Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 5 / 11
Total 512 questions

An audit scope statement defines the limits and outcomes from an audit.

Which of the following would NOT be included as part of an audit scope statement?

A.

Reports

B.

Certification

C.

Billing

D.

Exclusions

What category of PII data can carry potential fines or even criminal charges for its improper use or disclosure?

A.

Protected

B.

Legal

C.

Regulated

D.

Contractual

With a federated identity system, what does the identity provider send information to after a successful authentication?

A.

Relying party

B.

Service originator

C.

Service relay

D.

Service relay

Which protocol, as a part of TLS, handles negotiating and establishing a connection between two parties?

A.

Record

B.

Binding

C.

Negotiation

D.

Handshake

Which of the following areas of responsibility would be shared between the cloud customer and cloud provider within the Software as a Service (SaaS) category?

A.

Data

B.

Governance

C.

Application

D.

Physical

Which aspect of cloud computing serves as the biggest challenge to using DLP to protect data at rest?

A.

Portability

B.

Resource pooling

C.

Interoperability

D.

Reversibility

Data labels could include all the following, except:

A.

Distribution limitations

B.

Multifactor authentication

C.

Confidentiality level

D.

Access restrictions

Which of the following best describes the Organizational Normative Framework (ONF)?

A.

A set of application security, and best practices, catalogued and leveraged by the organization

B.

A container for components of an application’s security, best practices catalogued and leveraged by the organization

C.

A framework of containers for some of the components of application security, best practices, catalogued and leveraged by the organization

D.

A framework of containers for all components of application security, best practices, catalogued and leveraged by the organization.

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

A.

TLS

B.

HTTPS

C.

VPN

D.

IRM

DLP solutions can aid in deterring loss due to which of the following?

A.

Inadvertent disclosure

B.

Natural disaster

C.

Randomization

D.

Device failure

What are SOC 1/SOC 2/SOC 3?

A.

Audit reports

B.

Risk management frameworks

C.

Access controls

D.

Software developments

Which is the lowest level of the CSA STAR program?

A.

Attestation

B.

Self-assessment

C.

Hybridization

D.

Continuous monitoring

The cloud customer will have the most control of their data and systems, and the cloud provider will have the least amount of responsibility, in which cloud computing arrangement?

A.

IaaS

B.

SaaS

C.

Community cloud

D.

PaaS

Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:

A.

Ransomware

B.

Syn floods

C.

XSS and SQL injection

D.

Password cracking

Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed.

Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?

A.

Disclosure

B.

Transparency

C.

Openness

D.

Documentation