at the
and following
will prepare
incorporating
assumptions into the systemoverloads to be developed. system to deny legitimate access
on
b.
4.
all
The proprietary
SDN’s
Provisioning
guests
levels:
for
This a Uptime
forensic
can be assigned
hard software.
objective and
Institute
investigation
to a is to
operating
certain
is
accomplisha provide
leader
requiring the
number
if a
in
an clearly
application
data
rapidof
external defined
shares.
center
engagement ornetwork
design
The shares
withand control
management.
law areparty planeistopermitted
weighed
enforcement. manage
and used
■■
with Elevation
Defining:
the candidate of
This privilege:
phaseprovider
service isAttacker
meantand togains
clearly
ensure a CSP
privilege
define
that they
other
and level
are
third
above
document
documented what
the product
■■
network
5.
as
The Open
Auditing
a American
Their “Data thestandards
trafficthe
Centerthat
security
Society based
isSite
not andand
separated
of the
ofInfrastructure
Heating, vendor fromneutral:
application the forwarding
Refrigeration,
Tier When
Standard: andbe implemented
plane.
Air Conditioning
Topology” through open
whatThis approach
document
■■
manages
5. In aCompute
Secure
requirements
in your federated
SLAs. to nodes
disposal:
keys. environment,
place Policies
them who procedures
in front is
of thethe relying
customer shallparty,and established
and
get them does with
approved. it supporting
do?This
standards,
A number
percentage
provides
Engineers
allows SDN
of
the
(ASHRAE)
forprocesses
network simplifies
authentication
against
baseline all
control that
Technical network
tomethods
outstanding
many
become design
are
enterprises
Committee shares
directly and
supported assigned
9.9 operation
use with
createdto and
rate because
iSCSI:
a in their
widelyuse instructions
data
by alldisposal
acceptedcenter
powered-on
set
■■
a. TheManagement
business
is done relying
throughparty plane
andis the
a requirement technical
identity measures
provider;
specification it programmable
implemented
consumeswhich
document, for
the the and
tokens
consists
for
secure thatdynamic
ofthe all service
the
The
of
guests
designs.
are
■■ two
guidelines
provided
adjustment
and keyofchallenges
Kerberos:
Storage
complete by for Aoptimal
SDN
traffic
nodes
removal with
controllers
network
flows to the
temperature
addressdeployment
instead
authentication and
of
changing and
humidity
multiple,
protocol use
patterns of IPSec
set
vendor-specific
designed of totofollow:
ispoints provide
consumption.SDN in devices
the data
strong isand center.
enables
provider
product generates.
requirements toofbedata from
designed alland storage
developed media. This
during the ensure
project data
lifecycle. not
to
■■ calculate
Within
The
protocols. a host
guidelines
document
Configuration
authentication
you to execute the the amount
cluster,
are
describes management:
control of
resources
available planeresources
a four-tiered are
as software
theThe2008 each
allocated
use ASHRAE
onof guest
architecture
IPSec andisEnvironmental
given
managed
for data
optional, access as ifto.
center
and asthey The higher
Guidelines
design,
such, many for
with
■■
recoverable
b.
■■ The Control
relying
Designing: by plane
any
party This computer
is phase
the service forensic
helps provider;
in specifying itspecific
means.Incident consumes
hardware
hardware,
response
theand tokens legal
system thatpreparation:
the customer
requirements If a
the
each
are
Datacom
for pooled
endpoint
client/server
allowing
■■ Network for or
Equipment.
devicesthe jointly
connecting
applications
binding available
These
of to
by
specific to all
guidelines
cloud
using membersspecify
infrastructure
secret
network key
hardwareof theconfigurations.
a required
do
cryptography. cluster.
not have and The
IPSec
The use
allowable of resource-
support
Kerberos
Further, range of
follow-up
generates.
and overall action
system concerning
architecture. a personThe system design specifications serve as inputand
sharing
temperature
share
tier
enabledbeing
protocol
the use value
of and
uses and humidity,
progressively
assigned
configured.
strong
software-based toIfmore
the
cryptographyIPSec as
guest,
controllers follows:
secure,
issonotthe
that reliable,
larger
enabled
permits a client the
onand
a view can percentage
the redundant
endpoint,
prove
ofrequires
the networkitslegal of
theninthe
identity itsdepending
that design
remaining
to aservera(and
presents
or
for organization
the next phase after of an information
the64.4°
model. Threat securitymodeling incident and secure design action,
elementsrefine
resources
concepts
Low-end
operational
on
vice the
logical versa)switchsuch
temperature
configuration
across as reservations
choices
insecuremade
an applications
toprocedures,
the F limits
(18°
network C)
on the
running and shares
server side
connection.
