Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CCSP Certified Cloud Security Professional (CCSP) Questions and Answers

Questions 4

Which of the following tasks within a SaaS environment would NOT be something the cloud customer would be responsible for?

Options:

A.

Authentication mechanism

B.

Branding

C.

Training

D.

User access

Buy Now
Questions 5

DNSSEC was designed to add a layer of security to the DNS protocol.

Which type of attack was the DNSSEC extension designed to mitigate?

Options:

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Data exposure

Buy Now
Questions 6

An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?

Options:

A.

Network

B.

Users

C.

Memory

D.

CPU

Buy Now
Questions 7

Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?

Options:

A.

Volume

B.

Unstructured

C.

Structured

D.

Object

Buy Now
Questions 8

Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?

Options:

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

Buy Now
Questions 9

Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.

Which of the following is the optimal temperature range as set by ASHRAE?

Options:

A.

69.8 to 86.0 degrees Fahrenheit (21 to 30 degrees Celsius)

B.

51.8 to 66.2 degrees Fahrenheit (11 to 19 degrees Celsius)

C.

64.4 to 80.6 degrees Fahrenheit (18 to 27 degrees Celsius)

D.

44.6 to 60.8 degrees Fahrenheit (7 to 16 degrees Celsius)

Buy Now
Questions 10

Data center and operations design traditionally takes a tiered, topological approach.

Which of the following standards is focused on that approach and is prevalently used throughout the industry?

Options:

A.

IDCA

B.

NFPA

C.

BICSI

D.

Uptime Institute

Buy Now
Questions 11

Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.

Which of the following is NOT a technology for securing data in transit?

Options:

A.

VPN

B.

TLS

C.

DNSSEC

D.

HTTPS

Buy Now
Questions 12

With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?

Options:

A.

Structured and unstructured

B.

Structured and hierarchical

C.

Volume and database

D.

Volume and object

Buy Now
Questions 13

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

Options:

A.

Hypervisor

B.

Management plane

C.

Object storage

D.

Encryption

Buy Now
Questions 14

ISO/IEC has established international standards for many aspects of computing and any processes or procedures related to information technology.

Which ISO/IEC standard has been established to provide a framework for handling eDiscovery processes?

Options:

A.

ISO/IEC 27001

B.

ISO/IEC 27002

C.

ISO/IEC 27040

D.

ISO/IEC 27050

Buy Now
Questions 15

For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?

Options:

A.

Half

B.

Full

C.

Minimal

D.

Depends on the contract

Buy Now
Questions 16

The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/contractors.

What technology would be useful for protecting data at this point?

Options:

A.

IDS

B.

DLP

C.

IPS

D.

WAF

Buy Now
Questions 17

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.

Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

Options:

A.

SOC Type 2, one year

B.

SOC Type 1, one year

C.

SOC Type 2, one month

D.

SOC Type 2, six months

Buy Now
Questions 18

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

Options:

A.

Distributed clustering

B.

Distributed balancing

C.

Distributed optimization

D.

Distributed resource scheduling

Buy Now
Questions 19

Which of the following aspects of security is solely the responsibility of the cloud provider?

Options:

A.

Regulatory compliance

B.

Physical security

C.

Operating system auditing

D.

Personal security of developers

Buy Now
Questions 20

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

Options:

A.

APIs

B.

Scripts

C.

TLS

D.

XML

Buy Now
Questions 21

Within a SaaS environment, what is the responsibility on the part of the cloud customer in regard to procuring the software used?

Options:

A.

Maintenance

B.

Licensing

C.

Development

D.

Purchasing

Buy Now
Questions 22

Which of the following are cloud computing roles?

Options:

A.

Cloud service broker and user

B.

Cloud customer and financial auditor

C.

CSP and backup service provider

D.

Cloud service auditor and object

Buy Now
Questions 23

Maintenance mode requires all of these actions except:

Options:

A.

Remove all active production instances

B.

Ensure logging continues

C.

Initiate enhanced security controls

D.

Prevent new logins

Buy Now
Questions 24

When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:

Options:

A.

Many states have data breach notification laws.

B.

Breaches can cause the loss of proprietary data.

C.

Breaches can cause the loss of intellectual property.

D.

Legal liability can’t be transferred to the cloud provider.

Buy Now
Questions 25

Which of the following areas of responsibility would be shared between the cloud customer and cloud provider within the Software as a Service (SaaS) category?

Options:

A.

Data

B.

Governance

C.

Application

D.

Physical

Buy Now
Questions 26

Your new CISO is placing increased importance and focus on regulatory compliance as your applications and systems move into cloud environments.

Which of the following would NOT be a major focus of yours as you develop a project plan to focus on regulatory compliance?

Options:

A.

Data in transit

B.

Data in use

C.

