CCSP Dumps Certified Cloud Security Professional
CCSP Dumps Certified Cloud Security Professional
CCSP Dumps
https://www.certleader.com/CCSP-dumps.html
NEW QUESTION 1
- (Exam Topic 1)
Vulnerability scans are dependent on ______ in order to function. Response:
A. Privileged access
B. Vulnerability signatures
C. Malware libraries
D. Forensic analysis
Answer: B
NEW QUESTION 2
- (Exam Topic 1)
A virtual network interface card (NIC) exists at layer ______ of the OSI model. Response:
A. 2
B. 4
C. 6
D. 8
Answer: A
NEW QUESTION 3
- (Exam Topic 1)
______ can often be the result of inadvertent activity. Response:
A. DDoS
B. Phishing
C. Sprawl
D. Disasters
Answer: C
NEW QUESTION 4
- (Exam Topic 1) What can tokenization be used for? Response:
A. Encryption
B. Compliance with PCI DSS
C. Enhancing the user experience
D. Giving management oversight to e-commerce functions
Answer: B
NEW QUESTION 5
- (Exam Topic 1)
DLP can be combined with what other security technology to enhance data controls? Response:
A. DRM
B. SIEM
C. Kerberos
D. Hypervisors
Answer: A
NEW QUESTION 6
- (Exam Topic 1)
According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?
A. Store
B. Use
C. Deploy
D. Archive
Answer: A
NEW QUESTION 7
- (Exam Topic 1)
Which strategy involves using a fake production system to lure attackers in order to learn about their tactics?
Response:
A. IDS
B. Honeypot
C. IPS
D. Firewall
Answer: B
NEW QUESTION 8
- (Exam Topic 1)
Which cloud storage type uses an opaque value or descriptor to categorize and organize data? Response:
A. Volume
B. Object
C. Structured
D. Unstructured
Answer: D
NEW QUESTION 9
- (Exam Topic 1)
What type of device is often leveraged to assist legacy applications that may not have the programmatic capability to process assertions from modern web
services?
Answer: B
NEW QUESTION 10
- (Exam Topic 1)
What is used with a single sign-on system for authentication after the identity provider has successfully authenticated a user?
Response:
A. Token
B. Key
C. XML
D. SAML
Answer: A
NEW QUESTION 10
- (Exam Topic 1)
Which of the following is a risk in the cloud environment that is not existing or is as prevalent in the legacy environment?
Response:
Answer: A
NEW QUESTION 12
- (Exam Topic 1)
You have been tasked with creating an audit scope statement and are making your project outline. Which of the following is NOT typically included in an audit
scope statement?
A. Statement of purpose
B. Deliverables
C. Classification
D. Costs
Answer: D
NEW QUESTION 15
- (Exam Topic 1)
What is the federal agency that accepts applications for new patents?
A. USDA
B. USPTO
C. OSHA
D. SEC
Answer: B
NEW QUESTION 18
- (Exam Topic 1)
Which of the following best describes SAML? Response:
Answer: B
NEW QUESTION 19
- (Exam Topic 1)
Of the following, which is probably the most significant risk in a managed cloud environment? Response:
A. DDoS
B. Management plane breach
C. Guest escape
D. Physical attack on the utility service lines
Answer: B
NEW QUESTION 24
- (Exam Topic 1)
Which phase of the cloud data lifecycle involves processing by a user or application? Response:
A. Create
B. Share
C. Store
D. Use
Answer: D
NEW QUESTION 28
- (Exam Topic 1)
You are in charge of creating the BCDR plan and procedures for your organization. Your organization has its production environment hosted by a cloud provider,
and you have appropriate protections in place.
Which of the following is a significant consideration for your BCDR backup? Response:
Answer: B
NEW QUESTION 30
- (Exam Topic 1)
The Transport Layer Security (TLS) protocol creates a secure communications channel over public media (such as the Internet). In a typical TLS session, who
initiates the protocol?
Response:
A. The server
B. The client
C. The certifying authority
D. The ISP
Answer: B
NEW QUESTION 35
- (Exam Topic 1)
______ is the legal concept whereby a cloud customer is held to a reasonable expectation for providing security of its users’ and clients’ privacy data in their
control.