above, may
allowing of the
After be a forused
IPSec
client accessto
and further
solution,
via APIs that
proper
should forensic
be discussed here. including chain of custody, should be required for
When using maintenance mode, which Customer Customer Logging and Customer 1
two items
What are the
arethree
disabled
generally
and which
accepted
item IaaS,
accessDRaaS, and PaaS,
accessSECaaS, and SaaS,
alerts PaaS,
are access and
Desktop as a 3
remains
service
What ismodels
aenabled?
key characteristic
of cloud computing?
of a honeypot? alerts
and
Isolated, are
PaaS logging
and
Isolated, IaaSare disabled
and
ComposedIaaS while of alerts are
service,
Composed PaaS,
of 2
What does the concept of nondestructive Detected
disabled
nonmonitore Known
monitored
disabled Detected
virtualized
the ability to disabled
Known
physical
and IaaS 1
testing mean
Seeking in the
to follow context
good designof practices
a vulnerabilitie
while
d
A statement
logging vulnerabilities
while
environment
A series alerts
of vulnerabilities
deploy
infrastructure
A designnew while
vulnerabilities
infrastructure
A logicalthe 4
vulnerability
What
and should configuration
principles, the CCSP shouldmanagement
create the senvironment
remainsare
Financial
of work not are
remain
Change
interviews not are
VMs
policy
IT not
service
remains ability
are
network
Business notto 2
assessment?
always
physical
What be
are tiedobjectives
network
the to?design ofbased
change
on which of exploited
enabled. to a
management
Respond exploited
Ensure
enabled.
management
with that exploited
enabled. to
statement
management
Respond power on
exploited
design
relationship
Ensure that 1 2
the following?
management?
What is the definition
(Chooseofallanthat
incident
apply.) during the
customer’s
An during
changes
stakeholders
A planned the are afterunknown
The
business the and VMs
before
The
management
all identified
changes the 1
What is thetodifference
according between BC and
the ITIL framework? vulnerability
unplanned
BC
changing is defined vulnerability
recorded
interruption
BC is defined and vulnerability
BC
cause
IT is defined
of one
requests remains
vulnerability
root
BC
are is cause
defined of 4
BCM? are the four steps in the risk-
What assessment.
as
interruption
Assessing,
business the assessment.
evaluated.
Framing,
as
to a holistic
an IT assessment.
or
Framing,
as
for more
the
change enabled.
assessment.
aprioritized,
Monitoring,
as problem
the 2
management
An organization process?
will conduct a risk capability
Threats an IT toof
requirement
to
monitoring, its Threats
service or
assessing,
process to
that aits problems
that willtoof
monitoring,
Threats
capability its planned,toof
assessing,
Threats
capability its 3
assessment
What is the minimum
to evaluateand which
customary
of the service
s while or a
the
assets,
transferring,
Due reduction in
monitoring,
assets,
Risk
identifies assets,
the first
disassociate
documenting,
Asset assets,
the
Due
tested, care
optimizing, 4
following?
practice
Within the
of realm
responsible
of IT security,
protectionwhich
of assets
of organization
reduction
and
maximizingin
vulnerabilitie
diligence
Threat vulnerabilities
and
potential
the quality of
mitigation
Threat vulnerabilities
and
responder
services to
protection
Vulnerability vulnerabilities
and
Threat
organization
implemented, 2
thatfollowing
the
Qualitative risk
combinations
assessment is best
earmarked
defines to
sresponding
Ease
value
the not
coupled continue
of
present
quality
andwith of present
Can
an ITbe to
responding
coupled
threats in
withthe
an present
with business
responding
coupled
Detailed
continue in the
with present
Can
documented,
responding
coupled
to be in
continue the
with 2
affects
risk?
by
SLE which a community
of the following?
is calculated or societal
by using which norm?
of the implementati
an
ain
delivery
reducing
Asset IT value
the
breach of completed
aenvironment,
service
Asset value,by
vulnerability
organization environment,
delivery
needs.
