ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 10

Question list
Search
Search

What is the first stage of the cloud data lifecycle where security controls can be implemented?

A.
Use
A.
Use
Answers
B.
Store
B.
Store
Answers
C.
Share
C.
Share
Answers
D.
Create
D.
Create
Answers
Suggested answer: B

Explanation:

The "store" phase of the cloud data lifecycle, which typically occurs simultaneously with the "create" phase, or immediately thereafter, is the first phase where security controls can be implemented. In most case, the manner in which the data is stored will be based on its classification.

What controls the formatting and security settings of a volume storage system within a cloud environment?

A.
Management plane
A.
Management plane
Answers
B.
SAN host controller
B.
SAN host controller
Answers
C.
Hypervisor
C.
Hypervisor
Answers
D.
Operating system of the host
D.
Operating system of the host
Answers
Suggested answer: D

Explanation:

Once a storage LUN is allocated to a virtual machine, the operating system of that virtual machine will format, manage, and control the file system and security of the data on that LUN.

What does SDN stand for within a cloud environment?

A.
Software-dynamic networking
A.
Software-dynamic networking
Answers
B.
Software-defined networking
B.
Software-defined networking
Answers
C.
Software-dependent networking
C.
Software-dependent networking
Answers
D.
System-dynamic nodes
D.
System-dynamic nodes
Answers
Suggested answer: B

Explanation:

Software-defined networking separates the administration of network filtering and network forwarding to allow for distributed administration.

From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?

A.
Notification
A.
Notification
Answers
B.
Key identification
B.
Key identification
Answers
C.
Data collection
C.
Data collection
Answers
D.
Virtual image snapshots
D.
Virtual image snapshots
Answers
Suggested answer: A

Explanation:

The contract should include requirements for notification by the cloud provider to the cloud customer upon the receipt of such an order. This serves a few important purposes. First, it keeps communication and trust open between the cloud provider and cloud customers. Second, and more importantly, it allows the cloud customer to potentially challenge the order if they feel they have the grounds or desire to do so.

Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

A.
Resource pooling
A.
Resource pooling
Answers
B.
Virtualization
B.
Virtualization
Answers
C.
Multitenancy
C.
Multitenancy
Answers
D.
Regulation
D.
Regulation
Answers
Suggested answer: C

Explanation:

With cloud providers hosting a number of different customers, it would be impractical for them to pursue additional certifications based on the needs of a specific customer. Cloud environments are built to a common denominator to serve the greatest number of customers, and especially within a public cloud model, it is not possible or practical for a cloud provider to alter their services for specific customer demands.

Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?

A.
NFPA
A.
NFPA
Answers
B.
BICSI
B.
BICSI
Answers
C.
IDCA
C.
IDCA
Answers
D.
Uptime Institute
D.
Uptime Institute
Answers
Suggested answer: A

Explanation:

The standards put out by the National Fire Protection Association (NFPA) cover general fire protection best practices for any type of facility, but also specific publications pertaining to IT equipment and data centers.

Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?

A.
Cloud service business manager
A.
Cloud service business manager
Answers
B.
Cloud service user
B.
Cloud service user
Answers
C.
Cloud service administrator
C.
Cloud service administrator
Answers
D.
Cloud service integrator
D.
Cloud service integrator
Answers
Suggested answer: D

Explanation:

The cloud service integrator is the official role that involves connecting and integrating existing systems and services with a cloud environment. This may involve moving services into a cloud environment, or connecting to external cloud services and capabilities from traditional data center-hosted services.

Which technique involves replacing values within a specific data field to protect sensitive data?

A.
Anonymization
A.
Anonymization
Answers
B.
Masking
B.
Masking
Answers
C.
Tokenization
C.
Tokenization
Answers
D.
Obfuscation
D.
Obfuscation
Answers
Suggested answer: B

Explanation:

Masking involves replacing specific data within a data set with new values. For example, with credit card fields, as most who have ever purchased anything online can attest, nearly the entire credit card number is masked with a character such as an asterisk, with the last four digits left visible for identification and confirmation.

What expectation of data custodians is made much more challenging by a cloud implementation, especially with PaaS or SaaS?

A.
Data classification
A.
Data classification
Answers
B.
Knowledge of systems
B.
Knowledge of systems
Answers
C.
Access to data
C.
Access to data
Answers
D.
Encryption requirements
D.
Encryption requirements
Answers
Suggested answer: B

Explanation:

Under the Federal Rules of Civil Procedure, data custodians are assumed and expected to have full and comprehensive knowledge of the internal design and architecture of their systems. In a cloud environment, especially with PaaS and SaaS, it is impossible for the data custodian to have this knowledge because those systems are controlled by the cloud provider and protected as proprietary knowledge.

What type of PII is controlled based on laws and carries legal penalties for noncompliance with requirements?

A.
Contractual
A.
Contractual
Answers
B.
Regulated
B.
Regulated
Answers
C.
Specific
C.
Specific
Answers
D.
Jurisdictional
D.
Jurisdictional
Answers
Suggested answer: B

Explanation:

Regulated PII involves those requirements put forth by specific laws or regulations, and unlike contractual PII, where a violation can lead to contractual penalties, a violation of regulated PII can lead to fines or even criminal charges in some jurisdictions. PII regulations can depend on either the jurisdiction that applies to the hosting location or application or specific legislation based on the industry or type of data used.

Total 512 questions
Go to page: of 52