Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium ISC CCSP Dumps Questions Answers

Page: 1 / 19
Total 512 questions

Certified Cloud Security Professional (CCSP) Questions and Answers

Question 1

Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.

What term pertains to the application of scientific norms and protocols to digital investigations?

Options:

A.

Scientific

B.

Investigative

C.

Methodological

D.

Forensics

Buy Now
Question 2

You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?

Options:

A.

Measured service

B.

Broad network access

C.

Resource pooling

D.

On-demand self-service

Question 3

If a key feature of cloud computing that your organization desires is the ability to scale and expand without limit or concern about available resources, which cloud deployment model would you MOST likely be considering?

Options:

A.

Public

B.

Hybrid

C.

Private

D.

Community

Question 4

With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.

What is the term associated with this determination?

Options:

A.

Weighting

B.

Prioritization

C.

Shares

D.

Scoring

Question 5

With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?

Options:

A.

Structured and hierarchical

B.

Volume and object

C.

Volume and database

D.

Structured and unstructured

Question 6

Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?

Options:

A.

Unstructured

B.

Object

C.

Volume

D.

Structured

Question 7

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

Options:

A.

Distributed clustering

B.

Distributed balancing

C.

Distributed optimization

D.

Distributed resource scheduling

Question 8

Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?

Options:

A.

Injection

B.

Cross-site request forgery

C.

Missing function-level access control

D.

Cross-site scripting

Question 9

With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?

Options:

A.

Filtering and forwarding

B.

Filtering and firewalling

C.

Firewalling and forwarding

D.

Forwarding and protocol

Question 10

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

Options:

A.

Archive

B.

Share

C.

Store

D.

Destroy

Question 11

Most APIs will support a variety of different data formats or structures.

However, the SOAP API will only support which one of the following data formats?

Options:

A.

XML

B.

XSLT

C.

JSON

D.

SAML

Question 12

When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.

What is the data encapsulation used with the SOAP protocol referred to as?

Options:

A.

Packet

B.

Payload

C.

Object

D.

Envelope

Question 13

Modern web service systems are designed for high availability and resiliency. Which concept pertains to the ability to detect problems within a system, environment, or application and programmatically invoke redundant systems or processes for mitigation?

Options:

A.

Elasticity

B.

Redundancy

C.

Fault tolerance

D.

Automation

Question 14

Which aspect of SaaS will alleviate much of the time and energy organizations spend on compliance (specifically baselines)?

Options:

A.

Maintenance

B.

Licensing

C.

Standardization

D.

Development

Question 15

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

Options:

A.

Hypervisor

B.

Management plane

C.

Object storage

D.

Encryption

Question 16

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

Options:

A.

APIs

B.

Scripts

C.

TLS

D.

XML

Question 17

Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.

Which concept encapsulates this?

Options:

A.

Validity

B.

Integrity

C.

Accessibility

D.

Confidentiality

Question 18

Within a federated identity system, which entity accepts tokens from the identity provider?

Options:

A.

Assertion manager

B.

Servicing party

C.

Proxy party

D.

Relying party

Question 19

Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.

Which of the following is NOT a regulatory system from the United States federal government?

Options:

A.

HIPAA

B.

SOX

C.

FISMA

D.

PCI DSS

Question 20

What type of masking strategy involves making a separate and distinct copy of data with masking in place?

Options:

A.

Dynamic

B.

Replication

C.

Static

D.

Duplication

Question 21

What is used for local, physical access to hardware within a data center?

Options:

A.

SSH

B.

KVM

C.

VPN

D.

RDP

Question 22

What is a serious complication an organization faces from the perspective of compliance with international operations?

Options:

A.

Different certifications

B.

Multiple jurisdictions

C.

Different capabilities

D.

Different operational procedures

Question 23

What expectation of data custodians is made much more challenging by a cloud implementation, especially with PaaS or SaaS?

Options:

A.

Data classification

B.

Knowledge of systems

C.

Access to data

D.

Encryption requirements

Question 24

Which of the following roles involves testing, monitoring, and securing cloud services for an organization?

Options:

A.

Cloud service integrator

B.

Cloud service business manager

C.

Cloud service user

D.

Cloud service administrator

Question 25

Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?

Options:

A.

Unvalidated redirects and forwards

B.

Insecure direct object references

C.

Security miscomfiguration

D.

Sensitive data exposure

Question 26

Which of the following is the biggest concern or challenge with using encryption?

Options:

A.

Dependence on keys

B.

