Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ISC CCSP Certified Cloud Security Professional Exam Practice Test

Page: 1 / 51
Total 512 questions

Certified Cloud Security Professional Questions and Answers

Question 1

When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:

Options:

A.

Many states have data breach notification laws.

B.

Breaches can cause the loss of proprietary data.

C.

Breaches can cause the loss of intellectual property.

D.

Legal liability can’t be transferred to the cloud provider.

Question 2

Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?

Options:

A.

Data owner

B.

Data processor

C.

Database administrator

D.

Data custodian

Question 3

Which of the following is considered an administrative control?

Options:

A.

Keystroke logging

B.

Access control process

C.

Door locks

D.

Biometric authentication

Question 4

Hardening the operating system refers to all of the following except:

Options:

A.

Limiting administrator access

B.

Closing unused ports

C.

Removing antimalware agents

D.

Removing unnecessary services and libraries

Question 5

Data masking can be used to provide all of the following functionality, except:

Options:

A.

Secure remote access

B.

test data in sandboxed environments

C.

Authentication of privileged users

D.

Enforcing least privilege

Question 6

A variety of security systems can be integrated within a network--some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.

Which of the following types of technologies is best described here?

Options:

A.

IDS

B.

IPS

C.

Proxy

D.

Firewall

Question 7

The BIA can be used to provide information about all the following, except:

Options:

A.

BC/DR planning

B.

Risk analysis

C.

Secure acquisition

D.

Selection of security controls

Question 8

To address shared monitoring and testing responsibilities in a cloud configuration, the provider might offer all these to the cloud customer except:

Options:

A.

Access to audit logs and performance data

B.

DLP solution results

C.

Security control administration

D.

SIM, SEIM. and SEM logs

Question 9

Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?

Options:

A.

Problem management

B.

Continuity management

C.

Availability management

D.

Configuration management

Question 10

Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.

Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?

Options:

A.

Interoperability

B.

Resiliency

C.

Scalability

D.

Portability

Question 11

Your new CISO is placing increased importance and focus on regulatory compliance as your applications and systems move into cloud environments.

Which of the following would NOT be a major focus of yours as you develop a project plan to focus on regulatory compliance?

Options:

A.

Data in transit

B.

Data in use

C.

Data at rest

D.

Data custodian

Question 12

Which of the following are distinguishing characteristics of a managed service provider?

Options:

A.

Be able to remotely monitor and manage objects for the customer and proactively maintain these objects under management.

B.

Have some form of a help desk but no NOC.

C.

Be able to remotely monitor and manage objects for the customer and reactively maintain these objects under management.

D.

Have some form of a NOC but no help desk.

Question 13

Countermeasures for protecting cloud operations against external attackers include all of the following except:

Options:

A.

Continual monitoring for anomalous activity.

B.

Detailed and extensive background checks.

C.

Regular and detailed configuration/change management activities

D.

Hardened devices and systems, including servers, hosts, hypervisors, and virtual machines.

Question 14

Best practices for key management include all of the following, except:

Options:

A.

Ensure multifactor authentication

B.

Pass keys out of band

C.

Have key recovery processes

D.

Maintain key security

Question 15

When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.

Which of the following would NOT be something that is predefined as part of the audit agreement?

Options:

A.

Size

B.

Format

C.

Structure

D.

Audience

Question 16

The goals of SIEM solution implementation include all of the following, except:

Options:

A.

Dashboarding

B.

Performance enhancement

C.

Trend analysis

D.

Centralization of log streams

Question 17

What is the intellectual property protection for a confidential recipe for muffins?

Options:

A.

Patent

B.

Trademark

C.

Trade secret

D.

Copyright

Question 18

To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:

Options:

A.

Multifactor authentication

B.

DLP agents

C.

Two-person integrity

D.

Local encryption

Question 19

How many additional DNS queries are needed when DNSSEC integrity checks are added?

Options:

A.

Three

B.

Zero

C.

One

D.

Two

Question 20

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?

Options:

A.

2010

B.

2000

C.

1995

D.

1990

Question 21

Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?

Options:

A.

Platform

B.

Infrastructure

C.

Governance

D.