Response:
A. Due care
B. Due diligence
C. Liability
D. Reciprocity
Answer: B
NEW QUESTION 37
- (Exam Topic 1)
You are the security manager of a small firm that has just purchased a DLP solution to implement in your cloud-based production environment.
In order to get truly holistic coverage of your environment, you should be sure to include ______ as a step in the deployment process.
Response:
Answer: A
NEW QUESTION 40
- (Exam Topic 1)
You work for a government research facility. Your organization often shares data with other government research organizations.
You would like to create a single sign-on experience across the organizations, where users at each organization can sign in with the user ID/authentication issued
by that organization, then access research data in all the other organizations.
Instead of replicating the data stores of each organization at every other organization (which is one way of accomplishing this goal), you instead want every user to
have access to each organization’s specific storage resources.
If you don’t use cross-certification, what other model can you implement for this purpose? Response:
Answer: A
NEW QUESTION 45
- (Exam Topic 1)
At which phase of the SDLC process should security begin participating?
A. Requirements gathering
B. Requirements analysis
C. Design
D. Testing
Answer: A
NEW QUESTION 47
- (Exam Topic 1)
Which of the following is the best and only completely secure method of data destruction? Response:
A. Degaussing
B. Crypto-shredding
C. Physical destruction of resources that store the data
D. Legal order issued by the prevailing jurisdiction where the data is geographically situated
Answer: C
NEW QUESTION 50
- (Exam Topic 1)
Which of the following tools might be useful in data discovery efforts that are based on content analysis?
A. DLP
B. Digital Rights Management (DRM)
C. iSCSI
D. Fibre Channel over Ethernet (FCoE)
Answer: A
NEW QUESTION 54
- (Exam Topic 1)
Because PaaS implementations are so often used for software development, what is one of the vulnerabilities that should always be kept in mind?
Response:
A. Malware
B. Loss/theft of portable devices
C. Backdoors
D. DoS/DDoS
Answer: C
NEW QUESTION 58
- (Exam Topic 1)
You are performing an audit of the security controls used in a cloud environment. Which of the following would best serve your purpose?
Response:
Answer: B
NEW QUESTION 59
- (Exam Topic 1)
The cloud deployment model that features joint ownership of assets among an affinity group is known as: Response:
A. Private
B. Public
C. Hybrid
D. Community
Answer: D
NEW QUESTION 61
- (Exam Topic 1)
Which of the following is a method for apportioning resources that involves setting guaranteed minimums for all tenants/customers within the environment?
Response:
A. Reservations
B. Shares
C. Cancellations
D. Limits
Answer: A
NEW QUESTION 65
- (Exam Topic 1)
What sort of legal enforcement may the Payment Card Industry (PCI) Security Standards Council not bring to bear against organizations that fail to comply with the
Payment Card Industry Data Security Standard (PCI DSS)?
Response:
A. Fines
B. Jail time
C. Suspension of credit card processing privileges
D. Subject to increased audit frequency and scope
Answer: B
NEW QUESTION 68
- (Exam Topic 1)
Which of the following is the recommended operating range for temperature and humidity in a data center?
Response:
Answer: B
NEW QUESTION 71
- (Exam Topic 1)
Which of the following types of organizations is most likely to make use of open source software technologies?
A. Government agencies
B. Corporations
C. Universities
D. Military
Answer: C
NEW QUESTION 74
- (Exam Topic 1)
Which of the following practices can enhance both operational capabilities and configuration management efforts?
Response:
A. Regular backups
B. Constant uptime
C. Multifactor authentication
D. File hashes
Answer: D
NEW QUESTION 76
- (Exam Topic 1)
TLS uses ______ to authenticate a connection and create a shared secret for the duration of the session.
A. SAML 2.0
B. X.509 certificates
C. 802.11X
D. The Diffie-Hellman process
Answer: B
NEW QUESTION 78
- (Exam Topic 1)
In the cloud motif, the data processor is usually: Response:
Answer: C
NEW QUESTION 82
- (Exam Topic 1)
Which of the following is the correct name for Tier II of the Uptime Institute Data Center Site Infrastructure Tier Standard Topology?
Answer: D
NEW QUESTION 85
- (Exam Topic 1)
Which of the following data sanitation methods would be the MOST effective if you needed to securely remove data as quickly as possible in a cloud environment?
