100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
C838: Managing Cloud Security Exam $17.89   Add to cart

Exam (elaborations)

C838: Managing Cloud Security Exam

 1 view  0 purchase
  • Course
  • C838: Managing Cloud Security - ALE (Annualiz
  • Institution
  • C838: Managing Cloud Security - ALE (Annualiz

C838: Managing Cloud Security Exam - ALE (Annualized Loss Expectancy) - ALE = Single Loss Expectancy (SLE) * Annualized Rate of Occurrance (ARO); remember that AV * EF = Single Loss Expectancy (SLE) - The SLE is $5,000 and we expect two risk events to happen in a year - $5,000 (SLE) x 2 (200% A...

[Show more]

Preview 4 out of 72  pages

  • October 4, 2024
  • 72
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • c838
  • C838: Managing Cloud Security - ALE (Annualiz
  • C838: Managing Cloud Security - ALE (Annualiz
avatar-seller
NURSING2EXAM
C838: Managing Cloud
Security Exam




- ALE (Annualized Loss Expectancy)
- ALE = Single Loss Expectancy (SLE) * Annualized Rate of Occurrance (ARO);
remember that AV * EF = Single Loss Expectancy (SLE)
- The SLE is $5,000 and we expect two risk events to happen in a year
- $5,000 (SLE) x 2 (200% ARO) = $10,000 (ALE) - ✔✔✔ANSWER-- This is the
total cost (in dollars) for all of the SLEs during the year
- What is the equation for this?
- What is an example of how this works?


- All communication is passed unencrypted, including usernames & passwords
- SSH (although it is no longer considered secure)

,- Either through FTPS (using TLS) or SFTP (using SSH)
- The SCP (Secure CoPy) command line tool
- TFTP (Trivial File Transfer Protocol) - ✔✔✔ANSWER-- Why is telnet insecure?
- What was created to do the same function, but with encryption?
- What are two ways that FTP can be secured?
- What is a secure alternative to using FTP?
- What is an insecure version of FTP that is not frequently used?


- An organization writes to the "Son backup set" four days in a row. On the fifth
day, they write to the first "Father" set. The next four days, they go back and
overwrite the Son sets and on the fifth day, they write to the next Father set. On the
last day of the month, regardless of which day of the week it is or where they are in
the "Son" backup sets, they write to a "Grandfather" set.
- It allows you to choose several different points in time to potentially restore from:
any of the past 5 days, any Friday of the past four weeks, or the last day of the past
four months. This is more cost effective than storing backup data from every single
day over the past 4 months. - ✔✔✔ANSWER-- How does the Grandfather-Father-
Son backup rotation system work?
- What is the benefit of this?


- Anomaly or Heuristic Analysis
- Trend Analysis
- Behavioral Analysis
- Availability Analysis - ✔✔✔ANSWER-- The process of defining an expected
outcome or pattern to events, and then identifying any events that do not follow
these patterns by looking for outlier data points. For example: finding huge spikes
in bandwidth usage
- This looks for historical changes over time
- This detects unusual user activity such as logins at strange times

,- This provides system performance and uptime information


- Asset Value (AV)
- Exposure Factor (EF): for example, if it was determined that a flood would
destroy 50% of a data center, the EF for that risk would be 50%
- Annualized Rate of Occurrence (ARO) - ✔✔✔ANSWER-- A dollar value
assigned to an asset based on actual cost and nonmonetary expenses.
- The proportion of an asset's value that is likely to be destroyed by a particular risk
(expressed as a percentage).
- The number of times that a risk is expected to occur in a particular year.


- Blockchain
- Originally created for cryptocurrency, but can also address important business
needs where immutable ledgers would be useful, such as property ownership,
tracking supply chains (ensuring items came from reputable sources and allowing
regulators to track items easily), and tracking vital records such as passports, birth
certificates, etc. - ✔✔✔ANSWER-- This is a distributed, immutable ledger. It can
store records in a way that distributes those records among many different systems
around the world and do so in a manner which prevents anyone from tampering
with the records. It creates a data store that nobody can tamper with or destroy.
- What was this originally created for, and what are three larger business
applications for this technology?


- Broad network access
- Metered service - ✔✔✔ANSWER-- A feature of cloud computing defined by
availability using a wide variety of client devices, such as PCs, laptops, tablets, and
smartphones, and only needing an internet connection
- A feature of cloud computing where you only pay for resources based on how
much you use them

, - Buffer Overflow
- Input Validation: do not accept any submissions larger, or with different
characters than, what is expected - ✔✔✔ANSWER-- An attack where an
application receives more input, or different input, than it expects. It exposes
system memory that is normally inaccessible. For example, inputting 4,000 digits
into a 5-digit zip code field
- How is this defended against?


- Class A: common combustibles such as wood, cloth, and trash
- Class B: flammable liquids like gasoline and oil
- Class C: electrical fires (useful for data centers)
- Class D: heavy metal fires (industrial applications)
- Class K: kitchen fires (fats and oils)
1. Wet Pipe System: water is constantly kept in the pipes. This is not favorable for
a data center since a ruptured pipe can cause severe damage to electronic
equipment.
2. Dry Pipe System: pipes do not contain water until a valve opens during a fire
alarm - ✔✔✔ANSWER-- What are the five types of fire extinguishers? Keep in
mind that some types of extinguishers can meet multiple types, and this will be
mentioned on its label.
- What are two methods of facility fire suppression systems?


- Cloud Service Providers
- Cloud Service Partners - ✔✔✔ANSWER-- Who provides cloud computing
services for sale to third parties?
- Who provides add-on services to cloud computing?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller NURSING2EXAM. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.89. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.89
  • (0)
  Add to cart