ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.

What is the term associated with this determination?

A.
Weighting
A.
Weighting
Answers
B.
Prioritization
B.
Prioritization
Answers
C.
Shares
C.
Shares
Answers
D.
Scoring
D.
Scoring
Answers
Suggested answer: C

Explanation:

Shares are used within a cloud environment to prioritize resource allocation when customer requests exceed the available resources. Cloud providers utilize shares by assigning a priority score to each customer and allocating resources to those with the highest scores first. Scoring is a component of shares that determines the actual order in which to allocate resources. Neither weighting nor prioritization is the correct term in this case.

In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?

A.
Demagnetizing
A.
Demagnetizing
Answers
B.
Shredding
B.
Shredding
Answers
C.
Degaussing
C.
Degaussing
Answers
D.
Cryptographic erasure
D.
Cryptographic erasure
Answers
Suggested answer: D

Explanation:

Cryptographic erasure is a secure method to destroy data by destroying the keys that were used to encrypt it. This method is universally available for volume storage on IaaS and is also extremely quick. Shredding, degaussing, and demagnetizing are all physically destructive methods that would not be permitted within a cloud environment using shared resources.

Where is a DLP solution generally installed when utilized for monitoring data in use?

A.
Application server
A.
Application server
Answers
B.
Database server
B.
Database server
Answers
C.
Network perimeter
C.
Network perimeter
Answers
D.
User's client
D.
User's client
Answers
Suggested answer: D

Explanation:

To monitor data in use, the DLP solution's optimal location would be on the user's client or workstation, where the data would be used or processed, and where it would be most vulnerable to access or exposure. The network perimeter is most appropriate for data in transit, and an application server would serve as middle stage between data at rest and data in use, but is a less correct answer than a user's client. A database server would be an example of a location appropriate for monitoring data at rest.

Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

A.
Regulation
A.
Regulation
Answers
B.
Multitenancy
B.
Multitenancy
Answers
C.
Virtualization
C.
Virtualization
Answers
D.
Resource pooling
D.
Resource pooling
Answers
Suggested answer: B

Explanation:

With cloud providers hosting a number of different customers, it would be impractical for them to pursue additional certifications based on the needs of a specific customer. Cloud environments are built to a common denominator to serve the greatest number of customers. Especially within a public cloud model, it is not possible or practical for a cloud provider to alter its services for specific customer demands. Resource pooling and virtualization within a cloud environment would be the same for all customers, and would not impact certifications that a cloud provider might be willing to pursue. Regulations would form the basis for certification problems and would be a reason for a cloud provider to pursue specific certifications to meet customer requirements.

Which phase of the cloud data lifecycle would be the MOST appropriate for the use of DLP technologies to protect the data?

A.
Use
A.
Use
Answers
B.
Store
B.
Store
Answers
C.
Share
C.
Share
Answers
D.
Create
D.
Create
Answers
Suggested answer: C

Explanation:

During the share phase, data is allowed to leave the application for consumption by other vendors, systems, or services. At this point, as the data is leaving the security controls of the application, the use of DLP technologies is appropriate to control how the data is used or to force expiration. During the use, create, and store phases, traditional security controls are available and are more appropriate because the data is still internal to the application.

During which phase of the cloud data lifecycle is it possible for the classification of data to change?

A.
Use
A.
Use
Answers
B.
Archive
B.
Archive
Answers
C.
Create
C.
Create
Answers
D.
Share
D.
Share
Answers
Suggested answer: C

Explanation:

The create phase encompasses any time data is created, imported, or modified. With any change in the content or value of data, the classification may also change. It must be continually reevaluated to ensure proper security. During the use, share, and archive phases, the data is not modified in any way, so the original classification is still relevant.

If a key feature of cloud computing that your organization desires is the ability to scale and expand without limit or concern about available resources, which cloud deployment model would you MOST likely be considering?

A.
Public
A.
Public
Answers
B.
Hybrid
B.
Hybrid
Answers
C.
Private
C.
Private
Answers
D.
Community
D.
Community
Answers
Suggested answer: A

Explanation:

Public clouds, such as AWS and Azure, are massive systems run by major corporations, and they account for a significant share of Internet traffic and services.

They are always expanding, offer enormous resources to customers, and are the least likely to run into resource constraints compared to the other deployment models. Private clouds would likely have the resources available for specific uses and could not be assumed to have a large pool of resources available for expansion. A community cloud would have the same issues as a private cloud, being targeted to similar organizations. A hybrid cloud, because it spans multiple clouds, would not fit the bill either, without the use of individual cloud models.

What is a serious complication an organization faces from the compliance perspective with international operations?

A.
Multiple jurisdictions
A.
Multiple jurisdictions
Answers
B.
Different certifications
B.
Different certifications
Answers
C.
Different operational procedures
C.
Different operational procedures
Answers
D.
Different capabilities
D.
Different capabilities
Answers
Suggested answer: A

Explanation:

When operating within a global framework, a security professional runs into a multitude of jurisdictions and requirements, which often may not be clearly applicable or may be in contention with each other. These requirements can involve the location of the users and the type of data they enter into systems, the laws governing the organization that owns the application and any regulatory requirements they may have, and finally the appropriate laws and regulations for the jurisdiction housing the IT resources and where the data is actually stored, which may be multiple jurisdictions as well. Different certifications would not come into play as a challenge because the major IT and data center certifications are international and would apply to any cloud provider. Different capabilities and different operational procedures would be mitigated by the organization's selection of a cloud provider and would not be a challenge if an appropriate provider was chosen, regardless of location.

ISO/IEC has established international standards for many aspects of computing and any processes or procedures related to information technology.

Which ISO/IEC standard has been established to provide a framework for handling eDiscovery processes?

A.
ISO/IEC 27001
A.
ISO/IEC 27001
Answers
B.
ISO/IEC 27002
B.
ISO/IEC 27002
Answers
C.
ISO/IEC 27040
C.
ISO/IEC 27040
Answers
D.
ISO/IEC 27050
D.
ISO/IEC 27050
Answers
Suggested answer: D

Explanation:

ISO/IEC 27050 strives to establish an internationally accepted standard for eDiscovery processes and best practices. It encompasses all steps of the eDiscovery process, including the identification, preservation, collection, processing, review, analysis, and the final production of the requested data archive. ISO/IEC 27001 is a general security specification for an information security management system. ISO/IEC 27002 gives best practice recommendations for information security management. ISO/IEC 27040 is focused on the security of storage systems.

If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?

A.
Limit
A.
Limit
Answers
B.
Reservation
B.
Reservation
Answers
C.
Assurance
C.
Assurance
Answers
D.
Guarantee
D.
Guarantee
Answers
Suggested answer: B

Explanation:

A reservation guarantees to a cloud customer that they will have access to a minimal level of resources to run their systems, which will help mitigate against DoS attacks or systems that consume high levels of resources. A limit refers to the enforcement of a maximum level of resources that can be consumed by or allocated to a cloud customer, service, or system. Both guarantee and assurance are terms that sound similar to reservation, but they are not correct choices.

Total 512 questions
Go to page: of 52