It is more faster and easier to pass the ISC2 CCSP exam by using Pinpoint ISC2 Certified Cloud Security Professional questuins and answers. Immediate access to the Replace CCSP Exam and find the same core area CCSP questions with professionally verified answers, then PASS your exam with a high score now.
Online CCSP free questions and answers of New Version:
NEW QUESTION 1
Which of the following is NOT a common component of a DLP implementation process? Response:
- A. Discovery
- B. Monitoring
- C. Revision
- D. Enforcement
Answer: C
NEW QUESTION 2
Vulnerability scans are dependent on ______ in order to function. Response:
- A. Privileged access
- B. Vulnerability signatures
- C. Malware libraries
- D. Forensic analysis
Answer: B
NEW QUESTION 3
Which of the following are contractual components that the CSP should review and understand fully when contracting with a cloud service provider?
(Choose two.)
- A. Concurrently maintainable site infrastructure
- B. Use of subcontractors
- C. Redundant site infrastructure capacity components
- D. Scope of processing
Answer: BD
NEW QUESTION 4
Firewalls can detect attack traffic by using all these methods except ______.
Response:
- A. Known past behavior in the environment
- B. Identity of the malicious user
- C. Point of origination
- D. Signature matching
Answer: B
NEW QUESTION 5
Which of the following is considered an administrative control?
- A. Access control process
- B. Keystroke logging
- C. Door locks
- D. Biometric authentication
Answer: A
NEW QUESTION 6
Impact resulting from risk being realized is often measured in terms of ______.
- A. Amount of data lost
- B. Money
- C. Amount of property lost
- D. Number of people affected
Answer: B
NEW QUESTION 7
The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating in cloud computing.
According to the CSA, what is one reason the threat of insecure interfaces and APIs is so prevalent in cloud computing?
Response:
- A. Most of the cloud customer’s interaction with resources will be performed through APIs.
- B. APIs are inherently insecure.
- C. Attackers have already published vulnerabilities for all known APIs.
- D. APIs are known carcinogens.
Answer: A
NEW QUESTION 8
The final phase of the cloud data lifecycle is the destroy phase, where data is ultimately deleted and done so in a secure manner to ensure it cannot be recovered or reconstructed. Which cloud service category poses the most challenges to data destruction or the cloud customer?
- A. Platform
- B. Software
- C. Infrastructure
- D. Desktop
Answer: B
NEW QUESTION 9
Which of the following is the correct name for Tier II of the Uptime Institute Data Center Site Infrastructure Tier Standard Topology?
- A. Concurrently Maintainable Site Infrastructure
- B. Fault-Tolerant Site Infrastructure
- C. Basic Site Infrastructure
- D. Redundant Site Infrastructure Capacity Components
Answer: D
NEW QUESTION 10
What sort of legal enforcement may the Payment Card Industry (PCI) Security Standards Council not bring to bear against organizations that fail to comply with the Payment Card Industry Data Security Standard (PCI DSS)?
Response:
- A. Fines
- B. Jail time
- C. Suspension of credit card processing privileges
- D. Subject to increased audit frequency and scope
Answer: B
NEW QUESTION 11
Which type of report is considered for “general” use and does not contain any sensitive information? Response:
- A. SOC 1
- B. SAS-70
- C. SOC 3
- D. SOC 2
Answer: C
NEW QUESTION 12
Which ISO standard refers to addressing security risks in a supply chain?
- A. ISO 27001
- B. ISO/IEC 28000:2007
- C. ISO 18799
- D. ISO 31000:2009
Answer: B
NEW QUESTION 13
It’s important to maintain a current asset inventory list, including surveying your environment on a regular basis, in order to ______ .
Response:
- A. Prevent unknown, unpatched assets from being used as back doors to the environment
- B. Ensure that any lost devices are automatically entered into the acquisition system for repurchasing and replacement
- C. Maintain user morale by having their devices properly catalogued and annotated
- D. Ensure that billing for all devices is handled by the appropriate departments
Answer: A
NEW QUESTION 14
Who is ultimately responsible for a data breach that includes personally identifiable information (PII), in the event of negligence on the part of the cloud provider?
- A. The user
- B. The subject
- C. The cloud provider
- D. The cloud customer
Answer: D
NEW QUESTION 15
DLP solutions can aid all of the following security-related efforts except ______.
Response:
- A. Access control
- B. Egress monitoring
- C. e-discovery/forensics
- D. Data categorization/classification
Answer: A
NEW QUESTION 16
TLS uses ______ to authenticate a connection and create a shared secret for the duration of the session.
- A. SAML 2.0
- B. X.509 certificates
- C. 802.11X
- D. The Diffie-Hellman process
Answer: B
NEW QUESTION 17
An audit against the ______ will demonstrate that an organization has a holistic, comprehensive security program.
