Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CCSP Exam Dumps - Certified Cloud Security Professional (CCSP)

Question # 4

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

A.

TLS

B.

HTTPS

C.

VPN

D.

IRM

Full Access
Question # 5

A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?

A.

UPS

B.

Generators

C.

Joint operating agreements

D.

Strict adherence to applicable regulations

Full Access
Question # 6

Cryptographic keys for encrypted data stored in the cloud should be ________________ .

A.

Not stored with the cloud provider.

B.

Generated with redundancy

C.

At least 128 bits long

D.

Split into groups

Full Access
Question # 7

When an organization is considering the use of cloud services for BCDR planning and solutions, which of the following cloud concepts would be the most important?

A.

Reversibility

B.

Elasticity

C.

Interoperability

D.

Portability

Full Access
Question # 8

In attempting to provide a layered defense, the security practitioner should convince senior management to include security controls of which type?

A.

Physical

B.

All of the above

C.

technological

D.

Administrative

Full Access
Question # 9

Which of the following storage types is most closely associated with a database-type storage implementation?

A.

Object

B.

Unstructured

C.

Volume

D.

Structured

Full Access
Question # 10

What is the intellectual property protection for a confidential recipe for muffins?

A.

Patent

B.

Trademark

C.

Trade secret

D.

Copyright

Full Access
Question # 11

Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?

A.

Segregated from host systems

B.

Network access

C.

Scalability

D.

External to system patching

Full Access
Question # 12

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?

A.

Memory

B.

Number of users

C.

Storage

D.

CPU

Full Access
Question # 13

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

A.

APIs

B.

Scripts

C.

TLS

D.

XML

Full Access
Question # 14

An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?

A.

Network

B.

Users

C.

Memory

D.

CPU

Full Access
Question # 15

Database activity monitoring (DAM) can be:

A.

Host-based or network-based

B.

Server-based or client-based

C.

Used in the place of encryption

D.

Used in place of data masking

Full Access
Question # 16

When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.

Which of the following is NOT one of the three main approaches to data discovery?

A.

Content analysis

B.

Hashing

C.

Labels

D.

Metadata

Full Access
Question # 17

Which of the following is considered a technological control?

A.

Firewall software

B.

Firing personnel

C.

Fireproof safe

D.

Fire extinguisher

Full Access
Question # 18

Which of the following are distinguishing characteristics of a managed service provider?

A.

Be able to remotely monitor and manage objects for the customer and proactively maintain these objects under management.

B.

Have some form of a help desk but no NOC.

C.

Be able to remotely monitor and manage objects for the customer and reactively maintain these objects under management.

D.

Have some form of a NOC but no help desk.

Full Access
Question # 19

What is the Cloud Security Alliance Cloud Controls Matrix (CCM)?

A.

A set of software development life cycle requirements for cloud service providers

B.

An inventory of cloud services security controls that are arranged into a hierarchy of security domains

C.

An inventory of cloud service security controls that are arranged into separate security domains

D.

A set of regulatory requirements for cloud service providers

Full Access
Question # 20

Which of the following terms is not associated with cloud forensics?

A.

eDiscovery

B.

Chain of custody

C.

Analysis

D.

Plausibility

Full Access
Question # 21

What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?

A.

Dynamic clustering

B.

Dynamic balancing

C.

Dynamic resource scheduling

D.

Dynamic optimization

Full Access
Question # 22

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

A.

Community

B.

Hybrid

C.

Private

D.

Public

Full Access
Question # 23

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?

A.

Functionality

B.

Programming languages

C.

Software platform

D.

Security requirements

Full Access
Question # 24

Which of the following is NOT something that an HIDS will monitor?

A.

Configurations

B.

User logins

C.

Critical system files

D.

Network traffic

Full Access
Question # 25

Over time, what is a primary concern for data archiving?

A.

Size of archives

B.

Format of archives

C.

Recoverability

D.

Regulatory changes

Full Access
Question # 26

Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?

A.

regulatory requirements

B.

Auditability

C.

Service-level agreements

D.

Governance

Full Access
Question # 27

Which of the cloud cross-cutting aspects relates to the ability to easily move services and applications between different cloud providers?

A.

Reversibility

B.

Availability

C.

Portability

D.

Interoperability

Full Access
Question # 28

Which attribute of data poses the biggest challenge for data discovery?

A.

Labels

B.

Quality

C.

Volume

D.

