ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 25

Question list
Search
Search

List of questions

Search

Three central concepts define what type of data and information an organization is responsible for pertaining to eDiscovery.

Which of the following are the three components that comprise required disclosure?

A.
Possession, ownership, control
A.
Possession, ownership, control
Answers
B.
Ownership, use, creation
B.
Ownership, use, creation
Answers
C.
Control, custody, use
C.
Control, custody, use
Answers
D.
Possession, custody, control
D.
Possession, custody, control
Answers
Suggested answer: D

Explanation:

Data that falls under the purview of an eDiscovery request is that which is in the possession, custody, or control of the organization. Although this is an easy concept in a traditional data center, it can be difficult to distinguish who actually possesses and controls the data in a cloud environment due to multitenancy and resource pooling. Although these options provide similar-sounding terms, they are ultimately incorrect.

Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?

A.
Cross-site scripting
A.
Cross-site scripting
Answers
B.
Missing function-level access control
B.
Missing function-level access control
Answers
C.
Injection
C.
Injection
Answers
D.
Cross-site forgery
D.
Cross-site forgery
Answers
Suggested answer: C

Explanation:

An injection attack is where a malicious actor will send commands or other arbitrary data through input and data fields with the intent of having the application or system execute the code as part of its normal processing and queries. This can trick an application into exposing data that is not intended or authorized to be exposed, or it could potentially allow an attacker to gain insight into configurations or security controls. Missing function-level access control exists where an application only checks for authorization during the initial login process and does not further validate with each function call. Cross-site request forgery occurs when an attack forces an authenticated user to send forged requests to an application running under their own access and credentials. Cross-site scripting occurs when an attacker is able to send untrusted data to a user's browser without going through validation processes.

With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?

A.
Structured and hierarchical
A.
Structured and hierarchical
Answers
B.
Volume and object
B.
Volume and object
Answers
C.
Volume and database
C.
Volume and database
Answers
D.
Structured and unstructured
D.
Structured and unstructured
Answers
Suggested answer: B

Explanation:

The question-is describing the Infrastructure as a Service (IaaS) cloud offering, and as such, the volume and object storage types will be available to the customer. Structured and unstructured are storage types associated with PaaS, and although the other answers present similar-sounding storage types, they are a mix of real and fake names.

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?

A.
Inter-cloud provider
A.
Inter-cloud provider
Answers
B.
Cloud service business manager
B.
Cloud service business manager
Answers
C.
Cloud service administrator
C.
Cloud service administrator
Answers
D.
Cloud service integrator
D.
Cloud service integrator
Answers
Suggested answer: A

Explanation:

The inter-cloud provider is responsible for peering with other cloud services and providers, as well as overseeing and managing federations and federated services. A cloud service administrator is responsible for testing, monitoring, and securing cloud services, as well as providing usage reporting and dealing with service problems. The cloud service integrator is responsible for connecting existing systems and services with a cloud. The cloud service business manager is responsible for overseeing the billing, auditing, and purchasing of cloud services.

Which data state would be most likely to use TLS as a protection mechanism?

A.
Data in use
A.
Data in use
Answers
B.
Data at rest
B.
Data at rest
Answers
C.
Archived
C.
Archived
Answers
D.
Data in transit
D.
Data in transit
Answers
Suggested answer: D

Explanation:

TLS would be used with data in transit, when packets are exchanged between clients or services and sent across a network. During the data-in-use state, the data is already protected via a technology such as TLS as it is exchanged over the network and then relies on other technologies such as digital signatures for protection while being used. The data-at-rest state primarily uses encryption for stored file objects. Archived data would be the same as data at rest.

You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.

Which of the following would be the most appropriate action to take first?

A.
Take a shapshot of the virtual machines
A.
Take a shapshot of the virtual machines
Answers
B.
Escrow the encryption keys
B.
Escrow the encryption keys
Answers
C.
Copy the data
C.
Copy the data
Answers
D.
Notify the customer
D.
Notify the customer
Answers
Suggested answer: D

Explanation:

When a cloud service provider receives an eDiscovery order pertaining to one of their customers, the first action they must take is to notify the customer. This allows the customer to be aware of what was received, as well as to conduct a review to determine if any challenges are necessary or warranted. Taking snapshots of virtual machines, copying data, and escrowing encryption keys are all processes involved in the actual collection of data and should not be performed until the customer has been notified of the request.

If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?

A.
Memory and networking
A.
Memory and networking
Answers
B.
CPU and software
B.
CPU and software
Answers
C.
CPU and storage
C.
CPU and storage
Answers
D.
CPU and memory
D.
CPU and memory
Answers
Suggested answer: D

Explanation:

A reservation guarantees to a cloud customer that they will have access to a minimal level of resources to run their systems, which will help mitigate against DoS attacks or systems that consume high levels of resources. A reservation pertains to memory and CPU resources. Under the concept of a reservation, memory and CPU are the guaranteed resources, but storage and networking are not included even though they are core components of cloud computing. Software would be out of scope for a guarantee and doesn't really pertain to the concept.

Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?

A.
Security misconfiguration
A.
Security misconfiguration
Answers
B.
Insecure direct object references
B.
Insecure direct object references
Answers
C.
Unvalidated redirects and forwards
C.
Unvalidated redirects and forwards
Answers
D.
Sensitive data exposure
D.
Sensitive data exposure
Answers
Suggested answer: A

Explanation:

Security misconfigurations occur when applications and systems are not properly configured or maintained in a secure manner. This can be due to a shortcoming in security baselines or configurations, unauthorized changes to system configurations, or a failure to patch and upgrade systems as the vendor releases security patches. Insecure direct object references occur when code references aspects of the infrastructure, especially internal or private systems, and an attacker can use that knowledge to glean more information about the infrastructure. Unvalidated redirects and forwards occur when an application has functions to forward users to other sites, and these functions are not properly secured to validate the data and redirect requests, allowing spoofing for malware or phishing attacks.

Sensitive data exposure occurs when an application does not use sufficient encryption and other security controls to protect sensitive application data.

Which of the following is considered an internal redundancy for a data center?

A.
Power feeds
A.
Power feeds
Answers
B.
Chillers
B.
Chillers
Answers
C.
Network circuits
C.
Network circuits
Answers
D.
Generators
D.
Generators
Answers
Suggested answer: B

Explanation:

Chillers and cooling systems are internal to a data center and its operations, and as such they are considered an internal redundancy. Power feeds, network circuits, and generators are all external to a data center and provide utility services to them, which makes them an external redundancy.

Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?

A.
Injection
A.
Injection
Answers
B.
Cross-site request forgery
B.
Cross-site request forgery
Answers
C.
Missing function-level access control
C.
Missing function-level access control
Answers
D.
Cross-site scripting
D.
Cross-site scripting
Answers
Suggested answer: B

Explanation:

A cross-site request forgery (CSRF) attack forces a client that a user has used to authenticate to an application to send forged requests under the user's own credentials to execute commands and requests that the application thinks are coming from a trusted client and user. Although this type of attack cannot be used to steal data directly because the attacker has no way to see the results of the commands, it does open other ways to compromise an application. Missing function-level access control exists where an application only checks for authorization during the initial login process and does not further validate with each function call. An injection attack is where a malicious actor sends commands or other arbitrary data through input and data fields with the intent of having the application or system execute the code as part of its normal processing and queries. Cross-site scripting occurs when an attacker is able to send untrusted data to a user's browser without going through validation processes.

Total 512 questions
Go to page: of 52