an
metrics
Assetattack of
value
used completed
aenvironment,
breach
delivery
and
LAFE andof
reviewed of by
ARO 3
What is the process flow of digital
following? products
on;
service itARO
environment
incidents, can be
Identification
and and likelihood
the
personnel
Identification
LAFE, theand the
Identification
for
and likelihood
calculating
productsexposure the
personnel
Identification
in a likelihood
security
products 3
forensics? ,or
completed
disruption,
of the
services at
incident that
with
of
SAFE
impacts incident
aa threat
limited
to that
of
or incident
risk
factor a threat
and
services ease at that
with
of incident
aa threat
controlled
or serviceslimitedat
by personnel
likelihood
and rework.
acceptable understandin
and
will
business evidence,
be will
and
acceptable
of be
evidence, will
understandin
acceptable
and
manner.be
evidence,
predefined
with
that
evidence, aa threat grealized
examination,
of the risk
operations by realized
collection,
implementati
predefined by grealized
collection,
of the risk-
predefined by
levels
will
limited be
analysis, taking
assessment
collection,
that those taking
examination,
on
levels taking
assessment
analysis,
levels
When does the EU Data Protection understandin
following
realized
The directive
collection, bya process
analysis,
threats,
advantage
The and
ifand
directive of advantage
analysis,
following
The and
aof
directive advantage
process
following
examination,
The and
directive aof 1
Which of (Directive
Directive the following are contractual
95/46/EC) apply to disruptive
gtaking
Concurrently
applies
examination, to an
uses
presentation
applies
Use exposure,
realized, ofdetailed
to an
presentation
applies
exposure,
Redundant
disruptive to an
detailed
and
Scopeexposure,
disruptive
applies ofto 2 4
components
What
data does anthat auditthescope
CCSPstatement
should review incident.
advantage
of
data
The
and the risk of
maintainable the
metrics
data
The impact
required
subcontractor
might used the
data
listimpact
site
A
incident. of all the the
metrics
presentation
data
processing
The impact
outcome
incident. used 2
and
provide
understand
processed?
Which oftothe
a cloudfully
service
following when customer
contracting
should or
be carried assessment
BCM
an
processed
credentials
presentation
site
Define is scope
exposure, by for
Identify
that
level
sprocessed
cause. calculating
ofBC by that
processed
infrastructure
security
Obtain
BCM is in that
for
of calculating
processed
Conduct
BCM the isaudit, by 3
withfirst
organization?
out
What aisCSP?
the (Choose
when
first
seeking two.)
international
to perform
set of
a gap process
infrastructur
and
ISO/IEC
the
automated
of the
definedimpact as a the
information
potential
ISO/IEC
arisk
providesexposure
natural 27005
arisks the
ISO/IEC
exposure
course
capacity
controls
management
defined 27002
to aof
as be the
risk
as
ISO/IEC
well
exposure
information
defined
automated as
27018
asany
a 4
What
analysis?
privacyis controls
domain A.16
in theofcloud?
the ISO holisticand
that
auditors,
Security
emeans
objectives
27032 as being
person
for
Organizationa
therealized
framework client
in the being
an
System
activity
components
audited
support.
holistic realized being
means
findings
Security
holisticrealized
gathering. inthat
the 4
27001:2013
What is a data
standard?
custodian responsible for? Policy
the
data
well
management
The exposure
as the
safe lor
Asset
will
course
Data
for have
content,
of on
building will
Security
management
that
Logginghave on
fallsand will
need
Incident
management
coursehave
Customer toofbeon 1
What is typically not included in an SLA? process that
Management
Availability
custody,
being
contained
projected another
organization
Management
Change
organizational
purely
context, and the
outside
Management
alerts
Pricing
process for
for allthe
that the
addressed
Management
Dispute
processand
purely
access that 3
identifies
realized
in
cost
of paper
the of the
transport, will organization,
personal
subject
associated
management
resilience to the organization,
the
data
services
scopetoofbe
identifies organization,
personal
alerts
mediation
identifies for all
actualon of
have
files.
audit
services
storage to
the process
and
activities.
audit
business
withthe to to
the fullybe
rules and
covered the by
potential
community and
process
potential
activities.
data the to total
be
threats
be
data,covered
and
organization, residual
understand
used
capability of residual
law,
the SLA
threats suchrisk
as risk
used
threats
to an
and
by the
theSLA
implementati an effective
risk
(and agree) public
to an safety. to an
organization
residual
on of risk with
response the that organization organization
and the
business scope,
safeguards focus, and the and the
Maintenance mode is utilized when updating or configuring different
According
components to “Theof the NIST cloud Definition
environment. of Cloud While Computing,”
in maintenance the threemode, customer
access
A
service honeypot models is used
are astofollows: detect, deflect, or in some manner counteract attempts
is blocked,
During
at
■■ SaaS: and
a vulnerability
unauthorized Customers alerts
use ofare can disabled.
assessment,
information
use the provider’s (Logging
the cloudisenvironment
systems. still enabled.)