Format

Full Access
Question # 29

What is a standard configuration and policy set that is applied to systems and virtual machines called?

A.

Standardization

B.

Baseline

C.

Hardening

D.

Redline

Full Access
Question # 30

Which of the cloud cross-cutting aspects relates to the oversight of processes and systems, as well as to ensuring their compliance with specific policies and regulations?

A.

Governance

B.

Regulatory requirements

C.

Service-level agreements

D.

Auditability

Full Access
Question # 31

Which audit type has been largely replaced by newer approaches since 2011?

A.

SOC Type 1

B.

SSAE-16

C.

SAS-70

D.

SOC Type 2

Full Access
Question # 32

What must SOAP rely on for security?

A.

Encryption

B.

Tokenization

C.

TLS

D.

SSL

Full Access
Question # 33

Which value refers to the percentage of production level restoration needed to meet BCDR objectives?

A.

RPO

B.

RTO

C.

RSL

D.

SRE

Full Access
Question # 34

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

A.

Platform

B.

Infrastructure

C.

Software

D.

Desktop

Full Access
Question # 35

Which aspect of security is DNSSEC designed to ensure?

A.

Integrity

B.

Authentication

C.

Availability

D.

Confidentiality

Full Access
Question # 36

Which crucial aspect of cloud computing can be most threatened by insecure APIs?

A.

Automation

B.

Redundancy

C.

Resource pooling

D.

Elasticity

Full Access
Question # 37

What does dynamic application security testing (DAST) NOT entail?

A.

Scanning

B.

Probing

C.

Discovery

D.

Knowledge of the system

Full Access
Question # 38

What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?

A.

Dynamic clustering

B.

Dynamic balancing

C.

Dynamic resource scheduling

D.

Dynamic optimization

Full Access
Question # 39

Which value refers to the percentage of production level restoration needed to meet BCDR objectives?

A.

RPO

B.

RTO

C.

RSL

D.

SRE

Full Access
Question # 40

From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions?

A.

Access provisioning

B.

Auditing

C.

Jurisdictions

D.

Authorization

Full Access
Question # 41

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?

A.

Applications

B.

Key performance indicators (KPIs)

C.

Services

D.

Security

Full Access
Question # 42

What type of security threat is DNSSEC designed to prevent?

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Injection

Full Access
Question # 43

Which of the following service capabilities gives the cloud customer an established and maintained framework to deploy code and applications?

A.

Software

B.

Desktop

C.

Platform

D.

Infrastructure

Full Access
Question # 44

What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?

A.

Anonymization

B.

Tokenization

C.

Masking

D.

Obfuscation

Full Access
Question # 45

Where is a DLP solution generally installed when utilized for monitoring data at rest?

A.

Network firewall

B.

Host system

C.

Application server

D.

Database server

Full Access
Question # 46

Which cloud deployment model would be ideal for a group of universities looking to work together, where each university can gain benefits according to its specific needs?

A.

Private

B.

Public

C.

Hybrid

D.

Community

Full Access
Question # 47

Within a federated identity system, which of the following would you be MOST likely to use for sending information for consumption by a relying party?

A.

XML

B.

HTML

C.

WS-Federation

D.

SAML

Full Access
Question # 48

In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?

A.

Limit

B.

Cap

C.

Throttle

D.

Reservation

Full Access
Question # 49

Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.

What term pertains to the application of scientific norms and protocols to digital investigations?

A.

Scientific

B.

Investigative

C.

Methodological

D.

Forensics

Full Access
Question # 50

Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

A.

Regulation

B.

Multitenancy

C.

Virtualization

D.

Resource pooling

Full Access
Question # 51

With a federated identity system, where would a user perform their authentication when requesting services or application access?

A.

Cloud provider

B.

The application

C.

Their home organization

D.

Third-party authentication system

Full Access
Question # 52

In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?

A.

Demagnetizing

B.

Shredding

C.

Degaussing

D.

Cryptographic erasure

Full Access
Question # 53

Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?

A.

Hardening

B.

Leveling

C.

Baselines

D.

Standards

Full Access
Question # 54

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

A.

Archive

B.

Share

C.

Store

D.

Destroy

Full Access
Question # 55

Where is an XML firewall most commonly and effectively deployed in the environment?

A.

Between the application and data layers

B.

Between the presentation and application layers

C.

Between the IPS and firewall

D.

Between the firewall and application server

Full Access
Question # 56

Which of the following aspects of security is solely the responsibility of the cloud provider?

