Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 7 / 11
Total 512 questions

With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?

A.

Filtering and forwarding

B.

Filtering and firewalling

C.

Firewalling and forwarding

D.

Forwarding and protocol

Which phase of the cloud data lifecycle would be the MOST appropriate for the use of DLP technologies to protect the data?

A.

Use

B.

Store

C.

Share

D.

Create

Which of the following statements best describes a Type 1 hypervisor?

A.

The hypervisor software runs within an operating system tied to the hardware.

B.

The hypervisor software runs as a client on a server and needs an external service to administer it.

C.

The hypervisor software runs on top of an application layer.

D.

The hypervisor software runs directly on “bare metal” without an intermediary.

In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?

A.

Demagnetizing

B.

Shredding

C.

Degaussing

D.

Cryptographic erasure

The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/contractors.

What technology would be useful for protecting data at this point?

A.

IDS

B.

DLP

C.

IPS

D.

WAF

Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.

Which of the following is the optimal humidity level, as established by ASHRAE?

A.

20 to 40 percent relative humidity

B.

50 to 75 percent relative humidity

C.

40 to 60 percent relative humidity

D.

30 to 50 percent relative humidity

Data center and operations design traditionally takes a tiered, topological approach.

Which of the following standards is focused on that approach and is prevalently used throughout the industry?

A.

IDCA

B.

NFPA

C.

BICSI

D.

Uptime Institute

DNSSEC was designed to add a layer of security to the DNS protocol.

Which type of attack was the DNSSEC extension designed to mitigate?

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Data exposure

The REST API is a widely used standard for communications of web-based services between clients and the servers hosting them.

Which protocol does the REST API depend on?

A.

HTTP

B.

SSH

C.

SAML

D.

XML

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.

Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

A.

SOC Type 2, one year

B.

SOC Type 1, one year

C.

SOC Type 2, one month

D.

SOC Type 2, six months

Implementing baselines on systems would take an enormous amount of time and resources if the staff had to apply them to each server, and over time, it would be almost impossible to keep all the systems in sync on an ongoing basis.

Which of the following is NOT a package that can be used for implementing and maintaining baselines across an enterprise?

A.

Puppet

B.

SCCM

C.

Chef

D.

GitHub

Within a federated identity system, which of the following would you be MOST likely to use for sending information for consumption by a relying party?

A.

XML

B.

HTML

C.

WS-Federation

D.

SAML

Which data state would be most likely to use digital signatures as a security protection mechanism?

A.

Data in use

B.

Data in transit

C.

Archived

D.

Data at rest

Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?

A.

Security misconfiguration

B.

Insecure direct object references

C.

Unvalidated redirects and forwards

D.

Sensitive data exposure

What type of storage structure does object storage employ to maintain files?

A.

Directory

B.

Hierarchical

C.

tree

D.

Flat