Data Life Cycle
Cloud Storage Architecture
Threats to Cloud Storage
Designing and Applying Security Strategies
Export and Import Restrictions Regulations
100

Stage of data in long-term storage.

What is archive?

100

This type of cloud storage architecture gives structure to stored data.

What are databases?

100

What threat involves an attacker overwhelming a webserver, website, or network unavailable for a user?

What is denial-of-service?

100

Technology used to protect data integrity.

What is hashing?

100

The person responsible for understanding and complying with crypto restrictions.

What is the security professional?

200

Responsibilities of data owners.

What is classifying, protecting, and overseeing use of data?

200

This type of storage architecture is a blank volume that the user can put anything into.

What is block storage?

200

This attack is performed with use of information inadvertently exposed by the system.

What is a side channel attack?

200

 Technology used to protect data at rest.

What is encryption?

200

This is the primary focus of the Export Administration Regulations. (EAR)

What is prohibiting the export of technologies that can be used for both commercial and military purposes?

300

Action often performed on data being stored.

What is provisioning access rights OR securing data locations OR encryption?

300

Amazon’s Glacier and Google's Coldline tiers are examples of this type of storage.

What is long-term storage?

300

This storage type has a risk of being already allocated or distributed directly on a device.

What is raw data?

300

Strategy for limiting privileges across an organization.

What is the principle of least privilege?

300

The Wassenaar agreement is composed of this many countries.

What is 41?

400

The best method of destroying data in a cloud environment.

What is crypto-shredding?

400

This type of storage architecture is attached to instances and is only present while instances are executing.

What is ephemeral storage?

400

This storage type is also a risk to the incident response and forensics process.

What is ephemeral storage?

400

Technology that often provides a graphical display in the form of a dashboard.

What is SIEM? (System Information & Events Management)

400

The State Department’s prohibitions on exporting defense related data.

What are the International Traffic in Arms Regulations (ITAR)

500

The full lifecycle for data in the cloud, in order.

What is create, store, use, archive, share, destroy?

500

This type of storage architecture allows for marking, labeling, and classification of data as well as enhancing indexing.

What is object-based storage?

500

What storage type has the risks of exposure and malicious access, exposure and integrity of the data, and denial of service and service outages?

What is long-term Storage?

500

This technology deletes raw data from the data set and displays a replacement set.

What is nulls?

500

The type of restriction the International Traffic in Arms Regulations (ITAR) falls under

What is export restriction?

M
e
n
u