Cipher strength

C.

Efficiency

D.

Protocol standards

Question 27

Which of the following APIs are most commonly used within a cloud environment?

Options:

A.

REST and SAML

B.

SOAP and REST

C.

REST and XML

D.

XML and SAML

Question 28

Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?

Options:

A.

SATA

B.

iSCSI

C.

TLS

D.

SCSI

Question 29

From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?

Options:

A.

Notification

B.

Key identification

C.

Data collection

D.

Virtual image snapshots

Question 30

Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?

Options:

A.

SAS-70

B.

SOC 2

C.

SOC 1

D.

SOX

Question 31

Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?

Options:

A.

IaaS

B.

DaaS

C.

SaaS

D.

PaaS

Question 32

Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?

Options:

A.

SP 800-153

B.

SP 800-145

C.

SP 800-53

D.

SP 800-40

Question 33

Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?

Options:

A.

European Union

B.

Germany

C.

Russia

D.

United States

Question 34

What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?

Options:

A.

Scripts

B.

RDP

C.

APIs

D.

XML

Question 35

GAAPs are created and maintained by which organization?

Options:

A.

ISO/IEC

B.

AICPA

C.

PCI Council

D.

ISO

Question 36

Which technology is NOT commonly used for security with data in transit?

Options:

A.

DNSSEC

B.

IPsec

C.

VPN

D.

HTTPS

Question 37

When is a virtual machine susceptible to attacks while a physical server in the same state would not be?

Options:

A.

When it is behind a WAF

B.

When it is behind an IPS

C.

When it is not patched

D.

When it is powered off

Question 38

Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?

Options:

A.

Cloud service manager

B.

Cloud service deployment

C.

Cloud service business manager

D.

Cloud service operations manager

Question 39

Which crucial aspect of cloud computing can be most threatened by insecure APIs?

Options:

A.

Automation

B.

Redundancy

C.

Resource pooling

D.

Elasticity

Question 40

Which of the following service capabilities gives the cloud customer the most control over resources and configurations?

Options:

A.

Desktop

B.

Platform

C.

Infrastructure

D.

Software

Question 41

Which of the following is a commonly used tool for maintaining system configurations?

Options:

A.

Maestro

B.

Orchestrator

C.

Puppet

D.

Conductor

Question 42

What is an often overlooked concept that is essential to protecting the confidentiality of data?

Options:

A.

Strong password

B.

Training

C.

Security controls

D.

Policies

Question 43

Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?

Options:

A.

Russia

B.

France

C.

Germany

D.

United States

Question 44

What changes are necessary to application code in order to implement DNSSEC?

Options:

A.

Adding encryption modules

B.

Implementing certificate validations

C.

Additional DNS lookups

D.

No changes are needed.

Question 45

Which of the following would be a reason to undertake a BCDR test?

Options:

A.

Functional change of the application

B.

Change in staff

C.

User interface overhaul of the application

D.

Change in regulations

Question 46

What does the REST API use to protect data transmissions?

Options:

A.

NetBIOS

B.

VPN

C.

Encapsulation

D.

TLS

Question 47

Which European Union directive pertains to personal data privacy and an individual's control over their personal data?

Options:

A.

99/9/EC

B.

95/46/EC

C.

2000/1/EC

D.

2013/27001/EC

Question 48

Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?

Options:

A.

Infrastructure

B.

Platform

C.

Application

D.

Data

Question 49

What provides the information to an application to make decisions about the authorization level appropriate when granting access?

Options:

A.

User

B.

Relying party

C.

Federation

D.

Identity Provider

Question 50

Which of the following is NOT one of five principles of SOC Type 2 audits?

Options:

A.

Privacy

B.

Processing integrity

C.

Financial

D.

Security

Question 51

Where is an XML firewall most commonly deployed in the environment?

Options:

A.

Between the application and data layers

B.

Between the IPS and firewall

C.

Between the presentation and application layers

D.

Between the firewall and application server

Question 52

What is the minimum regularity for testing a BCDR plan to meet best practices?

Options:

A.

Once year

B.

Once a month

C.

Every six months

D.

When the budget allows it

Question 53

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?

Options:

A.

Functionality

B.

Programming languages

C.

Software platform

D.

Security requirements

Question 54

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?

Options:

A.

Broad network access

B.

Interoperability

C.

Resource pooling

D.

Portability

Question 55

Which value refers to the percentage of production level restoration needed to meet BCDR objectives?

Options:

A.