Response:
A. Zeroing
B. Cryptographic erasure
C. Overwriting
D. Degaussing
Answer: B
NEW QUESTION 86
- (Exam Topic 1)
You are the security manager for an online retail sales company with 100 employees and a production environment hosted in a PaaS model with a major cloud
provider.
Your company policies have allowed for a BYOD workforce that work equally from the company offices and their own homes or other locations. The policies also
allow users to select which APIs they install and use on their own devices in order to access and manipulate company data.
Of the following, what is a security control you’d like to implement to offset the risk(s) incurred by this practice?
A. Regular and widespread integrity checks on sampled data throughout the managed environment
B. More extensive and granular background checks on all employees, particularly new hires
C. Inclusion of references to all applicable regulations in the policy documents
D. Increased enforcement of separation of duties for all workflows
Answer: A
NEW QUESTION 91
- (Exam Topic 1)
All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except:
Response:
A. Tokenization
B. Data discovery
C. Obfuscation
D. Masking
Answer: B
NEW QUESTION 95
- (Exam Topic 1)
Which of the following are considered to be the building blocks of cloud computing? Response:
Answer: C
NEW QUESTION 97
- (Exam Topic 1)
Using one cloud provider for your operational environment and another for your BCDR backup will also give you the additional benefit of ______.
Response:
A. Allowing any custom VM builds you use to be instantly ported to another environment
B. Avoiding vendor lock-in/lockout
C. Increased performance
D. Lower cost
Answer: B
NEW QUESTION 98
- (Exam Topic 1)
Which concept pertains to cloud customers paying only for the resources they use and consume, and only for the duration they are using them?
Response:
A. Measured service
B. Auto-scaling
C. Portability
D. Elasticity
Answer: A
A. Define
B. Design
C. Describe
D. Develop
Answer: C
Answer: D
A. Planning and requirements analysis, define, design, develop, testing, and maintenance
B. Define, planning and requirements analysis, design, develop, testing, and maintenance
C. Planning and requirements analysis, define, design, testing, develop, and maintenance
D. Planning and requirements analysis, design, define, develop, testing, and maintenance
Answer: A
A. Source
B. Delivery vendor
C. Handling restrictions
D. Jurisdiction
Answer: B
A. 1
B. 1,000 gallons
C. 12 hours
D. As much as needed to ensure all systems may be gracefully shut down and data securely stored
Answer: C
A. Testing
B. Design
C. Development
D. Requirement gathering
Answer: D
A. Persistency
B. Automatic self-destruct
C. Automatic expiration
D. Dynamic policy control
Answer: B
A. Vulnerability scans
B. Open source review
C. SOC audits
D. Regulatory review
Answer: B
A. PaaS
B. IaaS
C. SaaS
D. DaaS
Answer: B
Answer: D
A. Raw
B. Production
C. Useless
D. Sensitive
Answer: C
- (Exam Topic 1)
Who should be the only entity allowed to declare that an organization can return to normal following contingency or BCDR operations?
