ISC CCSP Practice Test - Questions Answers, Page 14
List of questions
Question 131

Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?
A hybrid cloud model involves the use of more than one type of cloud hosting models, typically the mix of private and public cloud hosting models.
Question 132

Which of the following is NOT one of five principles of SOC Type 2 audits?
The SOC Type 2 audits include five principles: security, privacy, processing integrity, availability, and confidentiality.
Question 133

Which aspect of cloud computing makes data classification even more vital than in a traditional data center?
With multiple tenants within the same hosting environment, any failure to properly classify data may lead to potential exposure to other customers and applications within the same environment.
Question 134

What concept does the "T" represent in the STRIDE threat model?
Any application that sends data to the user will face the potential that the user could manipulate or alter the data, whether it resides in cookies, GET or POST commands, or headers, or manipulates client-side validations. If the user receives data from the application, it is crucial that the application validate and verify any data that is received back from the user.
Question 135

Which of the following would be a reason to undertake a BCDR test?
Any time a major functional change of an application occurs, a new BCDR test should be done to ensure the overall strategy and process are still applicable and appropriate.
Question 136

What is the biggest challenge to data discovery in a cloud environment?
With the distributed nature of cloud environments, the foremost challenge for data discovery is awareness of the location of data and keeping track of it during the constant motion of cloud storage systems.
Question 137

Which crucial aspect of cloud computing can be most threatened by insecure APIs?
Cloud environments depend heavily on API calls for management and automation. Any vulnerability with the APIs can cause significant risk and exposure to all tenants of the cloud environment.
Question 138

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
Security requirements should be incorporated into the software development lifecycle (SDLC) from the earliest requirement gathering stage and should be incorporated prior to the requirement analysis phase.
Question 139

Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?
Governance at its core is the idea of assigning jobs, takes, roles, and responsibilities and ensuring they are satisfactory performed.
Question 140

Which regulatory system pertains to the protection of healthcare data?
The Health Insurance Portability and Accountability Act (HIPAA) sets stringent requirements in the United States for the protection of healthcare records.
Question