Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 8 / 11
Total 512 questions

Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?

A.

SAML and HTML

B.

XML and SAML

C.

XML and JSON

D.

JSON and SAML

A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it's best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within a cloud.

What is the biggest advantage to leasing space in a data center versus procuring cloud services?

A.

Regulations

B.

Control

C.

Security

D.

Costs

With a federated identity system, where would a user perform their authentication when requesting services or application access?

A.

Cloud provider

B.

The application

C.

Their home organization

D.

Third-party authentication system

Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.

Which of the following is NOT a regulatory system from the United States federal government?

A.

HIPAA

B.

SOX

C.

FISMA

D.

PCI DSS

Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?

A.

Unstructured

B.

Object

C.

Volume

D.

Structured

Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.

Which of the following is NOT a technology for securing data in transit?

A.

VPN

B.

TLS

C.

DNSSEC

D.

HTTPS

ISO/IEC has established international standards for many aspects of computing and any processes or procedures related to information technology.

Which ISO/IEC standard has been established to provide a framework for handling eDiscovery processes?

A.

ISO/IEC 27001

B.

ISO/IEC 27002

C.

ISO/IEC 27040

D.

ISO/IEC 27050

Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?

A.

Injection

B.

Cross-site request forgery

C.

Missing function-level access control

D.

Cross-site scripting

Which data state would be most likely to use TLS as a protection mechanism?

A.

Data in use

B.

Data at rest

C.

Archived

D.

Data in transit

Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?

A.

Use

B.

Share

C.

Store

D.

Create

With IaaS, what is responsible for handling the security and control over the volume storage space?

A.

Management plane

B.

Operating system

C.

Application

D.

Hypervisor

What concept does the "R" represent with the DREAD model?

A.

Reproducibility

B.

Repudiation

C.

Risk

D.

Residual

Which of the following would be a reason to undertake a BCDR test?

A.

Functional change of the application

B.

Change in staff

C.

User interface overhaul of the application

D.

Change in regulations

What does static application security testing (SAST) offer as a tool to the testers?

A.

Production system scanning

B.

Injection attempts

C.

Source code access

D.

Live testing