Chapter 5 ■ Cloud Platform, Infrastructure, and Operational Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Improving practices

Charles is working with internal auditors to review his organization’s cloud infrastructure. Which of the following is not a common goal of internal audits?

2
New cards

Geofencing

Maria’s organization wants to ensure that logins by most malicious actors would be prohibited if a system administrator’s credentials were compromised. What technology is commonly used to check for potential malicious logins from international attacks?

3
New cards

Disk or volume encryption

Alaina wants to ensure that her system instances for a web application hosted in her cloud data center have proper security for data at rest. What solution should she select to help ensure this?

4
New cards

Hashing

Jason wants to validate that the open-source software package he has downloaded matches the official release. What technique is commonly used to validate packages?

5
New cards

A security baseline

Naomi’s organization has adopted the CIS security controls for Windows. What type of solution have they adopted?

6
New cards

Dedicated hardware instances

Yarif’s organization wants to process sensitive information in a cloud environment. The organization is concerned about data throughout its lifecycle. What protection should it select for its compute elements if security is a priority and cost is less important?

7
New cards

Removing anti-­malware agents

Valerie’s organization uses a security baseline as part of its systems configuration process. Which of the following is not a typical part of a baselining process?

8
New cards

Use end-­to-­end encryption for all communications.

Hrant wants to ensure that traffic inside of his organization’s Azure Virtual Network (VNet), Azure’s basic building block for customer IaaS instances, is secure. What should he do to protect it?

9
New cards

A snapshot

Asha is configuring a virtualized environment and wants to back up a virtualized server, including its memory state. What type of backup should she perform?

10
New cards

Operating system logs

Felix is planning for his organization’s third-­party audit process after recently switching to a cloud SaaS provider. What information will Felix most likely be unable to provide?

11
New cards

Maintenance

Mark has set up a series of tasks that make up a workflow to ensure that his cloud-­hosted web application environment scales, updates, and maintains itself. What cloud management plane feature is he leveraging?

12
New cards

VeraCrypt’s public key

Amanda downloads VeraCrypt, a free, open-­source disk encryption software package. When she downloads the software, she sees the following information on the downloads page:

What will she need to validate the signature and ensure that the software is legitimate?

<p> Amanda downloads VeraCrypt, a free, open-­source disk encryption software package. When she downloads the software, she sees the following information on the downloads page:<br><br>What will she need to validate the signature and ensure that the software is legitimate?</p>
13
New cards

A bastion host

Ting sets a system up in her Amazon VPC that exists in a low-­security, public internet–facing zone and also has an interface connected to a high-­security subnet that is used to house application servers so that she can administer those systems. What type of security solution has she configured?

14
New cards

Control of the underlying host operating system

Lisa’s organization installs virtualization tools on each virtual machine it sets up. Which of the following is not a common function of virtualization tools?

15
New cards

Type 1

Susan’s organization is a cloud service provider that runs its hypervisor directly on the underlying hardware for its systems. What type of hypervisor is Susan running?

16
New cards

Audits may disrupt their other customers or lead to risks of data exposure for those customers.

The CIO of Gurvinder’s company wants him to have its audit company perform an audit of its cloud infrastructure provider. Why are cloud infrastructure vendors unlikely to allow audits of their systems and infrastructure by customer-­sponsored third parties?

17
New cards

HSM as a service

Michelle wants to securely store her organization’s secrets using a cloud service. What tool should she select?

18
New cards

Security groups

Helen wants to apply rules to traffic in her cloud-­hosted environment. What cloud tool allows rules permitting traffic to pass or be blocked to be set based on information like the destination or source host or IP address, port, and protocol?

19
New cards

A honeypot

Jaime wants to set up a tool that will allow him to capture and analyze attacker behavior, including command-­line activity and uploaded toolkits targeted at systems in his environment. What type of tool should he deploy?

20
New cards

Zero-­day exploits

Chris is using a third-­party vulnerability scanning application in his cloud-­hosted environment. Which of the following issues is he unlikely to be able to detect with a vulnerability scanner?

21
New cards