Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 6 / 11
Total 512 questions

Which of the following is not a way to manage risk?

A.

Transferring

B.

Accepting

C.

Mitigating

D.

Enveloping

Data masking can be used to provide all of the following functionality, except:

A.

Secure remote access

B.

test data in sandboxed environments

C.

Authentication of privileged users

D.

Enforcing least privilege

Your new CISO is placing increased importance and focus on regulatory compliance as your applications and systems move into cloud environments.

Which of the following would NOT be a major focus of yours as you develop a project plan to focus on regulatory compliance?

A.

Data in transit

B.

Data in use

C.

Data at rest

D.

Data custodian

Which of the following aspects of security is solely the responsibility of the cloud provider?

A.

Regulatory compliance

B.

Physical security

C.

Operating system auditing

D.

Personal security of developers

Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?

A.

Segregated from host systems

B.

Network access

C.

Scalability

D.

External to system patching

In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?

A.

Limit

B.

Cap

C.

Throttle

D.

Reservation

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

A.

APIs

B.

Scripts

C.

TLS

D.

XML

If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?

A.

Limit

B.

Reservation

C.

Assurance

D.

Guarantee

Where is a DLP solution generally installed when utilized for monitoring data at rest?

A.

Network firewall

B.

Host system

C.

Application server

D.

Database server

If you are running an application that has strict legal requirements that the data cannot reside on systems that contain other applications or systems, which aspect of cloud computing would be prohibitive in this case?

A.

Multitenancy

B.

Broad network access

C.

Portability

D.

Elasticity

Modern web service systems are designed for high availability and resiliency. Which concept pertains to the ability to detect problems within a system, environment, or application and programmatically invoke redundant systems or processes for mitigation?

A.

Elasticity

B.

Redundancy

C.

Fault tolerance

D.

Automation

During which phase of the cloud data lifecycle is it possible for the classification of data to change?

A.

Use

B.

Archive

C.

Create

D.

Share

With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?

A.

Structured and unstructured

B.

Structured and hierarchical

C.

Volume and database

D.

Volume and object

If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?

A.

Memory and networking

B.

CPU and software

C.

CPU and storage

D.

CPU and memory

Within a SaaS environment, what is the responsibility on the part of the cloud customer in regard to procuring the software used?

A.

Maintenance

B.

Licensing

C.

Development

D.

Purchasing