Application

Question 22

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?

Options:

A.

Functionality

B.

Programming languages

C.

Software platform

D.

Security requirements

Question 23

Which value refers to the percentage of production level restoration needed to meet BCDR objectives?

Options:

A.

RPO

B.

RTO

C.

RSL

D.

SRE

Question 24

Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?

Options:

A.

Public

B.

Community

C.

Hybrid

D.

Private

Question 25

What type of security threat is DNSSEC designed to prevent?

Options:

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Injection

Question 26

What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?

Options:

A.

Masking

B.

Anonymization

C.

Tokenization

D.

Obfuscation

Question 27

Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?

Options:

A.

Reservations

B.

Measured service

C.

Limits

D.

Shares

Question 28

What does the "SOC" acronym refer to with audit reports?

Options:

A.

Service Origin Confidentiality

B.

System Organization Confidentiality

C.

Service Organizational Control

D.

System Organization Control

Question 29

Which type of testing uses the same strategies and toolsets that hackers would use?

Options:

A.

Penetration

B.

Dynamic

C.

Static

D.

Malicious

Question 30

What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?

Options:

A.

Proxy

B.

Bastion

C.

Honeypot

D.

WAF

Question 31

Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?

Options:

A.

Six months

B.

One month

C.

One year

D.

One week

Question 32

Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?

Options:

A.

Platform

B.

Data

C.

Physical environment

D.

Infrastructure

Question 33

Which of the following is NOT an application or utility to apply and enforce baselines on a system?

Options:

A.

Chef

B.

GitHub

C.

Puppet

D.

Active Directory

Question 34

Which OSI layer does IPsec operate at?

Options:

A.

Network

B.

transport

C.

Application

D.

Presentation

Question 35

What type of masking strategy involves replacing data on a system while it passes between the data and application layers?

Options:

A.

Dynamic

B.

Static

C.

Replication

D.

Duplication

Question 36

Which data point that auditors always desire is very difficult to provide within a cloud environment?

Options:

A.

Access policy

B.

Systems architecture

C.

Baselines

D.

Privacy statement

Question 37

What provides the information to an application to make decisions about the authorization level appropriate when granting access?

Options:

A.

User

B.

Relying party

C.

Federation

D.

Identity Provider

Question 38

Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?

Options:

A.

NFPA

B.

BICSI

C.

IDCA

D.

Uptime Institute

Question 39

Which of the following standards primarily pertains to cabling designs and setups in a data center?

Options:

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

Question 40

Which United States law is focused on data related to health records and privacy?

Options:

A.

Safe Harbor

B.

SOX

C.

GLBA

D.

HIPAA

Question 41

What is used for local, physical access to hardware within a data center?

Options:

A.

SSH

B.

KVM

C.

VPN

D.

RDP

Question 42

What is the data encapsulation used with the SOAP protocol referred to?

Options:

A.

Packet

B.

Envelope

C.

Payload

D.

Object

Question 43

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Options:

A.

Cloud auditor

B.

Inter-cloud provider

C.

Cloud service broker

D.

Cloud service developer

Question 44

What is a serious complication an organization faces from the perspective of compliance with international operations?

Options:

A.

Different certifications

B.

Multiple jurisdictions

C.

Different capabilities

D.

Different operational procedures

Question 45

What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?

Options:

A.

Scripts

B.

RDP

C.

APIs

D.

XML

Question 46

Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?

Options:

A.

Cloud service business manager

B.

Cloud service deployment manager

C.

Cloud service operations manager

D.

Cloud service manager

Question 47

Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?

Options:

A.

SP 800-153

B.

SP 800-145

C.

SP 800-53

D.

SP 800-40

Question 48

Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?

Options:

A.

European Union

B.

Germany

C.

Russia

D.

United States

Question 49

Within an Infrastructure as a Service model, which of the following would NOT be a measured service?

Options:

A.

CPU

B.

Storage

C.

Number of users

D.

Memory

Question 50

What does the REST API support that SOAP does NOT support?

Options:

A.

Caching

B.

Encryption

C.

Acceleration

D.

Redundancy

Question 51

How is an object stored within an object storage system?

Options:

A.

