ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.

Which role would you be assuming under this directive?

A.
Cloud service administrator
A.
Cloud service administrator
Answers
B.
Cloud service user
B.
Cloud service user
Answers
C.
Cloud service integrator
C.
Cloud service integrator
Answers
D.
Cloud service business manager
D.
Cloud service business manager
Answers
Suggested answer: C

Explanation:

The cloud service integrator role is responsible for connecting and integrating existing services and applications with cloud-based services.A cloud service administrator is responsible for testing, monitoring, and securing cloud services, as well as providing usage reporting and dealing with service problems. The cloud service user is someone who consumes cloud services. The cloud service business manager is responsible for overseeing the billing, auditing, and purchasing of cloud services.

One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.

Which aspect of cloud computing makes this particular component more challenging than in a traditional data center?

A.
Portability
A.
Portability
Answers
B.
Virtualization
B.
Virtualization
Answers
C.
Elasticity
C.
Elasticity
Answers
D.
Resource pooling
D.
Resource pooling
Answers
Suggested answer: B

Explanation:

Cloud services make exclusive use of virtualization, and systems change over time, including the addition, subtraction, and reimaging of virtual machines. It is extremely unlikely that the exact same virtual machines and images used in a previous audit would still be in use or even available for a later audit, making the tracking of changes over time extremely difficult, or even impossible. Elasticity refers to the ability to add and remove resources from a system or service to meet current demand, and although it plays a factor in making the tracking of virtual machines very difficult over time, it is not the best answer in this case.

Resource pooling pertains to a cloud environment sharing a large amount of resources between different customers and services. Portability refers to the ability to move systems or services easily between different cloud providers.

In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?

A.
GLBA
A.
GLBA
Answers
B.
Safe Harbor
B.
Safe Harbor
Answers
C.
HIPAA
C.
HIPAA
Answers
D.
SOX
D.
SOX
Answers
Suggested answer: D

Explanation:

The Sarbanes-Oxley Act (SOX) regulates the financial and accounting practices used by organizations in order to protect shareholders from improper practices and accounting errors.The Health Insurance Portability and Accountability Act (HIPAA) pertains to the protection of patient medical records and privacy. The Gramm-Leach-Bliley Act (GLBA) focuses on the use of PII within financial institutions. The Safe Harbor program was designed by the US government as a way for American companies to comply with European Union privacy laws.

Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?

A.
Injection
A.
Injection
Answers
B.
Missing function-level access control
B.
Missing function-level access control
Answers
C.
Cross-site scripting
C.
Cross-site scripting
Answers
D.
Cross-site request forgery
D.
Cross-site request forgery
Answers
Suggested answer: D

Explanation:

A cross-site request forgery (CSRF) attack forces a client that a user has used to authenticate to an application to send forged requests under the user's own credentials to execute commands and requests that the application thinks are coming from a trusted client and user. Although this type of attack cannot be used to steal data directly because the attacker has no way of seeing the results of the commands, it does open other ways to compromise an application. Missing function-level access control exists where an application only checks for authorization during the initial login process and does not further validate with each function call. Cross-site scripting occurs when an attacker is able to send untrusted data to a user's browser without going through validation processes. An injection attack is where a malicious actor sends commands or other arbitrary data through input and data fields with the intent of having the application or system execute the code as part of its normal processing and queries.

Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?

A.
DaaS
A.
DaaS
Answers
B.
PaaS
B.
PaaS
Answers
C.
IaaS
C.
IaaS
Answers
D.
SaaS
D.
SaaS
Answers
Suggested answer: B

Explanation:

Platform as a Service would allow software developers to quickly and easily deploy their applications among different hosting providers for testing and validation in order to determine the best option. Although IaaS would also be appropriate for hosting applications, it would require too much configuration of application servers and libraries in order to test code. Conversely, PaaS would provide a ready-to-use environment from the onset. DaaS would not be appropriate in any way for software developers to use to deploy applications. IaaS would not be appropriate in this scenario because it would require the developers to also deploy and maintain the operating system images or to contract with another firm to do so. SaaS, being a fully functional software platform, would not be appropriate for deploying applications into.

You just hired an outside developer to modernize some applications with new web services and functionality. In order to implement a comprehensive test platform for validation, the developer needs a data set that resembles a production data set in both size and composition.

In order to accomplish this, what type of masking would you use?

A.
Development
A.
Development
Answers
B.
Replicated
B.
Replicated
Answers
C.
Static
C.
Static
Answers
D.
Dynamic
D.
Dynamic
Answers
Suggested answer: C

Explanation:

Static masking takes a data set and produces a copy of it, but with sensitive data fields masked. This allows for a full data set from production for testing purposes, but without any sensitive data. Dynamic masking works with a live system and is not used to produce a distinct copy. The terms "replicated" and "development" are not types of masking.

In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?

A.
Limit
A.
Limit
Answers
B.
Cap
B.
Cap
Answers
C.
Throttle
C.
Throttle
Answers
D.
Reservation
D.
Reservation
Answers
Suggested answer: A

Explanation:

A limit puts a maximum value on the amount of resources that may be consumed by either a system, a service, or a cloud customer. It is commonly used to prevent one entity from consuming enormous amounts of resources and having an operational impact on other tenants within the same cloud system. Limits can either be hard or somewhat flexible, meaning a customer can borrow from other customers while still having their actual limit preserved. A reservation is a guarantee to a cloud customer that a certain level of resources will always be available to them, regardless of what operational demands are currently placed on the cloud environment. Both cap and throttle are terms that sound similar to limit, but they are not the correct terms in this case.

Where is a DLP solution generally installed when utilized for monitoring data at rest?

A.
Network firewall
A.
Network firewall
Answers
B.
Host system
B.
Host system
Answers
C.
Application server
C.
Application server
Answers
D.
Database server
D.
Database server
Answers
Suggested answer: B

Explanation:

To monitor data at rest appropriately, the DLP solution would be installed on the host system where the data resides. A database server, in some situations, may be an appropriate answer, but the host system is the best answer because a database server is only one example of where data could reside. An application server processes data and typically sits between the data and presentation zones, and as such, does not store data at rest. A network firewall would be more appropriate for data in transit because it is not a place where data would reside.

Which of the following aspects of security is solely the responsibility of the cloud provider?

A.
Regulatory compliance
A.
Regulatory compliance
Answers
B.
Physical security
B.
Physical security
Answers
C.
Operating system auditing
C.
Operating system auditing
Answers
D.
Personal security of developers
D.
Personal security of developers
Answers
Suggested answer: B

Explanation:

Regardless of the particular cloud service used, physical security of hardware and facilities is always the sole responsibility of the cloud provider. The cloud provider may release information about their physical security policies and procedures to ensure any particular requirements of potential customers will meet their regulatory obligations. Personal security of developers and regulatory compliance are always the responsibility of the cloud customer. Responsibility for operating systems, and the auditing of them, will differ based on the cloud service category used.

Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.

Which of the following is the optimal humidity level, as established by ASHRAE?

A.
20 to 40 percent relative humidity
A.
20 to 40 percent relative humidity
Answers
B.
50 to 75 percent relative humidity
B.
50 to 75 percent relative humidity
Answers
C.
40 to 60 percent relative humidity
C.
40 to 60 percent relative humidity
Answers
D.
30 to 50 percent relative humidity
D.
30 to 50 percent relative humidity
Answers
Suggested answer: C

Explanation:

The American Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE) recommends 40 to 60 percent relatively humidity for data centers.

None of these options is the recommendation from ASHRAE.

Total 512 questions
Go to page: of 52