Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Managing-Cloud-Security Questions and Answers

Question # 6

Which cloud computing characteristic allows consumers to expand or contract required resources automatically?

A.

Measured service

B.

Resource pooling

C.

On-demand self-service

D.

Rapid elasticity

Full Access
Question # 7

Which activity is within the scope of the cloud provider’s role in the chain of custody?

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Full Access
Question # 8

Which action should be taken to ensure that unencrypted network traffic is protected?

A.

Data should be transmitted using the secure socket layer (SSL) protocol.

B.

Data should be transmitted after it is compressed and password protected using gunzip (GZ).

C.

Data should be transmitted using generic routing encapsulation (GRE).

D.

Data should be transmitted using the transport layer security (TLS) protocol.

Full Access
Question # 9

Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?

A.

Software error

B.

Frequency

C.

Time

D.

Baseline

Full Access
Question # 10

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Full Access
Question # 11

Which strategy provides the highest overall cost savings for an organization implementing a business continuity and disaster recovery (BCDR) plan?

A.

Deploy a hot cloud site.

B.

Implement cross-site replication.

C.

Migrate local backups to tape.

D.

Move all services to the cloud.

Full Access
Question # 12

A company has determined that encryption has too much overhead to work with their system and has identified tokenization as an alternative. During this process, the tokenization server generates the token. Which step should occur immediately after this action?

A.

Data is sent to the tokenization server.

B.

The application generates a piece of sensitive data.

C.

The tokenization server returns the token to the application.

D.

The application stores the token rather than the original data.

Full Access
Question # 13

Which privacy issue does the Clarifying Lawful Overseas Use of Data (CLOUD) Act address?

A.

Conflicting regulations in different jurisdictions

B.

Collection and use of genetic information

C.

Data breach notification requirements

D.

Use of digital surveillance by multinational employers

Full Access
Question # 14

Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?

A.

Agile

B.

Spiral

C.

Waterfall

D.

Lean

Full Access
Question # 15

Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?

A.

Inefficient bandwidth utilization

B.

Perimeter security breach

C.

Data breach

D.

Crypto-shredding

Full Access
Question # 16

Which phase of the cloud data life cycle involves the process of crypto-shredding?

A.

Destroy

B.

Create

C.

Archive

D.

Store

Full Access
Question # 17

Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?

A.

Object-based

B.

Volume

C.

Relational database

D.

File

Full Access
Question # 18

Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?

A.

Stark Law

B.

Healthcare Quality Improvement Law

C.

Health Insurance Portability and Accountability Act

D.

Gramm-Leach-Bliley Act

Full Access
Question # 19

An organization is undergoing an ISO 27001 audit that includes a software as a service (SaaS) solution within scope, and the auditor has requested evidence of controls. What evidence should the organization provide the auditor?

A.

Network firewall rules

B.

Provider compliance attestation

C.

Operating system patch logs

D.

Physical diagram of the data center

Full Access
Question # 20

Which countermeasure should be taken during the containment, eradication, and recovery phase of the incident response lifecycle?

A.

Validate alerts

B.

Identify training

C.

Build timeline of attack

D.

Take systems offline

Full Access
Question # 21

An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?

A.

They should create a checklist of the necessary tasks.

B.

They should determine the criteria of a disaster.

C.

They should identify the key roles in a disaster.

D.

They should perform an inventory of assets.

Full Access
Question # 22

Which cloud storage architecture enhances the opportunity for data policy enforcement such as data loss prevention (DLP)?

A.

Object

B.

Flash

C.

Database

D.

Ephemeral

Full Access
Question # 23

Which phase of the cloud data lifecycle implements the file, block, or object type of cloud architecture?

A.

Archive

B.

Store

C.

Create

D.

Share

Full Access
Question # 24

Which phase in secure application design and development includes threat modeling?

A.

Define

B.

Design

C.

Training

D.

Develop

Full Access
Question # 25

Under which jurisdiction do General Data Protection Regulation (GDPR) guidelines apply?

A.

China

B.

European Union

C.

Australia

D.

United States of America

Full Access
Question # 26

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Full Access
Question # 27

What is the first phase of identity management that is used to assert the identity of the user?

A.

Centralization

B.

Decentralization

C.

Provisioning

D.

Deprovisioning

Full Access
Question # 28

Which type of regulation governs credit card transactions as a part of cloud operations?

A.

GLBA

B.

PCI DSS

C.

SOX

D.

HIPAA

Full Access
Question # 29

Which group should be notified for approval when a planned modification to an environment is scheduled?

A.

Event management team

B.

Problem management team

C.

Change management board

D.

Executive management board

Full Access
Question # 30

Which factor should be the basis of a business continuity plan?

A.

Costs

B.

Risks

C.

Customers

D.

Locations

Full Access
Question # 31

Which countermeasure should be taken during the preparation phase of the incident response lifecycle?

A.

Take the system offline

B.

Perform risk assessments

C.

Estimate the scope of the incident

D.

Build a timeline of attack

Full Access
Question # 32

Which aspect of access management safeguards data by determining the user's rights to a certain resource?

A.

Provisioning

B.

Authorization

C.

Authentication

D.

Centralization

Full Access
Question # 33

Why must the software agent management plane of the workload security control support auto-scaling and elasticity?

A.

Long-running VMs that still run standard security controls may be isolated on the network.

B.

They are locked down more than the usual servers and tend to run a smaller set of services.

