ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?

A.
Cross-site request forgery
A.
Cross-site request forgery
Answers
B.
Missing function-level access control
B.
Missing function-level access control
Answers
C.
Injection
C.
Injection
Answers
D.
Cross-site scripting
D.
Cross-site scripting
Answers
Suggested answer: B

Explanation:

It is imperative that applications do checks when each function or portion of the application is accessed to ensure that the user is properly authorized. Without continual checks each time a function is accessed, an attacker could forge requests to access portions of the application where authorization has not been granted. An injection attack is where a malicious actor sends commands or other arbitrary data through input and data fields with the intent of having the application or system execute the code as part of its normal processing and queries. Cross-site scripting occurs when an attacker is able to send untrusted data to a user's browser without going through validation processes. Cross-site request forgery occurs when an attack forces an authenticated user to send forged requests to an application running under their own access and credentials.

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

A.
Distributed clustering
A.
Distributed clustering
Answers
B.
Distributed balancing
B.
Distributed balancing
Answers
C.
Distributed optimization
C.
Distributed optimization
Answers
D.
Distributed resource scheduling
D.
Distributed resource scheduling
Answers
Suggested answer: D

Explanation:

Distributed resource scheduling (DRS) is used within all clustered systems as the method for providing high availability, scaling, management, workload distribution, and the balancing of jobs and processes. None of the other choices is the correct term in this case.

Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?

A.
SAML and HTML
A.
SAML and HTML
Answers
B.
XML and SAML
B.
XML and SAML
Answers
C.
XML and JSON
C.
XML and JSON
Answers
D.
JSON and SAML
D.
JSON and SAML
Answers
Suggested answer: C

Explanation:

JavaScript Object Notation (JSON) and Extensible Markup Language (XML) are the most commonly used data formats for the Representational State Transfer (REST) API and are typically implemented with caching for increased scalability and performance. Extensible Markup Language (XML) and Security Assertion

Markup Language (SAML) are both standards for exchanging encoded data between two parties, with XML being for more general use and SAML focused on authentication and authorization data. HTML is used for authoring web pages for consumption by web browsers

The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/ contractors.

What technology would be useful for protecting data at this point?

A.
IDS
A.
IDS
Answers
B.
DLP
B.
DLP
Answers
C.
IPS
C.
IPS
Answers
D.
WAF
D.
WAF
Answers
Suggested answer: B

Explanation:

Data loss prevention (DLP) solutions allow for control of data outside of the application or original system. They can enforce granular control such as printing, copying, and being read by others, as well as forcing expiration of access. Intrusion detection system (IDS) and intrusion prevention system (IPS) solutions are used for detecting and blocking suspicious and malicious traffic, respectively, whereas a web application firewall (WAF) is used for enforcing security or other controls on web-based applications.

When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.

What is the data encapsulation used with the SOAP protocol referred to as?

A.
Packet
A.
Packet
Answers
B.
Payload
B.
Payload
Answers
C.
Object
C.
Object
Answers
D.
Envelope
D.
Envelope
Answers
Suggested answer: D

Explanation:

Simple Object Access Protocol (SOAP) encapsulates its information in what is known as a SOAP envelope. It then leverages common communications protocols for transmission. Object is a type of cloud storage, but also a commonly used term with certain types of programming languages. Packet and payload are terms that sound similar to envelope but are not correct in this case.

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

A.
Hypervisor
A.
Hypervisor
Answers
B.
Management plane
B.
Management plane
Answers
C.
Object storage
C.
Object storage
Answers
D.
Encryption
D.
Encryption
Answers
Suggested answer: B

Explanation:

The management plane will have broad administrative access to all host systems throughout an environment; as such, it represents the most pressing security concerns. A compromise of the management plane can directly lead to compromises of any other systems within the environment. Although hypervisors represent a significant security concern to an environment because their compromise would expose any virtual systems hosted within them, the management plane is a better choice in this case because it controls multiple hypervisors. Encryption and object storage both represent lower-level security concerns.

Which of the following is NOT one of the main intended goals of a DLP solution?

A.
Showing due diligence
A.
Showing due diligence
Answers
B.
Preventing malicious insiders
B.
Preventing malicious insiders
Answers
C.
Regulatory compliance
C.
Regulatory compliance
Answers
D.
Managing and minimizing risk
D.
Managing and minimizing risk
Answers
Suggested answer: B

Explanation:

Data loss prevention (DLP) extends the capabilities for data protection beyond the standard and traditional security controls that are offered by operating systems, application containers, and network devices. DLP is not specifically implemented to counter malicious insiders, and would not be particularly effective in doing so, because a malicious insider with legitimate access would have other ways to obtain data. DLP is a set of practices and controls to manage and minimize risk, comply with regulatory requirements, and show due diligence with the protection of data.

Data center and operations design traditionally takes a tiered, topological approach.

Which of the following standards is focused on that approach and is prevalently used throughout the industry?

A.
IDCA
A.
IDCA
Answers
B.
NFPA
B.
NFPA
Answers
C.
BICSI
C.
BICSI
Answers
D.
Uptime Institute
D.
Uptime Institute
Answers
Suggested answer: D

Explanation:

The Uptime Institute publishes the most widely known and used standard for data center topologies and tiers. The National Fire Protection Association (NFPA) publishes a broad range of fire safety and design standards for many different types of facilities. Building Industry Consulting Services International (BICSI) issues certifications for data center cabling. The International Data Center Authority (IDCA) offers the Infinity Paradigm, which takes a macro-level approach to data center design.

Jurisdictions have a broad range of privacy requirements pertaining to the handling of personal data and information.

Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?

A.
Japan
A.
Japan
Answers
B.
United States
B.
United States
Answers
C.
European Union
C.
European Union
Answers
D.
Russia
D.
Russia
Answers
Suggested answer: D

Explanation:

The Russian government requires all data and processing of information about its citizens to be done solely on systems and applications that reside within the physical borders of the country. The United States, European Union, and Japan focus their data privacy laws on requirements and methods for the protection of data, rather than where the data physically resides.

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

A.
APIs
A.
APIs
Answers
B.
Scripts
B.
Scripts
Answers
C.
TLS
C.
TLS
Answers
D.
XML
D.
XML
Answers
Suggested answer: A

Explanation:

The management plane uses APIs to execute remote calls across the cloud environment to various management systems, especially hypervisors. This allows a centralized administrative interface, often a web portal, to orchestrate tasks throughout an enterprise. Scripts may be utilized to execute API calls, but they are not used directly to interact with systems. XML is used for data encoding and transmission, but not for executing remote calls. TLS is used to encrypt communications and may be used with API calls, but it is not the actual process for executing commands.

Total 512 questions
Go to page: of 52