Data at rest

D.

Data custodian

Buy Now
Questions 27

Which of the following is the least challenging with regard to eDiscovery in the cloud?

Options:

A.

Identifying roles such as data owner, controller and processor

B.

Decentralization of data storage

C.

Forensic analysis

D.

Complexities of International law

Buy Now
Questions 28

Your company is in the planning stages of moving applications that have large data sets to a cloud environment.

What strategy for data removal would be the MOST appropriate for you to recommend if costs and speed are primary considerations?

Options:

A.

Shredding

B.

Media destruction

C.

Crypthographic erasure

D.

Overwriting

Buy Now
Questions 29

Which of the following is NOT a commonly used communications method within cloud environments to secure data in transit?

Options:

A.

IPSec

B.

HTTPS

C.

VPN

D.

DNSSEC

Buy Now
Questions 30

Best practices for key management include all of the following, except:

Options:

A.

Ensure multifactor authentication

B.

Pass keys out of band

C.

Have key recovery processes

D.

Maintain key security

Buy Now
Questions 31

A main objective for an organization when utilizing cloud services is to avoid vendor lock-in so as to ensure flexibility and maintain independence.

Which core concept of cloud computing is most related to vendor lock-in?

Options:

A.

Scalability

B.

Interoperability

C.

Portability

D.

Reversibility

Buy Now
Questions 32

As a result of scandals involving publicly traded corporations such as Enron, WorldCom, and Adelphi, Congress passed legislation known as:

Options:

A.

SOX

B.

HIPAA

C.

FERPA

D.

GLBA

Buy Now
Questions 33

The BIA can be used to provide information about all the following, except:

Options:

A.

BC/DR planning

B.

Risk analysis

C.

Secure acquisition

D.

Selection of security controls

Buy Now
Questions 34

The BC/DR kit should include all of the following except:

Options:

A.

Annotated asset inventory

B.

Flashlight

C.

Hard drives

D.

Documentation equipment

Buy Now
Questions 35

Many activities within a cloud environment are performed via programmatic means, where complex and distributed operations are handled without the need to perform each step individually.

Which of the following concepts does this describe?

Options:

A.

Orchestration

B.

Provisioning

C.

Automation

D.

Allocation

Buy Now
Questions 36

Every security program and process should have which of the following?

Options:

A.

Severe penalties

B.

Multifactor authentication

C.

Foundational policy

D.

Homomorphic encryption

Buy Now
Questions 37

What must SOAP rely on for security?

Options:

A.

Encryption

B.

Tokenization

C.

TLS

D.

SSL

Buy Now
Questions 38

Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?

Options:

A.

Interoperability

B.

Resource pooling

C.

Portability

D.

Measured service

Buy Now
Questions 39

What type of data does data rights management (DRM) protect?

Options:

A.

Consumer

B.

PII

C.

Financial

D.

Healthcare

Buy Now
Questions 40

Which protocol does the REST API depend on?

Options:

A.

HTTP

B.

XML

C.

SAML

D.

SSH

Buy Now
Questions 41

What type of security threat is DNSSEC designed to prevent?

Options:

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Injection

Buy Now
Questions 42

Which data formats are most commonly used with the REST API?

Options:

A.

JSON and SAML

B.

XML and SAML

C.

XML and JSON

D.

SAML and HTML

Buy Now
Questions 43

Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?

Options:

A.

PLAN

B.

WAN

C.

LAN

D.

VLAN

Buy Now
Questions 44

Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?

Options:

A.

Cloud service business manager

B.

Cloud service user

C.

Cloud service administrator

D.

Cloud service integrator

Buy Now
Questions 45

What is the primary reason that makes resolving jurisdictional conflicts complicated?

Options:

A.

Different technology standards

B.

Costs

C.

Language barriers

D.

Lack of international authority

Buy Now
Questions 46

What type of masking strategy involves making a separate and distinct copy of data with masking in place?

Options:

A.

Dynamic

B.

Replication

C.

Static

D.

Duplication

Buy Now
Questions 47

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

Options:

A.

Dedicated switches

B.

Trust zones

C.

Redundant network circuits

D.

Direct connections

Buy Now
Questions 48

Which of the following standards primarily pertains to cabling designs and setups in a data center?

Options:

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

Buy Now
Questions 49

What controls the formatting and security settings of a volume storage system within a cloud environment?

Options:

A.

Management plane

B.

SAN host controller

C.

Hypervisor

D.

Operating system of the host

Buy Now
Questions 50

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Options:

A.

Cloud auditor

B.

Inter-cloud provider

C.

Cloud service broker

D.

Cloud service developer

Buy Now
Questions 51

Which term relates to the application of scientific methods and practices to evidence?

Options:

A.

Forensics

B.

Methodical

C.