C.

The traditional tools are not normally designed for that degree of velocity.

D.

Some agents require opening additional firewall ports, which increases the network attack surface.

Full Access
Question # 34

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

A.

Emergency response team (ERT)

B.

Security operations center (SOC)

C.

Disaster response team (DRT)

D.

Network operations center (NOC)

Full Access
Question # 35

An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?

A.

Indemnification

B.

Escrow

C.

Offboarding

D.

Encryption

Full Access
Question # 36

Which risk relates to the removal of a person’s information within the public cloud by legal authorities?

A.

Remote wiping

B.

Vendor lock-in

C.

Data masking

D.

Data seizure

Full Access
Question # 37

Which item should be used by a consumer to determine whether a cloud service provider is in regulatory or legal compliance?

A.

Warrant

B.

Third-party attestation

C.

Regulatory obligations

D.

Existing contract

Full Access
Question # 38

A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?

A.

Hashing

B.

Encryption

C.

Masking

D.

Tokenization

Full Access
Question # 39

A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?

A.

Sniffed network ports

B.

Cloud service provider audit logs

C.

Host agent intrusion detection system

D.

Redundant network firewalls

Full Access
Question # 40

The designers of a proposed data center are evaluating the requirements to use virtualization for the services it provides. Which type of design consideration is being addressed?

A.

Logical

B.

Regulatory

C.

Environmental

D.

Physical

Full Access
Question # 41

Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?

A.

Apache OpenStack

B.

Hypervisor

C.

VMware vSphere

D.

Open Web Application Security Project

Full Access
Question # 42

A company is interested in tokenization as an alternative to protecting data without encryption. The application will soon store the token. Which step should occur immediately before this action?

A.

The tokenization server generates the token for the application.

B.

The tokenization server returns the token to the application.

C.

An authorized application requests the token.

D.

Data is sent to the tokenization server.

Full Access
Question # 43

Which action should be taken to preserve forensic evidence for collection?

A.

Implementing serverless architectures

B.

Enabling threat modeling

C.

Pausing the virtual machine

D.

Enforcing mutable servers

Full Access
Question # 44

Which security information and event management concept focuses on account and service hijacking issues?

A.

Digital forensics

B.

Trust

C.

Lightweight Directory Access Protocol

D.

Access control

Full Access
Question # 45

Which data source provides auditability and traceability for event investigation as well as documentation?

A.

Block storage

B.

Object storage

C.

Database logs

D.

Database rows

Full Access
Question # 46

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

Full Access
Question # 47

A security analyst is tasked with compiling a report of all people who used a system between two dates. The thorough report must include information about how long and how often the system was used. Which information should the analyst ensure is in the report?

A.

Informational logs and message of the day

B.

Environmental errors and 802.1x logs

C.

User identifications and access timestamps

D.

User commands and error timestamps

Full Access
Question # 48

Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?

A.

Regulator

B.

Cloud service partner

C.

Customer

D.

Cloud service developer

Full Access
Question # 49

Which business continuity and disaster recovery consideration should be part of a cloud application architecture?

A.

Architecting for failure

B.

Health status pages

C.

Compliance of applications

D.

Application message queues

Full Access
Question # 50

A cloud consumer is scheduling a vulnerability assessment of a cloud service procured through a cloud broker. Who should the cloud consumer notify before beginning the assessment?

A.

The cloud broker

B.

The cloud consumer’s legal department

C.

The cloud consumer’s customers

D.

The cloud service provider

Full Access
Question # 51

Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?

A.

Cloud user

B.

Data controller

C.

Cloud provider

D.

Data subject

Full Access
Question # 52

Which security threat occurs when authorized users increase their level of access in an unauthorized manner?

A.

Escalation of privilege

B.

Man-in-the-middle

C.

Role assumption

D.

Segregation of duties

Full Access
Question # 53

Which U.S. standard is used by federal government agencies to manage enterprise risk?

A.

International Organization for Standardization (ISO) 37500

B.

The Statement on Standards for Attestation Engagements 18 (SSAE 18)

C.

The Committee of Sponsoring Organizations (COSO) framework

D.

The National Institute of Standards and Technology (NIST) SP 800-37

Full Access
Question # 54

Which cloud risk is associated with the supply chain due to dependency on legacy internal servers for application delivery to end users?

A.

Natural disasters

B.

Outages

C.

Fast run time

D.

Homomorphic encryption

Full Access
Question # 55

Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?

A.

Software development

B.

Procurement

C.

Quality assurance

D.

Marketing

Full Access
Question # 56

Which cloud model allows an on-premises data center to use cloud bursting?

A.

Public

B.

Hybrid

C.

Community

D.

Private

Full Access
Question # 57

An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?

A.

Resource scheduling

B.

High availability

C.

Ephemeral computing

D.

Maintenance mode

Full Access
Question # 58

Which risk is unable to be highlighted from the outset in a cloud services contract?

A.

Introduction of new technology

B.

Sunsetting of aging technology

C.

Result of an unforeseen event

D.

Changes resulting from contract renewals

Full Access
Question # 59

Which legal framework is concerned with the privacy of data of EU/EEA citizens?

A.

HIPAA

B.

GDPR

C.

COPPA

D.

APPI

Full Access
Question # 60

As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?

A.

Location-based

B.

Content-based

C.

Label-based

D.

Metadata-based

Full Access
Question # 61

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Full Access