Response:
A. Regulators
B. Law enforcement
C. The incident manager
D. Senior management
Answer: D
Answer: B
Answer: B
A. Regulatory compliance
B. User satisfaction
C. Determination of service quality
D. Security assurance
Answer: B
A. Digital rights management (DRM) and security event and incident management (SIEM) tools
B. An investment in upgraded project management software
C. Digital insurance policies
D. The Uptime Institute’s Tier certification
Answer: A
A. NIST
B. ISO
C. ICANN
D. CSA
Answer: D
A. Management plane
B. Type 1 hypervisor
C. Type 2 hypervisor
D. Virtual machine
Answer: B
A. Confidentiality level
B. Distribution limitations
C. Access restrictions
D. Multifactor authentication
Answer: D
A. HTTP
B. SAML
C. FTP
D. WS-Federation
Answer: B
A. Out-of-band authentication
B. Multifactor authentication
C. PKI certificates
D. Preexisting knowledge of each other
Answer: C
Answer: A
A. SOC 1
B. SOC 2, Type 1
C. SOC 2, Type 2
D. SOC 3
Answer: D
A. Active
B. Comprehensive
C. Total
D. Inexpensive
Answer: A
A. 1
B. 2
C. 3
D. 4
Answer: A
A. Limits
B. Shares
C. Resource pooling
D. Reservations
Answer: D
A. Physical security
B. IaaS
C. Application security
D. Business drivers
Answer: D
A. Focused on assets
B. Focused on attackers
C. Focused on software
D. Focused on social engineering
Answer: D
A. Tokenization
B. Encryption
C. Masking
D. Classification
Answer: C
A. Transitional
B. Administrative
C. Technical
D. Physical
Answer: A
Answer: C
Answer: C
Answer: D
A. US$100,000
B. 500,000 euros
C. 20,000,000 euros
D. 1,000,000 euros
Answer: C
A. Staff changes
B. Application changes
C. Regulatory changes
D. Management changes
Answer: B
Answer: B
Answer: D
Answer: D
A. SOC 1 Type 1
B. SOC 2 Type 2
C. SOC 1 Type 2
D. SOC 3
Answer: D
Answer: A
Answer: B
Answer: D
A. Systems
B. Data
C. Cash
D. Personnel
Answer: C
A. Requirements gathering
B. Requirements analysis
C. Design
D. Testing
Answer: A
Answer: C
A. Audit the baseline to ensure that all configuration items have been included and applied correctly
B. Impose the baseline throughout the environment
C. Capture an image of the baseline system for future reference/versioning/rollback purposes
D. Document all baseline configuration elements and versioning data
Answer: B
Answer: B
A. Regulatory oversight
B. Financial penalties
C. Performance details
D. Desire to maintain customer satisfaction
Answer: B
A. Object-based storage
B. File-based storage
C. Database
D. CDN
Answer: B
Answer: B
Answer: A
Answer: B
A. Confidentiality
B. Security
C. Privacy
D. Processing integrity
Answer: B
A. WS-Federation
B. OpenID
C. OAuth
D. PGP
Answer: D
A. NIST
B. ISO
C. ICANN
D. CSA
Answer: D
A. Logical design
B. Physical design
C. Audit
D. Policy revision
Answer: B
A. Privacy, security
B. Security, optimization
C. Privacy, integrity
D. Enhancement, privacy
Answer: C
Answer: C
A. Interoperability
B. Portability
C. Availability
D. Security
Answer: B
A. The basis for deciding which laws are most appropriate in a situation where conflicting laws exist
B. When judges restate the law in an opinion
C. How jurisdictional disputes are settled
D. Whether local or federal laws apply in a situation
Answer: A
A. SOC 1
B. SAS-70
C. SOC 3
D. SOC 2
Answer: C
Answer: C
A. XML accelerator
B. XML firewall
C. Web application firewall
D. Firewall
Answer: A
- (Exam Topic 2)
You are the security policy lead for your organization, which is considering migrating from your on-premises, legacy environment into the cloud. You are reviewing
the Cloud Security Alliance Cloud Controls Matrix (CSA CCM) as a tool for your organization.
What is probably the best benefit offered by the CCM? Response:
Answer: B
A. Data discovery
B. Tokenization
C. Monitoring
D. Enforcement
Answer: B
A. DDoS
B. Phishing
C. Sprawl
D. Disasters
Answer: C
Answer: D
A. SAS 70 standard
B. SSAE 16 standard
C. ISO 27002 certification criteria
D. NIST SP 800-53
Answer: C
A. Vendor lock-in
B. Backdoors
C. Regulatory compliance
D. High-speed network connectivity
Answer: B
Response:
Answer: B
A. Discovery
B. Monitoring
C. Revision
D. Enforcement
Answer: C
A. Redundancy
B. Scalability
C. Pay-per-use
D. Self-service
Answer: A
A. Obfuscation
B. Masking
C. Tokenization
D. Anonymization
Answer: C
A. IAM capability
B. DDoS resistance
C. Encryption for data at rest and in motion
D. Field validation
Answer: C
A. Enhancing performance
B. Reducing potential attack vectors
C. Increasing ease of use of the systems