Theoretical

D.

Measured

Buy Now
Questions 52

Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?

Options:

A.

NFPA

B.

BICSI

C.

IDCA

D.

Uptime Institute

Buy Now
Questions 53

Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?

Options:

A.

Create

B.

Use

C.

Share

D.

Store

Buy Now
Questions 54

The baseline should cover which of the following?

Options:

A.

Data breach alerting and reporting

B.

All regulatory compliance requirements

C.

As many systems throughout the organization as possible

D.

A process for version control

Buy Now
Questions 55

User access to the cloud environment can be administered in all of the following ways except:

Options:

A.

Provider provides administration on behalf the customer

B.

Customer directly administers access

C.

Third party provides administration on behalf of the customer

D.

Customer provides administration on behalf of the provider

Buy Now
Questions 56

Which of the following is NOT a focus or consideration of an internal audit?

Options:

A.

Certification

B.

Design

C.

Costs

D.

Operational efficiency

Buy Now
Questions 57

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

Options:

A.

Platform

B.

Infrastructure

C.

Software

D.

Desktop

Buy Now
Questions 58

Which of the following would NOT be a reason to activate a BCDR strategy?

Options:

A.

Staffing loss

B.

Terrorism attack

C.

Utility disruptions

D.

Natural disaster

Buy Now
Questions 59

Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?

Options:

A.

Virtualization

B.

Multitenancy

C.

Resource pooling

D.

Dynamic optimization

Buy Now
Questions 60

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?

Options:

A.

Applications

B.

Key performance indicators (KPIs)

C.

Services

D.

Security

Buy Now
Questions 61

Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?

Options:

A.

Service-level agreements

B.

Governance

C.

Regulatory requirements

D.

Auditability

Buy Now
Questions 62

Which of the following attempts to establish an international standard for eDiscovery processes and best practices?

Options:

A.

ISO/IEC 31000

B.

ISO/IEC 27050

C.

ISO/IEC 19888

D.

ISO/IEC 27001

Buy Now
Questions 63

Which of the following would be a reason to undertake a BCDR test?

Options:

A.

Functional change of the application

B.

Change in staff

C.

User interface overhaul of the application

D.

Change in regulations

Buy Now
Questions 64

Which type of audit report is considered a "restricted use" report for its intended audience?

Options:

A.

SAS-70

B.

SSAE-16

C.

SOC Type 1

D.

SOC Type 2

Buy Now
Questions 65

Who would be responsible for implementing IPsec to secure communications for an application?

Options:

A.

Developers

B.

Systems staff

C.

Auditors

D.

Cloud customer

Buy Now
Questions 66

Which process serves to prove the identity and credentials of a user requesting access to an application or data?

Options:

A.

Repudiation

B.

Authentication

C.

Identification

D.

Authorization

Buy Now
Questions 67

Which of the following is NOT a regulatory system from the United States federal government?

Options:

A.

PCI DSS

B.

FISMA

C.

SOX

D.

HIPAA

Buy Now
Questions 68

Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?

Options:

A.

Consumable service

B.

Measured service

C.

Billable service

D.

Metered service

Buy Now
Questions 69

Which United States law is focused on PII as it relates to the financial industry?

Options:

A.

HIPAA

B.

SOX

C.

Safe Harbor

D.

GLBA

Buy Now
Questions 70

Which United States law is focused on accounting and financial practices of organizations?

Options:

A.

Safe Harbor

B.

GLBA

C.

SOX

D.

HIPAA

Buy Now
Questions 71

Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?

Options:

A.

Injection

B.

Missing function-level access control

C.

Cross-site request forgery

D.

Cross-site scripting

Buy Now
Questions 72

What is a standard configuration and policy set that is applied to systems and virtual machines called?

Options:

A.

Standardization

B.

Baseline

C.

Hardening

D.

Redline

Buy Now
Questions 73

Which of the following is NOT an application or utility to apply and enforce baselines on a system?

Options:

A.

Chef

B.

GitHub

C.

Puppet

D.

Active Directory

Buy Now
Questions 74

How many additional DNS queries are needed when DNSSEC integrity checks are added?

Options:

A.

Three

B.

Zero

C.

One

D.

Two

Buy Now
Questions 75

When an organization is considering the use of cloud services for BCDR planning and solutions, which of the following cloud concepts would be the most important?

Options:

A.

Reversibility

B.

Elasticity

C.

Interoperability

D.

Portability

Buy Now
Questions 76

Which of the following storage types is most closely associated with a database-type storage implementation?

Options:

A.

Object

B.

Unstructured

C.

Volume

D.

Structured

Buy Now
Exam Code: CCSP
Exam Name: Certified Cloud Security Professional (CCSP)
Last Update: Sep 19, 2024
Questions: 512

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80