Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 9 / 11
Total 512 questions

At which stage of the BCDR plan creation phase should security be included in discussions?

A.

Define scope

B.

Analyze

C.

Assess risk

D.

Gather requirements

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

A.

Platform

B.

Infrastructure

C.

Software

D.

Desktop

Which type of audit report is considered a "restricted use" report for its intended audience?

A.

SAS-70

B.

SSAE-16

C.

SOC Type 1

D.

SOC Type 2

Which type of controls are the SOC Type 1 reports specifically focused on?

A.

Integrity

B.

PII

C.

Financial

D.

Privacy

Which of the following is NOT a factor that is part of a firewall configuration?

A.

Encryption

B.

Port

C.

Protocol

D.

Source IP

What type of data does data rights management (DRM) protect?

A.

Consumer

B.

PII

C.

Financial

D.

Healthcare

Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?

A.

Virtualization

B.

Multitenancy

C.

Resource pooling

D.

Dynamic optimization

With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?

A.

Routing

B.

Session

C.

Filtering

D.

Firewalling

Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?

A.

Delete

B.

Modify

C.

Read

D.

Print

What is the concept of segregating information or processes, within the same system or application, for security reasons?

A.

fencing

B.

Sandboxing

C.

Cellblocking

D.

Pooling

What is the biggest challenge to data discovery in a cloud environment?

A.

Format

B.

Ownership

C.

Location

D.

Multitenancy

Which approach is typically the most efficient method to use for data discovery?

A.

Metadata

B.

Content analysis

C.

Labels

D.

ACLs

What process is used within a clustered system to provide high availability and load balancing?

A.

Dynamic balancing

B.

Dynamic clustering

C.

Dynamic optimization

D.

Dynamic resource scheduling

Which of the following is NOT one of five principles of SOC Type 2 audits?

A.

Privacy

B.

Processing integrity

C.

Financial

D.

Security

Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?

A.

Platform

B.

Infrastructure

C.

Governance

D.

Application