Response:
- A. SAS 70 standard
- B. SSAE 16 standard
- C. SOC 2, Type 2 report matrix
- D. ISO 27001 certification requirements
Answer: D
NEW QUESTION 18
There are two general types of smoke detectors. Which type uses a small portion of radioactive material? Response:
- A. Photoelectric
- B. Ionization
- C. Electron pulse
- D. Integral field
Answer: B
NEW QUESTION 19
Cloud environments are based entirely on virtual machines and virtual devices, and those images are also in need of storage within the environment. What type of storage is typically used for virtual images?
Response:
- A. Volume
- B. Structured
- C. Unstructured
- D. Object
Answer: D
NEW QUESTION 20
Although encryption can help an organization to effectively decrease the possibility of data breaches, which other type of threat can it increase the chances of?
Response:
- A. Insecure interfaces
- B. Data loss
- C. System vulnerabilities
- D. Account hijacking
Answer: B
NEW QUESTION 21
Which of the following best describes a cloud carrier?
- A. A person or entity responsible for making a cloud service available to consumers
- B. The intermediary who provides connectivity and transport of cloud services between cloud providers and cloud consumers
- C. The person or entity responsible for keeping cloud services running for customers
- D. The person or entity responsible for transporting data across the Internet
Answer: B
NEW QUESTION 22
Application virtualization can typically be used for .
- A. Denying access to untrusted users
- B. Detecting and mitigating DDoS attacks
- C. Replacing encryption as a necessary control
- D. Running an application on an endpoint without installing it
Answer: D
NEW QUESTION 23
The destruction of a cloud customer’s data can be required by all of the following except ______.
Response:
- A. Statute
- B. Regulation
- C. The cloud provider’s policy
- D. Contract
Answer: C
NEW QUESTION 24
Which of the following is not typically included as a basic phase of the software development life cycle?
- A. Define
- B. Design
- C. Describe
- D. Develop
Answer: C
NEW QUESTION 25
Which of the following is not a component of the of the STRIDE model? Response:
- A. Spoofing
- B. Repudiation
- C. Information disclosure
- D. External pen testing
Answer: D
NEW QUESTION 26
The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is composed by a member-driven OWASP committee of application development experts and published approximately every 24 months. The 2013 OWASP Top Ten list includes “using components with known vulnerabilities.”
Why would an organization ever use components with known vulnerabilities to create software? Response:
- A. The organization is insured.
- B. The particular vulnerabilities only exist in a context not being used by developers.
- C. Some vulnerabilities only exist in foreign countries.
- D. A component might have a hidden vulnerability.
Answer: B
NEW QUESTION 27
Which document will enforce uptime and availability requirements between the cloud customer and cloud provider?
Response:
- A. Contract
- B. Operational level agreement
- C. Service level agreement
- D. Regulation
Answer: C
NEW QUESTION 28
You work for a government research facility. Your organization often shares data with other government research organizations.
You would like to create a single sign-on experience across the organizations, where users at each organization can sign in with the user ID/authentication issued by that organization, then access research data in all the other organizations.
Instead of replicating the data stores of each organization at every other organization (which is one way of accomplishing this goal), you instead want every user to have access to each organization’s specific storage resources.
If you don’t use cross-certification, what other model can you implement for this purpose? Response:
- A. Third-party identity broker
- B. Cloud reseller
- C. Intractable nuanced variance
- D. Mandatory access control (MAC)
Answer: A
NEW QUESTION 29
Administrative penalties for violating the General Data Protection Regulation (GDPR) can range up to
______ .
Response:
- A. US$100,000
- B. 500,000 euros
- C. 20,000,000 euros
- D. 1,000,000 euros
Answer: C
NEW QUESTION 30
You work for a government research facility. Your organization often shares data with other government research organizations.
You would like to create a single sign-on experience across the organizations, where users at each organization can sign in with the user ID/authentication issued by that organization, then access research data in all the other organizations.
Instead of replicating the data stores of each organization at every other organization (which is one way of accomplishing this goal), you instead want every user to have access to each organization’s specific storage resources.
In order to pass the user IDs and authenticating credentials of each user among the organizations, what
protocol/language/motif will you most likely utilize? Response:
- A. Representational State Transfer (REST)
- B. Security Assertion Markup Language (SAML)
- C. Simple Object Access Protocol (SOAP)
- D. Hypertext Markup Language (HTML)
Answer: B
NEW QUESTION 31
......
P.S. Easily pass CCSP Exam with 353 Q&As Surepassexam Dumps & pdf Version, Welcome to Download the Newest Surepassexam CCSP Dumps: https://www.surepassexam.com/CCSP-exam-dumps.html (353 New Questions)