Generally,
applications is tested
arunning
honeypot on foraconsists
cloud of
The
a computer,
known basic
infrastructure. ideadata,
vulnerabilities.of physical
or a Detected design is
network sitethat
vulnerabilities
thatit communicates
appears aretonot bedecisions
exploited
part of a network during abut is
The
actually need
vulnerability
aboutapplications
The to
the hardware tie configuration
areused to deliver
accessible management
froma system.
various client to change
The following management
devices through is true about a isa physical
Change
assessment
because
isolated
network
thin client management
change
and
design: (nondestructive
monitored
interface suchhas as
management several
and a web objectives:
testing)
thathas to and
seems
browser approve
tomay
(for require
containany changes
example, further
information
web-based to validation
alloremail)
production
a resourceortoa detect
of
According
systems
value
false
■■
program positives.
Respond to the
It isinterface.
created to aITIL
from
The framework,
customer’s
a logical network
consumer an incident
changing
does business
notdesign
manage is defined
requirements
or control as thean unplanned
while maximizing
underlying
It
value
■■
cloud Itis
interruption
prior
to important
to
attackers.
and them to
reducing
often
infrastructure, to an
expandsunderstand
taking IT service
place.
incidents,
elements
including the
In or difference
a
other reduction
disruption, words,
found inservers,
network, and between
in
there
rework.
a logical the
OSs, BC
quality
should
design and BCM:
of
never
storage, or even an IT
beservice.
aindividual
change that
15.
is
■■ What
Risk-managementBC:
Respond is
The the difference
a capability
to processes
business ofandbetween
the include
organization BC and
framing BCM?
risk, diagram
fortodesign
continue assessingdelivery risk,
of
be products asora line
For
applicationinstance, WAN
capabilities, connection
with theIT onrequests
possiblea logical exception change of thatlimited alignscan services
user-specific shown with
application
An
a.
allowed
responding
services
business
between organization
BC is defined
to take
two to will
as
place
risk,
buildings. theconduct
and capability
to a riskofassessment
a Configuration
monitoring risk. Item(or
the organization (CI) riskin analysis)
atoproduction
continue to delivery
system of unless
configuration settings. When transformed into a physical design, that single line can
products
Due
change
Note
evaluate
at
needs.
expand diligence
the
acceptable management
four
the
into is
steps
following: the in
predefined
the connection,act has
theofapproved
levels investigating
risk-management
following
routers, and aand
theotherchange understanding
disruptive first.
process,
equipment incidentwhich
at each the
includes
(Source:
end risksof ISO the
the risk
the
■■ PaaS: Consumers can deploy onto the cloud infrastructure consumer-created or
or
company
A
■■ services
vulnerability
assessment Threats
22301:2012).BCM:
■■ Ensure atthat
faces. toacceptable
Achanges
isitsacompany
lack
assets
A ofare
holistic predefined
practices
a countermeasure
management
recorded levels
and following
dueevaluated.
care
process orby athat a disruptive
developing
weakness identifies insecurity incident.
apotential
countermeasurepolicies,
threats to
connection.
acquired applications created using programming languages and tools that the
BCM
procedures,
SLE
step
that
■■
an
■■ is
must
is
and defined
in be
place.
the
Vulnerabilities
Ensure as
calculated
information
A a
that authorized holistic
threat
presentto is provide
and
anymanagement
in the
changes an
communications
potential
environmentestimateprocess
danger of
flows that
loss.
that is identifies
SLE
necessary is
associated definedtoactual
with
make threats
the
the
The
provider actual connection
supports. Themedia consumer might doesbeare not prioritized,
shown manage orplanned,
on a physical controldesign tested,
the as implemented,
well as
underlying
to
and
as
SLE
process
■■ an
the
exploitation
organization organization
standards.
must difference
The be
work of
likelihood
and Due
calculated and
between
effectively
a care
that the
to
vulnerability. a impacts
shows
the
provide
(Figure
threat original
that
TheA.5).
will antobea
threat business
company
value
estimateis
realized and
that byoperations
ofhasthe
loss.
someone,
takingtaken
remaining
SLE that
responsibility
isor
advantage definedthose
value
something, threats,
ifofrealized,
an theif
ofexposure
for
an asset
will
documented,
manufacturers
cloud infrastructure, and andthe impacts
reviewed
other intoanetwork,
qualities
including business
controlled
of the servers, operations
manner.
network that
implementation.
