ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

DNSSEC was designed to add a layer of security to the DNS protocol.

Which type of attack was the DNSSEC extension designed to mitigate?

A.
Account hijacking
A.
Account hijacking
Answers
B.
Snooping
B.
Snooping
Answers
C.
Spoofing
C.
Spoofing
Answers
D.
Data exposure
D.
Data exposure
Answers
Suggested answer: C

Explanation:

DNSSEC is an extension to the regular DNS protocol that utilizes digital signing of DNS query results, which can be verified to come from an authoritative source. This verification mitigates the ability for a rogue DNS server to be used to spoof query results and to direct users to malicious sites. DNSSEC provides for the verification of the integrity of DNS queries. It does not provide any protection from snooping or data exposure. Although it may help lessen account hijacking by preventing users from being directed to rogue sites, it cannot by itself eliminate the possibility.

Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?

A.
Metered service
A.
Metered service
Answers
B.
Measured billing
B.
Measured billing
Answers
C.
Metered billing
C.
Metered billing
Answers
D.
Measured service
D.
Measured service
Answers
Suggested answer: D

Explanation:

Measured service is the aspect of cloud computing that pertains to cloud services and resources being billed in a metered way, based only on the level of consumption and duration of the cloud customer. Although they sound similar to the correct answer, none of the other choices is the actual cloud terminology.

Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.

Which of the following compromise the two facets of computing?

A.
CPU and software
A.
CPU and software
Answers
B.
CPU and storage
B.
CPU and storage
Answers
C.
CPU and memory
C.
CPU and memory
Answers
D.
Memory and networking
D.
Memory and networking
Answers
Suggested answer: C

Explanation:

The CPU and memory resources of an environment together comprise its "computing" resources. Cloud environments, especially public clouds, are enormous pools of resources for computing and are typically divided among a large number of customers with constantly changing needs and demands. Although storage and networking are core components of a cloud environment, they do not comprise its computing core. Software, much like within a traditional data center, is highly subjective based on the application, system, service, or cloud computing model used; however, it is not one of the core cloud components.

With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?

A.
Structured and unstructured
A.
Structured and unstructured
Answers
B.
Structured and hierarchical
B.
Structured and hierarchical
Answers
C.
Volume and database
C.
Volume and database
Answers
D.
Volume and object
D.
Volume and object
Answers
Suggested answer: A

Explanation:

The question-is describing the Platform as a Service (PaaS) cloud offering, and as such, structured and unstructured storage types will be available to the customer. Volume and object are storage types associated with IaaS, and although the other answers present similar-sounding storage types, they are a mix of real and fake names.

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.

Which of the following is NOT something that firewalls are concerned with?

A.
IP address
A.
IP address
Answers
B.
Encryption
B.
Encryption
Answers
C.
Port
C.
Port
Answers
D.
Protocol
D.
Protocol
Answers
Suggested answer: B

Explanation:

Firewalls work at the network level and control traffic based on the source, destination, protocol, and ports. Whether or not the traffic is encrypted is not a factor with firewalls and their decisions about routing traffic. Firewalls work primarily with IP addresses, ports, and protocols.

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?

A.
Memory
A.
Memory
Answers
B.
Number of users
B.
Number of users
Answers
C.
Storage
C.
Storage
Answers
D.
CPU
D.
CPU
Answers
Suggested answer: B

Explanation:

Within IaaS, where the cloud customer is responsible for everything beyond the physical network, the number of users on a system would not be a factor in billing or service charges. The core cloud services for IaaS are based on the memory, storage, and CPU requirements of the cloud customer. Because the cloud customer with IaaS is responsible for its own images and deployments, these components comprise the basis of its cloud provisioning and measured services billing.

Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.

What type of attack is this?

A.
Injection
A.
Injection
Answers
B.
Missing function-level access control
B.
Missing function-level access control
Answers
C.
Cross-site scripting
C.
Cross-site scripting
Answers
D.
Cross-site request forgery
D.
Cross-site request forgery
Answers
Suggested answer: A

Explanation:

An injection attack is where a malicious actor sends commands or other arbitrary data through input and data fields with the intent of having the application or system execute the code as part of its normal processing and queries. This can trick an application into exposing data that is not intended or authorized to be exposed, or it can potentially allow an attacker to gain insight into configurations or security controls. Missing function-level access control exists where an application only checks for authorization during the initial login process and does not further validate with each function call. Cross-site request forgery occurs when an attack forces an authenticated user to send forged requests to an application running under their own access and credentials. Cross-site scripting occurs when an attacker is able to send untrusted data to a user's browser without going through validation processes.

For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?

A.
Half
A.
Half
Answers
B.
Full
B.
Full
Answers
C.
Minimal
C.
Minimal
Answers
D.
Depends on the contract
D.
Depends on the contract
Answers
Suggested answer: C

Explanation:

The goal with any cloud-hosting setup is for the cloud customer to be able to perform most or all its functions for service provisioning and configuration without any need for support from or interaction with the cloud provider beyond the automated tools provided. To fulfill the tenants of on-demand self-service, required interaction with the cloud provider--either half time, full time, or a commensurate amount of time based on the contract--would be in opposition to a cloud's intended use. As such, these answers are incorrect.

What does a cloud customer purchase or obtain from a cloud provider?

A.
Services
A.
Services
Answers
B.
Hosting
B.
Hosting
Answers
C.
Servers
C.
Servers
Answers
D.
Customers
D.
Customers
Answers
Suggested answer: A

Explanation:

No matter what form they come in, "services" are obtained or purchased by a cloud customer from a cloud service provider. Services can come in many forms--virtual machines, network configurations, hosting setups, and software access, just to name a few. Hosting and servers--or, with a cloud, more appropriately virtual machines--are just two examples of "services" that a customer would purchase from a cloud provider. "Customers" would never be a service that's purchased.

Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?

A.
Use
A.
Use
Answers
B.
Share
B.
Share
Answers
C.
Store
C.
Store
Answers
D.
Create
D.
Create
Answers
Suggested answer: C

Explanation:

The store phase occurs immediately after the create phase, and as data is committed to storage structures, the first opportunity for security controls to be implemented is realized. During the create phase, the data is not yet part of a system where security controls can be applied, and although the use and share phases also entail the application of security controls, they are not the first phase where the process occurs.

Total 512 questions
Go to page: of 52