Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CCSP Certified Cloud Security Professional Questions and Answers

Questions 4

Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.

What type of attack is this?

Options:

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

Buy Now
Questions 5

Where is a DLP solution generally installed when utilized for monitoring data in use?

Options:

A.

Application server

B.

Database server

C.

Network perimeter

D.

User’s client

Buy Now
Questions 6

Which of the following aspects of security is solely the responsibility of the cloud provider?

Options:

A.

Regulatory compliance

B.

Physical security

C.

Operating system auditing

D.

Personal security of developers

Buy Now
Questions 7

Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.

Which of the following is NOT a regulatory system from the United States federal government?

Options:

A.

HIPAA

B.

SOX

C.

FISMA

D.

PCI DSS

Buy Now
Questions 8

If you are running an application that has strict legal requirements that the data cannot reside on systems that contain other applications or systems, which aspect of cloud computing would be prohibitive in this case?

Options:

A.

Multitenancy

B.

Broad network access

C.

Portability

D.

Elasticity

Buy Now
Questions 9

The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/contractors.

What technology would be useful for protecting data at this point?

Options:

A.

IDS

B.

DLP

C.

IPS

D.

WAF

Buy Now
Questions 10

Three central concepts define what type of data and information an organization is responsible for pertaining to eDiscovery.

Which of the following are the three components that comprise required disclosure?

Options:

A.

Possession, ownership, control

B.

Ownership, use, creation

C.

Control, custody, use

D.

Possession, custody, control

Buy Now
Questions 11

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.

Which of the following is NOT something that firewalls are concerned with?

Options:

A.

IP address

B.

Encryption

C.

Port

D.

Protocol

Buy Now
Questions 12

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.

Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

Options:

A.

SOC Type 2, one year

B.

SOC Type 1, one year

C.

SOC Type 2, one month

D.

SOC Type 2, six months

Buy Now
Questions 13

Within a federated identity system, which entity accepts tokens from the identity provider?

Options:

A.

Assertion manager

B.

Servicing party

C.

Proxy party

D.

Relying party

Buy Now
Questions 14

Different types of audits are intended for different audiences, such as internal, external, regulatory, and so on.

Which of the following audits are considered "restricted use" versus being for a more broad audience?

Options:

A.

SOC Type 2

B.

SOC Type 1

C.

SOC Type 3

D.

SAS-70

Buy Now
Questions 15

With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.

What is the term associated with this determination?

Options:

A.

Weighting

B.

Prioritization

C.

Shares

D.

Scoring

Buy Now
Questions 16

Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.

Which role would you be assuming under this directive?

Options:

A.

Cloud service administrator

B.

Cloud service user

C.

Cloud service integrator

D.

Cloud service business manager

Buy Now
Questions 17

If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

Options:

A.

Kerberos support

B.

CHAP support

C.

Authentication

D.

Encryption

Buy Now
Questions 18

What does SDN stand for within a cloud environment?

Options:

A.

Software-dynamic networking

B.

Software-defined networking

C.

Software-dependent networking

D.

System-dynamic nodes

Buy Now
Questions 19

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Options:

A.

Cloud auditor

B.

Inter-cloud provider

C.

Cloud service broker

D.

Cloud service developer

Buy Now
Questions 20

Which of the following is NOT a criterion for data within the scope of eDiscovery?

Options:

A.

Possession

B.

Custody

C.

Control

D.

Archive

Buy Now
Questions 21

Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?

Options:

A.

Cloud service user

B.

Cloud service business manager

C.

Cloud service administrator

D.

Cloud service integrator

Buy Now
Questions 22

What type of PII is controlled based on laws and carries legal penalties for noncompliance with requirements?

Options:

A.

Contractual

B.

Regulated

C.

Specific

D.

Jurisdictional

Buy Now
Questions 23

Which of the following standards primarily pertains to cabling designs and setups in a data center?

Options:

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

Buy Now
Questions 24

From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?

Options:

A.

Notification

B.

Key identification

C.

Data collection

D.

Virtual image snapshots

Buy Now
Questions 25

Which of the following roles is responsible for peering with other cloud services and providers?

Options:

A.

Cloud auditor

B.

Inter-cloud provider

C.

Cloud service broker

D.

Cloud service developer

Buy Now
Questions 26

Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?

Options:

A.

Consumable service

B.

Measured service

C.

Billable service

D.

Metered service

Buy Now
Questions 27

Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?

