Chapter 3 ■ Cloud Data Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Data hiding

Naomi is working on a list that will include data obfuscation options for her organization. Which of the following is not a type of data obfuscation technique?

2
New cards

Performance enhancement

The goals of SIEM solution implementations include all of the following

except___________________.

3
New cards

Ephemeral

Wei’s organization uses Lambda functions as part of a serverless application inside of its Amazon-­hosted environment. What storage type should Wei consider the storage associated with the instances to be?

4
New cards

A cloud HSM

Selah wants to securely store her organization’s encryption keys. What solution should she ask her cloud service provider about?

5
New cards

The version of the executable run

Jim’s organization wants to ensure that it has the right information available in case of an attack against its web server. Which of the following data elements is not commonly used and thus shouldn’t be expected to be logged?

6
New cards

Scan for credit card numbers based on a pattern match or algorithm.

Susan wants to ensure that files containing credit card numbers are not stored in her organization’s cloud-­based file storage. If she deploys a DLP system, what method should she use to identify files with credit card numbers to have the best chance of finding them, even if she may encounter some false positives?

7
New cards

Privilege reuse

Rhonda is outlining the threats to her cloud storage environment. Which of the following is not a common threat to cloud storage?

8
New cards

Databases

Ben wants to implement tokenization for his organization’s data. What will he need to be able to implement it?

9
New cards

Testing data in sandboxed environments

Yasmine’s organization has identified data masking as a key security control. Which of the following functions will it provide?

10
New cards

IRM

Megan wants to improve the controls provided by her organization’s data loss prevention (DLP) tool. What additional tool can be combined with her DLP to most effectively enhance data controls?

11
New cards

Create

What phase of the cloud data lifecycle involves data labeling?

12
New cards

Hashing

Charles wants to ensure that files in his cloud file system have not been changed. What technique can he use to compare files to determine if changes have been made?

13
New cards

The same or greater than the data that the certificates protect.

Liam wants to store the private keys used to generate certificates for his organization. What security level should he apply to those keys?

14
New cards

Ensuring multifactor authentication

Best practices for key management include all of the following except___________________.

15
New cards

Tokenization

Valerie wants to be able to refer to data contained in a database without having the actual values in use. What obfuscation technique should she select?

16
New cards

The username

Samuel wants to check what country a file was accessed from. What information can he use to make a guess as accurate as possible, given information typically available in log entries?

17
New cards

Create, Store, Use, Share, Archive, Destroy

What is the correct order of the phases of the data lifecycle?

18
New cards

UserIDs

Stanislaw wants to use log information to create accountability for data events. Which of the following data elements would be most useful for his purpose?

19
New cards

Masking

Nina replaces all but the last four digits of credit card numbers stored in a database with asterisks. What data obfuscation technique has she used?

20
New cards

Log volume

Greg has implemented logging for his company’s worldwide web services implementation running in Azure. What concern should Greg address when he enables logging of all web requests?