Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 4 / 11
Total 512 questions

When a system needs to be exposed to the public Internet, what type of secure system would be used to perform only the desired operations?

A.

Firewall

B.

Proxy

C.

Honeypot

D.

Bastion

Which aspect of data poses the biggest challenge to using automated tools for data discovery and programmatic data classification?

A.

Quantity

B.

Language

C.

Quality

D.

Number of courses

Above and beyond general regulations for data privacy and protection, certain types of data are subjected to more rigorous regulations and oversight.

Which of the following is not a regulatory framework for more sensitive or specialized data?

A.

FIPS 140-2

B.

FedRAMP

C.

PCI DSS

D.

HIPAA

A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?

A.

UPS

B.

Generators

C.

Joint operating agreements

D.

Strict adherence to applicable regulations

In addition to whatever audit results the provider shares with the customer, what other mechanism does the customer have to ensure trust in the provider’s performance and duties?

A.

HIPAA

B.

The contract

C.

Statutes

D.

Security control matrix

Countermeasures for protecting cloud operations against internal threats include all of the following except:

A.

Mandatory vacation

B.

Least privilege

C.

Separation of duties

D.

Conflict of interest

The BC/DR kit should include all of the following except:

A.

Annotated asset inventory

B.

Flashlight

C.

Hard drives

D.

Documentation equipment

A data custodian is responsible for which of the following?

A.

Data context

B.

Data content

C.

The safe custody, transport, storage of the data, and implementation of business rules

D.

Logging access and alerts

When using an IaaS solution, what is the capability provided to the customer?

A.

To provision processing, storage, networks, and other fundamental computing resources when the consumer is able to deploy and run arbitrary software, which can include OSs and applications.

B.

To provision processing, storage, networks, and other fundamental computing resources when the auditor is able to deploy and run arbitrary software, which can include OSs and applications.

C.

To provision processing, storage, networks, and other fundamental computing resources when the provider is able to deploy and run arbitrary software, which can include OSs and applications.

D.

To provision processing, storage, networks, and other fundamental computing resources when the consumer is not able to deploy and run arbitrary software, which can include OSs and applications.

With the rapid emergence of cloud computing, very few regulations were in place that pertained to it specifically, and organizations often had to resort to using a collection of regulations that were not specific to cloud in order to drive audits and policies.

Which standard from the ISO/IEC was designed specifically for cloud computing?

A.

ISO/IEC 27001

B.

ISO/IEC 19889

C.

ISO/IEC 27001:2015

D.

ISO/IEC 27018

When an organization is considering a cloud environment for hosting BCDR solutions, which of the following would be the greatest concern?

A.

Self-service

B.

Resource pooling

C.

Availability

D.

Location

What type of masking would you employ to produce a separate data set for testing purposes based on production data without any sensitive information?

A.

Dynamic

B.

Tokenized

C.

Replicated

D.

Static

Which cloud service category most commonly uses client-side key management systems?

A.

Software as a Service

B.

Infrastructure as a Service

C.

Platform as a Service

D.

Desktop as a Service

Which of the following terms is not associated with cloud forensics?

A.

eDiscovery

B.

Chain of custody

C.

Analysis

D.

Plausibility

Because of multitenancy, specific risks in the public cloud that don’t exist in the other cloud service models include all the following except:

A.

DoS/DDoS

B.

Information bleed

C.

Risk of loss/disclosure due to legal seizures

D.

Escalation of privilege