Options:

A.

Cloud service manager

B.

Cloud service deployment

C.

Cloud service business manager

D.

Cloud service operations manager

Buy Now
Questions 28

Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?

Options:

A.

On-demand self-service

B.

Resource pooling

C.

Measured service

D.

Rapid elasticity

Buy Now
Questions 29

Which security concept is focused on the trustworthiness of data?

Options:

A.

Integrity

B.

Availability

C.

Nonrepudiation

D.

Confidentiality

Buy Now
Questions 30

Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?

Options:

A.

Six months

B.

One month

C.

One year

D.

One week

Buy Now
Questions 31

What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?

Options:

A.

Masking

B.

Anonymization

C.

Tokenization

D.

Obfuscation

Buy Now
Questions 32

Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?

Options:

A.

Reservations

B.

Measured service

C.

Limits

D.

Shares

Buy Now
Questions 33

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

Options:

A.

Platform

B.

Infrastructure

C.

Software

D.

Desktop

Buy Now
Questions 34

What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?

Options:

A.

Proxy

B.

Bastion

C.

Honeypot

D.

WAF

Buy Now
Questions 35

Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?

Options:

A.

regulatory requirements

B.

Auditability

C.

Service-level agreements

D.

Governance

Buy Now
Questions 36

What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?

Options:

A.

Dynamic clustering

B.

Dynamic balancing

C.

Dynamic resource scheduling

D.

Dynamic optimization

Buy Now
Questions 37

Which of the following is NOT one of five principles of SOC Type 2 audits?

Options:

A.

Privacy

B.

Processing integrity

C.

Financial

D.

Security

Buy Now
Questions 38

Which of the following is the MOST important requirement and guidance for testing during an audit?

Options:

A.

Stakeholders

B.

Shareholders

C.

Management

D.

Regulations

Buy Now
Questions 39

Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?

Options:

A.

Community

B.

Public

C.

Hybrid

D.

Private

Buy Now
Questions 40

Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?

Options:

A.

RSL

B.

RPO

C.

SRE

D.

RTO

Buy Now
Questions 41

Which of the following is NOT a function performed by the record protocol of TLS?

Options:

A.

Encryption

B.

Acceleration

C.

Authentication

D.

Compression

Buy Now
Questions 42

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?

Options:

A.

Functionality

B.

Programming languages

C.

Software platform

D.

Security requirements

Buy Now
Questions 43

Which of the following service categories entails the least amount of support needed on the part of the cloud customer?

Options:

A.

SaaS

B.

IaaS

C.

DaaS

D.

PaaS

Buy Now
Questions 44

Which of the following is NOT an application or utility to apply and enforce baselines on a system?

Options:

A.

Chef

B.

GitHub

C.

Puppet

D.

Active Directory

Buy Now
Questions 45

Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?

Options:

A.

Structured

B.

Unstructured

C.

Volume

D.

Object

Buy Now
Questions 46

Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?

Options:

A.

Create

B.

Use

C.

Share

D.

Store

Buy Now
Questions 47

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

Options:

A.

Dedicated switches

B.

Trust zones

C.

Redundant network circuits

D.

Direct connections

Buy Now
Questions 48

Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?

Options:

A.

Unstructured

B.

Object

C.

Volume

D.

Structured

Buy Now
Questions 49

Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?

Options:

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

Buy Now
Questions 50

Which phase of the cloud data lifecycle would be the MOST appropriate for the use of DLP technologies to protect the data?

Options:

A.

Use

B.

Store

C.

Share

D.

Create

Buy Now
Questions 51

What is a serious complication an organization faces from the perspective of compliance with international operations?

Options:

A.

Different certifications

B.

Multiple jurisdictions

C.

Different capabilities

D.

Different operational procedures

Buy Now
Questions 52

What does the REST API support that SOAP does NOT support?

Options:

A.

Caching

B.

Encryption

C.

Acceleration

D.

Redundancy

Buy Now
Questions 53

Which technology is NOT commonly used for security with data in transit?

Options:

A.

DNSSEC

B.

IPsec

C.

VPN

D.

HTTPS

Buy Now
Questions 54

Which of the following is NOT a regulatory system from the United States federal government?

Options:

A.

PCI DSS

B.

FISMA

C.

SOX

D.

HIPAA

Buy Now
Questions 55

Which protocol does the REST API depend on?

Options:

A.

HTTP

B.

XML

C.

SAML

D.

