Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 10 / 11
Total 512 questions

Which data point that auditors always desire is very difficult to provide within a cloud environment?

A.

Access policy

B.

Systems architecture

C.

Baselines

D.

Privacy statement

Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?

A.

Interoperability

B.

Resource pooling

C.

Portability

D.

Measured service

Which OSI layer does IPsec operate at?

A.

Network

B.

transport

C.

Application

D.

Presentation

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?

A.

2010

B.

2000

C.

1995

D.

1990

What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?

A.

Anonymization

B.

Tokenization

C.

Masking

D.

Obfuscation

Which of the following is NOT an application or utility to apply and enforce baselines on a system?

A.

Chef

B.

GitHub

C.

Puppet

D.

Active Directory

Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?

A.

Service-level agreements

B.

Governance

C.

Regulatory requirements

D.

Auditability

What is an often overlooked concept that is essential to protecting the confidentiality of data?

A.

Strong password

B.

Training

C.

Security controls

D.

Policies

From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions?

A.

Access provisioning

B.

Auditing

C.

Jurisdictions

D.

Authorization

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?

A.

Broad network access

B.

Interoperability

C.

Resource pooling

D.

Portability

Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?

A.

Public

B.

Community

C.

Hybrid

D.

Private

Which of the following is NOT part of a retention policy?

A.

Format

B.

Costs

C.

Accessibility

D.

Duration

Over time, what is a primary concern for data archiving?

A.

Size of archives

B.

Format of archives

C.

Recoverability

D.

Regulatory changes

Which of the following is NOT a function performed by the handshake protocol of TLS?

A.

Key exchange

B.

Encryption

C.

Negotiation of connection

D.

Establish session ID

What does the REST API use to protect data transmissions?

A.

NetBIOS

B.

VPN

C.

Encapsulation

D.

TLS