Key value

B.

Database

C.

LDAP

D.

Tree structure

Question 52

Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?

Options:

A.

IDCA

B.

NFPA

C.

BICSI

D.

Uptime Institute

Question 53

Which data formats are most commonly used with the REST API?

Options:

A.

JSON and SAML

B.

XML and SAML

C.

XML and JSON

D.

SAML and HTML

Question 54

When is a virtual machine susceptible to attacks while a physical server in the same state would not be?

Options:

A.

When it is behind a WAF

B.

When it is behind an IPS

C.

When it is not patched

D.

When it is powered off

Question 55

What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?

Options:

A.

Virtual

B.

Security

C.

Physical

D.

Logical

Question 56

Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?

Options:

A.

Consumable service

B.

Measured service

C.

Billable service

D.

Metered service

Question 57

Where is a DLP solution generally installed when utilized for monitoring data in transit?

Options:

A.

Network perimeter

B.

Database server

C.

Application server

D.

Web server

Question 58

Where is a DLP solution generally installed when utilized for monitoring data in use?

Options:

A.

Application server

B.

Database server

C.

Network perimeter

D.

User’s client

Question 59

Data center and operations design traditionally takes a tiered, topological approach.

Which of the following standards is focused on that approach and is prevalently used throughout the industry?

Options:

A.

IDCA

B.

NFPA

C.

BICSI

D.

Uptime Institute

Question 60

Modern web service systems are designed for high availability and resiliency. Which concept pertains to the ability to detect problems within a system, environment, or application and programmatically invoke redundant systems or processes for mitigation?

Options:

A.

Elasticity

B.

Redundancy

C.

Fault tolerance

D.

Automation

Question 61

Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.

What type of attack is this?

Options:

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

Question 62

An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?

Options:

A.

Network

B.

Users

C.

Memory

D.

CPU

Question 63

Which of the following statements best describes a Type 1 hypervisor?

Options:

A.

The hypervisor software runs within an operating system tied to the hardware.

B.

The hypervisor software runs as a client on a server and needs an external service to administer it.

C.

The hypervisor software runs on top of an application layer.

D.

The hypervisor software runs directly on “bare metal” without an intermediary.

Question 64

When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.

What is the data encapsulation used with the SOAP protocol referred to as?

Options:

A.

Packet

B.

Payload

C.

Object

D.

Envelope

Question 65

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

Options:

A.

Archive

B.

Share

C.

Store

D.

Destroy

Question 66

Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.

Which role would you be assuming under this directive?

Options:

A.

Cloud service administrator

B.

Cloud service user

C.

Cloud service integrator

D.

Cloud service business manager

Question 67

Which of the following aspects of security is solely the responsibility of the cloud provider?

Options:

A.

Regulatory compliance

B.

Physical security

C.

Operating system auditing

D.

Personal security of developers

Question 68

What does a cloud customer purchase or obtain from a cloud provider?

Options:

A.

Services

B.

Hosting

C.

Servers

D.

Customers

Question 69

Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?

Options:

A.

Metered service

B.

Measured billing

C.

Metered billing

D.

Measured service

Question 70

Three central concepts define what type of data and information an organization is responsible for pertaining to eDiscovery.

Which of the following are the three components that comprise required disclosure?

Options:

A.

Possession, ownership, control

B.

Ownership, use, creation

C.

Control, custody, use

D.

Possession, custody, control

Question 71

If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?

Options:

A.

Limit

B.

Reservation

C.

Assurance

D.

Guarantee

Question 72

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.

Which of the following is NOT something that firewalls are concerned with?

Options:

A.

IP address

B.

Encryption

C.

Port

D.

Protocol

Question 73

Which aspect of SaaS will alleviate much of the time and energy organizations spend on compliance (specifically baselines)?

Options:

A.

Maintenance

B.

Licensing

C.

Standardization

D.

Development

Question 74

Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?

Options:

A.

Structured

B.

Unstructured

C.

Volume

D.

Object

Question 75

Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.

Which concept encapsulates this?

Options:

A.

Validity

B.

Integrity

C.

Accessibility

D.

Confidentiality

Page: 1 / 51
Total 512 questions