SSH

Buy Now
Questions 56

What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?

Options:

A.

Anonymization

B.

Tokenization

C.

Masking

D.

Obfuscation

Buy Now
Questions 57

Which value refers to the amount of data an organization would need to recover in the event of a BCDR situation in order to reach an acceptable level of operations?

Options:

A.

SRE

B.

RTO

C.

RPO

D.

RSL

Buy Now
Questions 58

Data labels could include all the following, except:

Options:

A.

Data value

B.

Data of scheduled destruction

C.

Date data was created

D.

Data owner

Buy Now
Questions 59

The baseline should cover which of the following?

Options:

A.

Data breach alerting and reporting

B.

All regulatory compliance requirements

C.

As many systems throughout the organization as possible

D.

A process for version control

Buy Now
Questions 60

Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?

Options:

A.

CPU

B.

Users

C.

Memory

D.

Network

Buy Now
Questions 61

Which of the following concepts is NOT one of the core components to an encryption system architecture?

Options:

A.

Software

B.

Network

C.

Keys

D.

Data

Buy Now
Questions 62

In which cloud service model is the customer required to maintain the OS?

Options:

A.

Iaas

B.

CaaS

C.

PaaS

D.

SaaS

Buy Now
Questions 63

Data masking can be used to provide all of the following functionality, except:

Options:

A.

Secure remote access

B.

test data in sandboxed environments

C.

Authentication of privileged users

D.

Enforcing least privilege

Buy Now
Questions 64

What is the cloud service model in which the customer is responsible for administration of the OS?

Options:

A.

QaaS

B.

SaaS

C.

PaaS

D.

IaaS

Buy Now
Questions 65

The BC/DR kit should include all of the following except:

Options:

A.

Annotated asset inventory

B.

Flashlight

C.

Hard drives

D.

Documentation equipment

Buy Now
Questions 66

Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:

Options:

A.

Full inventory

B.

Criticality

C.

Value

D.

Usefulness

Buy Now
Questions 67

What category of PII data can carry potential fines or even criminal charges for its improper use or disclosure?

Options:

A.

Protected

B.

Legal

C.

Regulated

D.

Contractual

Buy Now
Questions 68

What concept does the D represent within the STRIDE threat model?

Options:

A.

Denial of service

B.

Distributed

C.

Data breach

D.

Data loss

Buy Now
Questions 69

Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?

Options:

A.

Continuity management

B.

Availability management

C.

Configuration management

D.

Problem management

Buy Now
Questions 70

The cloud customer’s trust in the cloud provider can be enhanced by all of the following except:

Options:

A.

SLAs

B.

Shared administration

C.

Audits

D.

real-time video surveillance

Buy Now
Questions 71

A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.

However, what is one consideration that is often overlooked with the formulation of a BCDR plan?

Options:

A.

Availability of staff

B.

Capacity at the BCDR site

C.

Restoration of services

D.

Change management processes

Buy Now
Questions 72

Which of the following report is most aligned with financial control audits?

Options:

A.

SSAE 16

B.

SOC 2

C.

SOC 1

D.

SOC 3

Buy Now
Questions 73

All of the following are techniques to enhance the portability of cloud data, in order to minimize the potential of vendor lock-in except:

Options:

A.

Ensure there are no physical limitations to moving

B.

Use DRM and DLP solutions widely throughout the cloud operation

C.

Ensure favorable contract terms to support portability

D.

Avoid proprietary data formats

Buy Now
Questions 74

Which of the following types of data would fall under data rights management (DRM) rather than information rights management (IRM)?

Options:

A.

Personnel data

B.

Security profiles

C.

Publications

D.

Financial records

Buy Now
Questions 75

Which of the following jurisdictions lacks a comprehensive national policy on data privacy and the protection of personally identifiable information (PII)?

Options:

A.

European Union

B.

Asian-Pacific Economic Cooperation

C.

United States

D.

Russia

Buy Now
Questions 76

Which format is the most commonly used standard for exchanging information within a federated identity system?

Options:

A.

XML

B.

HTML

C.

SAML

D.

JSON

Buy Now
Exam Code: CCSP
Exam Name: Certified Cloud Security Professional
Last Update: May 2, 2024
Questions: 512
CCSP pdf

CCSP PDF

$28  $80
CCSP Engine

CCSP Testing Engine

$33.25  $95
CCSP PDF + Engine

CCSP PDF + Testing Engine

$45.5  $130