OSs, those
orbuilding
storage, threats,
but has control
realized,
activities
after
as
identify
The
(or
might the
probability
cause.will
difference
figure that cause.
take
illustrates
and
Itthatprovides BCM
between
placethe
frequency provides
within
the
process
a frameworkwhen original
the a
flow
dealingframework
corporation
value
of
forrecorded digital and for
and
with quantitative
building the
forensics has
remaining
taken
(Figureorganizational
assessment) the
value necessary
A.6). of an asset
■■
over Ensure
the deployed all changes
applications to CIspossibly
and are applicationinorganizational
the configuration
hosting resilience
environment management
resilience
asteps
after
Cloud
■■ single to
specific exploit.
help
vulnerability
forensics
Thecapability
impact that The
can formula
be and
defined
theeffective use for it
as
exposureresponsecalculating
against
applying
being realized the SLE
all company
the is as
will havethe follows:
processes or individual.
of
on interests digital
the organization Aforensics
risk is thein
with
system. the
configurations. of an that safeguards of its
with
protect
aSLE
the
■■ =the
single
likelihood asset capability
the ofvalue
exploit. company,
Countermeasures a threat (inofformula
The an × effective
$)agent
its exposure
resources,
available forthat
exploiting response
factor
and
calculating that
employees
(loss
areduce SLE
vulnerability issafeguards
due astofrom successful
follows:
and itscorresponding
possible
the keythreatprocesses,
torisks. exploit,
So due as
key
■■
■■ stakeholders,
Optimize
IaaS: The reputation,
overall
capability business brand,
provided risk;toand itcanisvalue-creating
the often
consumer
the
correct threat’s
is activities
to
to minimize
provision
ability
(Source:
business exploit
processing, ISOrisk,thebut
reputation,
diligence
abusiness
SLE
cloud%)= asset
environment. brand,(inand
value $) ×value-creating
exposure factor activities.
(loss due to successful threat exploit, as
exposure
22301:2012).
sometimes oritthat is can lessen the
appropriate to impact to the
knowingly acceptorganization
a risk because whenofa threat the potential is able to
storage,
b.%)
is BC iscan
aLosses defined
understanding
impact. include asthealack
holistic
current process
threats that
of availability and
of dataidentifies
risksassetsand due potential
duecare to data isthreatsloss, to
implementing an
theft,
exploit
benefit. a vulnerability
networks,
organization
countermeasures
alteration,
Losses
Directive and
can95/46/EC
includeother lack fundamental
of the of European computing
availability of data
Parliament resources
assetsandwhere due
of the tothe data consumer
Council loss, theft,
■■ The residual risk, or the amount of risk that is left over when appropriate
canOctober
From
and
to
or deploy
the
alteration,
of a (perhaps
provide
DoS and
24, run
contractual,
impacts
protection to
due
1995, arbitrary
regulated,
business
to
from
on thesoftware,
business and PII
operations
those
protection which
perspective,
continuity
threats. that
of Ifcan
athose
or include
individuals thethreats,
company
security OSs
following and
issues).
withdoes if not
regard applications.
realized,practice
to the mightdue
controls
TheDoS
An
cause.
care
or
should consumer
audit
and
processing BC
be scope
provides
(perhaps
due
reviewed does not
statement
diligence
due and tomanage
a frameworkprovides
pertaining
business
fully or for
understoodcontrol
the thebythe
required
tobuilding
continuity theunderlying
orlevel
securityorganizational
security
CCSP ofofwith
its cloud
information
assets,
issues).
regard infrastructure
resiliencefor
ittocan with
anybehosting the
legally
are properly applied to lessen or remove the vulnerability
butpersonal
capability
charged
Numerous
of
the has control
client
contracts (along anover
orofstages
data effective
organization
withare
and OSs,
other storage,
carried
on response
the
subject out
free
overarching toandthethat
prior
movementdeployed
tosafeguards
audit
components applications
commencing
to offullysuch the data,
understand
within and
interests
aan gap SLA): possibly
analysis
regulates
(and ofagree
its
thelimited
key
with)
An organization
ISO/IEC
stakeholders,
with
review.