RPO

B.

RTO

C.

RSL

D.

SRE

Question 56

What process is used within a clustered system to provide high availability and load balancing?

Options:

A.

Dynamic balancing

B.

Dynamic clustering

C.

Dynamic optimization

D.

Dynamic resource scheduling

Question 57

What is a standard configuration and policy set that is applied to systems and virtual machines called?

Options:

A.

Standardization

B.

Baseline

C.

Hardening

D.

Redline

Question 58

Which crucial aspect of cloud computing can be most threatened by insecure APIs?

Options:

A.

Automation

B.

Resource pooling

C.

Elasticity

D.

Redundancy

Question 59

Which of the following provides assurance, to a predetermined acceptable level of certainty, that an entity is indeed who they claim to be?

Options:

A.

Authentication

B.

Identification

C.

Proofing

D.

Authorization

Question 60

Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:

Options:

A.

Ransomware

B.

Syn floods

C.

XSS and SQL injection

D.

Password cracking

Question 61

When an organization is considering a cloud environment for hosting BCDR solutions, which of the following would be the greatest concern?

Options:

A.

Self-service

B.

Resource pooling

C.

Availability

D.

Location

Question 62

APIs are defined as which of the following?

Options:

A.

A set of protocols, and tools for building software applications to access a web-based software application or tool

B.

A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or tool

C.

A set of standards for building software applications to access a web-based software application or tool

D.

A set of routines and tools for building software applications to access web-based software applications

Question 63

Which of the following is NOT one of the components of multifactor authentication?

Options:

A.

Something the user knows

B.

Something the user has

C.

Something the user sends

D.

Something the user is

Question 64

A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?

Options:

A.

UPS

B.

Generators

C.

Joint operating agreements

D.

Strict adherence to applicable regulations

Question 65

Which kind of SSAE audit report is a cloud customer most likely to receive from a cloud provider?

Options:

A.

SOC 1 Type 1

B.

SOC 2 Type 2

C.

SOC 3

D.

SOC 1 Type 2

Question 66

When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.

Which of the following would NOT be something that is predefined as part of the audit agreement?

Options:

A.

Size

B.

Format

C.

Structure

D.

Audience

Question 67

You need to gain approval to begin moving your company's data and systems into a cloud environment. However, your CEO has mandated the ability to easily remove your IT assets from the cloud provider as a precondition.

Which of the following cloud concepts would this pertain to?

Options:

A.

Removability

B.

Extraction

C.

Portability

D.

Reversibility

Question 68

Without the extensive funds of a large corporation, a small-sized company could gain considerable and cost-effective services for which of the following concepts by moving to a cloud environment?

Options:

A.

Regulatory

B.

Security

C.

Testing

D.

Development

Question 69

Deviations from the baseline should be investigated and __________________.

Options:

A.

Revealed

B.

Documented

C.

Encouraged

D.

Enforced

Question 70

What is a key capability or characteristic of PaaS?

Options:

A.

Support for a homogenous environment

B.

Support for a single programming language

C.

Ability to reduce lock-in

D.

Ability to manually scale

Question 71

What is the term we use to describe the general ease and efficiency of moving data from one cloud provider either to another cloud provider or down from the cloud?

Options:

A.

Obfuscation

B.

Elasticity

C.

Mobility

D.

Portability

Question 72

As a result of scandals involving publicly traded corporations such as Enron, WorldCom, and Adelphi, Congress passed legislation known as:

Options:

A.

SOX

B.

HIPAA

C.

FERPA

D.

GLBA

Question 73

Different security testing methodologies offer different strategies and approaches to testing systems, requiring security personnel to determine the best type to use for their specific circumstances.

What does dynamic application security testing (DAST) NOT entail that SAST does?

Options:

A.

Discovery

B.

Knowledge of the system

C.

Scanning

D.

Probing

Question 74

Which of the following frameworks focuses specifically on design implementation and management?

Options:

A.

ISO 31000:2009

B.

ISO 27017

C.

NIST 800-92

D.

HIPAA

Question 75

Which ITIL component is focused on anticipating predictable problems and ensuring that configurations and operations are in place to prevent these problems from ever occurring?

Options:

A.

Availability management

B.

Continuity management

C.

Configuration management

D.

Problem management

Question 76

The BC/DR kit should include all of the following except:

Options:

A.

Annotated asset inventory

B.

Flashlight

C.

Hard drives

D.

Documentation equipment

Page: 1 / 19
Total 512 questions