A.

Regulatory compliance

B.

Physical security

C.

Operating system auditing

D.

Personal security of developers

Full Access
Question # 57

Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?

A.

Unstructured

B.

Object

C.

Volume

D.

Structured

Full Access
Question # 58

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?

A.

Inter-cloud provider

B.

Cloud service business manager

C.

Cloud service administrator

D.

Cloud service integrator

Full Access
Question # 59

What does a cloud customer purchase or obtain from a cloud provider?

A.

Services

B.

Hosting

C.

Servers

D.

Customers

Full Access
Question # 60

Which of the following technologies is NOT commonly used for accessing systems and services in a cloud environment in a secure manner?

A.

KVM

B.

HTTPS

C.

VPN

D.

TLS

Full Access
Question # 61

The BC/DR kit should include all of the following except:

A.

Annotated asset inventory

B.

Flashlight

C.

Hard drives

D.

Documentation equipment

Full Access
Question # 62

DLP solutions can aid in deterring loss due to which of the following?

A.

Power failure

B.

Performance

C.

Bad policy

D.

Malicious disclosure

Full Access
Question # 63

What type of solution is at the core of virtually all directory services?

A.

WS

B.

LDAP

C.

ADFS

D.

PKI

Full Access
Question # 64

When using an IaaS solution, what is a key benefit provided to the customer?

A.

Metered and priced on the basis of units consumed

B.

Increased energy and cooling system efficiencies

C.

Transferred cost of ownership

D.

The ability to scale up infrastructure services based on projected usage

Full Access
Question # 65

Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?

A.

PLAN

B.

WAN

C.

LAN

D.

VLAN

Full Access
Question # 66

Which of the following is not a component of contractual PII?

A.

Scope of processing

B.

Value of data

C.

Location of data

D.

Use of subcontractors

Full Access
Question # 67

Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?

A.

Sensitive data exposure

B.

Security misconfiguration

C.

Insecure direct object references

D.

Unvalidated redirect and forwards

Full Access
Question # 68

From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?

A.

Notification

B.

Key identification

C.

Data collection

D.

Virtual image snapshots

Full Access
Question # 69

Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?

A.

A Type 2 hypervisor runs on top of another operating system and is dependent on the security of the OS for its own security.

B.

A Type 2 hypervisor allows users to directly perform some functions with their own access.

C.

A Type 2 hypervisor is open source, so attackers can more easily find exploitable vulnerabilities with that access.

D.

A Type 2 hypervisor is always exposed to the public Internet for federated identity access.

Full Access
Question # 70

Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?

A.

European Union

B.

Germany

C.

Russia

D.

United States

Full Access
Question # 71

Which United States law is focused on data related to health records and privacy?

A.

Safe Harbor

B.

SOX

C.

GLBA

D.

HIPAA

Full Access
Question # 72

Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?

A.

SAS-70

B.

SOC 2

C.

SOC 1

D.

SOX

Full Access
Question # 73

Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?

A.

Security misconfiguration

B.

Insecure direct object references

C.

Sensitive data exposure

D.

Unvalidated redirects and forwards

Full Access
Question # 74

Which of the following standards primarily pertains to cabling designs and setups in a data center?

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

Full Access
Question # 75

Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?

A.

SP 800-153

B.

SP 800-145

C.

SP 800-53

D.

SP 800-40

Full Access
Question # 76

Within an Infrastructure as a Service model, which of the following would NOT be a measured service?

A.

CPU

B.

Storage

C.

Number of users

D.

Memory

Full Access
Question # 77

Which data formats are most commonly used with the REST API?

A.

JSON and SAML

B.

XML and SAML

C.

XML and JSON

D.

SAML and HTML

Full Access
Question # 78

Which protocol does the REST API depend on?

A.

HTTP

B.

XML

C.

SAML

D.

SSH

Full Access
Question # 79

Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?

A.

Storage

B.

Application

C.

Mamory

D.

CPU

Full Access
Question # 80

What is the only data format permitted with the SOAP API?

A.

HTML

B.

SAML

C.

XSML

D.

XML

Full Access
Question # 81

Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?

A.

IPS

B.

WAF

C.

DLP

D.

IDS

Full Access
Question # 82

What type of data does data rights management (DRM) protect?

A.

Consumer

B.

PII

C.

Financial

D.

Healthcare

Full Access
Question # 83

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

A.

Platform

B.

Infrastructure

C.

Software

D.

Desktop

Full Access