D. Reducing need for administrative personnel
Answer: B
A. Financial security
B. Mobile security
C. Data center security
D. Interface security
Answer: A
A. Virtualization
B. Pooled resources
C. Elasticity
D. Automated self-service
Answer: B
A. SLAs
B. Regulations
C. Law
D. Discipline
Answer: A
A. Single sign-on
B. Insecure direct identifiers
C. Identity federation
D. Cross-site scripting
Answer: C
A. Technological
B. Physical
C. Administrative
D. All of the above
Answer: D
A. Regulatory mandates
B. Business needs and acceptable risk
C. User requirements and management requests
D. Optimum performance and security provision
Answer: B
A. Patents
B. Trademarks
C. Personally identifiable information (PII)
D. Copyright
Answer: D
A. Masking
B. Anonymization
C. Obfuscation
D. Encryption
Answer: B
Answer: C
Answer: A
Answer: B
Answer: B
Answer: B
A. Spoofing
B. Repudiation
C. Information disclosure
D. External pen testing
Answer: D
A. Physical destruction
B. Shredding
C. Overwriting
D. Cryptographic erasure
Answer: D
Answer: D
Answer: A
Answer: C
A. Scalability
B. Encryption
C. Redundancy
D. Integrity
Answer: B
A. Randomization
B. Inadvertent disclosure
C. Natural disaster
D. Device failure
Answer: B
Answer: B
Answer: B
Answer: B
Answer: A
A. Access
B. Cryptographic keys
C. Numeric values
D. Identifying information
Answer: D
A. Authorization
B. Authentication
C. Provisioning
D. Privilege
Answer: A
- (Exam Topic 3)
It’s important to maintain a current asset inventory list, including surveying your environment on a regular basis, in order to ______ .
Response:
A. Prevent unknown, unpatched assets from being used as back doors to the environment
B. Ensure that any lost devices are automatically entered into the acquisition system for repurchasing and replacement
C. Maintain user morale by having their devices properly catalogued and annotated
D. Ensure that billing for all devices is handled by the appropriate departments
Answer: A
Answer: B
A. Transference
B. Avoidance
C. Acceptance
D. Mitigation
Answer: A
A. Cost
B. Speed
C. Noise reduction
D. Capability to recognize problems quickly
Answer: B
A. ISO/IEC 27001
B. ISO/IEC 17788
C. ISO/IEC 17789
D. ISO/IEC 27040
Answer: B
A. Respond to a customer’s changing business requirements while maximizing value and reducing incidents, disruption, and rework
B. Ensure that changes are recorded and evaluated
C. Respond to business and IT requests for change that will disassociate services with business needs
D. Ensure that all changes are prioritized, planned, tested, implemented, documented, and reviewed in a controlled manner
Answer: AB
Answer: D
A. Live virtual machines in the production environment are moved from one host to another in the clear.
B. Cloud data centers can become a single point of failure.
C. It is difficult to find and contract with multiple utility providers of the same type (electric, water, etc.).
D. Modern SLA demands are stringent and very hard to meet.
Answer: A
A. VPN
B. Firewall
C. Operating system
D. IDS
Answer: C
Answer: D
A. Egress monitoring
B. Encryption
C. Turnstiles
D. Digital watermarking
Answer: C
A. Using distinct ports and port groups for various VLANs on a virtual switch rather than running them through the same port
B. Running iSCSI traffic unencrypted in order to have it observed and monitored by NIDS
C. Adding HIDS to all virtual guests
D. Hardening all outward-facing firewalls in order to make them resistant to attack
Answer: A
A. SOC 1
B. SOC 2
C. SOC 3
D. SOC 4
Answer: B
by that organization, then access research data in all the other organizations.
Instead of replicating the data stores of each organization at every other organization (which is one way of accomplishing this goal), you instead want every user to
have access to each organization’s specific storage resources.
In order to pass the user IDs and authenticating credentials of each user among the organizations, what
protocol/language/motif will you most likely utilize? Response:
Answer: B
A. Risk
B. Security controls
C. Personnel
D. Data
Answer: C
A. XML accelerator
B. WAF
C. Sandbox
D. Firewall
Answer: B
A. Risk analysis
B. Secure acquisition
C. BC/DR planning
D. Selection of security controls
Answer: B
A. Slower
B. Less expensive
C. Larger
D. More difficult to engineer
Answer: B
Answer: B
100% Pass Your CCSP Exam with Our Prep Materials Via below:
https://www.certleader.com/CCSP-dumps.html