processingnegligence may also document evidence of the countermeasure in a deliverable
control
the
■■ scope,
Scope 27018
ofAlthough
of
select
focus, addresses
andthey
networking
and
of processing: held
type can the privacy
ofaccountable
vary depending
components,
assessment
Clear aspects
understanding for
such
being ofperformed.
any
on cloud
asoframifications
the
host computing
thereview,
firewalls.Typically,
permissible of for
common that
types annegligence.
stages
audit
of datascope
called
reputation,
The
personal
include
consumers. an
following exhibit
thedata brand,
ISO or
domains
within
27018 evidence.
and the An
value-creating
ismake
the European up
first exhibit
the ISO
Union.
international can provide
activities.
27001:2013,
It set ofBCM
is designed an
privacyaudit
isalso
the trail
defined
tomostprotect
controls for the
aspurpose
widelyinthe
the organization
the privacy
cloud.
statement
processing includes
should the
be following:
provided. The specifications should list the for
and,
The
ISO likewise,
following
capability
following:
used
and global
27018 of evidence
theare
standard
wasstatement key
published for
roles
organization
for any internal
associated
ISMS to or
onwith
continue
implementations: external
Julydata auditors
30,management:
delivery that
2014, as a new component ofatthe
of products may or have
services questions
■■
which General
the data can ofby
be processed focusthe orISO
and objectives
utilized.
about
Within
acceptable
1.
■■
ISO Obtainthe
A.5—Security
protection Data
27001 anorganization’s
SLA,
management
of
subject:
standard. the
Policy
all following
personal
ThisISO current
Management
issupport
data
an
27018 state
contents
from
collected
individual
sets forth of
and
the
whorisk.
topics
right
afor Why
isor
code theof undertake
should
managers.
about
focus
practice be forsuch
covered
citizens
of personal anas endeavor?
oftransmission,
the
protectiondata. European
of PII in
■■ Scope
Use of of audit
subcontractors: (including exclusions)
Understanding where any processing,
Without
predefined
A.6—Corporate
Union,
2.
a■■ Define
minimum:
public Data knowing
cloudsthe levels
scope
controller: which
following
Securityand
asThis assets a are
Management
objectives.
is person critical
disruptive who and which
incident.
CSPseither alone would be
or jointly most at
with must otherwithin
risk persons an
■■
storage, Type of acting PII processors.
audit (certification, attestation, adopting
and so on)ISO/IEC 27018 operate
organization,
c.
3.
■■ BC is
A.7—Personnel
Plan
especially defined
an theititassessment
assessment
as isasnot
relatesthe
Security possible
capability
schedule.
to to
Management
the appropriately
of the
processing, thefirstusing, protect
responder
or those
in exchanging toanyassets.
continue of such delivery
data.isofThe
useAvailability
determines
under
■■
or five
Security key
of information (for
purposes
principles: example,
will foroccur.
which 99.99
requirementsAand completepercent manner of
list services
should which beanddrawn data) personal
up including data
products
4.
data
■■ Agree
processed. on a plan.
Performance
Consent: CSPs (for must example,
notformuseexpected
the personalresponse data times they receive versus maximum
for advertising response
and
■■ Assessment
the entity, location, criteria
rationale, (including ofratings)
data use (processing, transmission,
or services
protection
5. Conduct
times)
■■ Data at acceptable
directive
information
processor: encompassespredefined
gathering
In relation to the
exerciseslevels
key following
elements a
from disruptive
article 8 incident.
of the
marketing
■■ Acceptance
and storage), unlessand expressly
criteria
any limitationsinstructed or personalto do sodata,
nonpermitted by the thiscustomers.
uses. isContractually,
any person other
the than
In addition, a an
BCM
6.
■■ is
Interview
European defined
Security key as a holistic
personnel. management process that identifies potential threats
employee
customer
■■ should
Deliverables
requirement forand beprivacy
the able to of
procuring employthe data
the(for
organization example,
serviceto bewithout
informedencrypting
having as totoall stored
consent
where data and
to the
has
to
7. an organization
Review
Convention
transmitted
of the data supporting
on Human
controller and who the impacts
documentation.
Rights,
processes which tostates
business onitsbehalfoperations
intention of thetotop that
respect those thethreats,
rights of
use
■■
been ofprovided
her personal
Classification or will data befor
(confidential, advertising
utilized by athe
highly data
or marketing.
confidential,
subcontractor is secret,
essential. data secret, public, and so

You might also like