ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?

A.
Measured service
A.
Measured service
Answers
B.
Broad network access
B.
Broad network access
Answers
C.
Resource pooling
C.
Resource pooling
Answers
D.
On-demand self-service
D.
On-demand self-service
Answers
Suggested answer: B

Explanation:

Broad network access to cloud services, although it is an integral aspect of cloud computing, would not being a specific benefit to an organization with cyclical business needs. The other options would allow for lower costs during periods of low usage as well as provide the ability to expand services quickly and easily when needed for peak periods. Measured service allows a cloud customer to only use the resources it needs at the time, and resource pooling allows a cloud customer to access resources as needed. On-demand self-service enables the cloud customer to change its provisioned resources on its own, without the need to interact with the staff from the cloud provider.

Which cloud deployment model is MOST likely to offer free or very cheap services to users?

A.
Hybrid
A.
Hybrid
Answers
B.
Community
B.
Community
Answers
C.
Public
C.
Public
Answers
D.
Private
D.
Private
Answers
Suggested answer: C

Explanation:

Public clouds offer services to anyone, regardless of affiliation, and are the most likely to offer free services to users. Examples of public clouds with free services include iCloud, Dropbox, and OneDrive. Private cloud models are designed for specific customers and for their needs, and would not offer services to the public at large, for free or otherwise. A community cloud is specific to a group of similar organizations and would not offer free or widely available public services. A hybrid cloud model would not fit the specifics of the question.

Where is a DLP solution generally installed when utilized for monitoring data in transit?

A.
Network perimeter
A.
Network perimeter
Answers
B.
Database server
B.
Database server
Answers
C.
Application server
C.
Application server
Answers
D.
Web server
D.
Web server
Answers
Suggested answer: A

Explanation:

To monitor data in transit, a DLP solution would optimally be installed at the network perimeter, to ensure that data leaving the network through various protocols conforms to security controls and policies. An application server or a web server would be more appropriate for monitoring data in use, and a database server would be an example of a location appropriate for monitoring data at rest.

With IaaS, what is responsible for handling the security and control over the volume storage space?

A.
Management plane
A.
Management plane
Answers
B.
Operating system
B.
Operating system
Answers
C.
Application
C.
Application
Answers
D.
Hypervisor
D.
Hypervisor
Answers
Suggested answer: B

Explanation:

Volume storage is allocated via a LUN to a system and then treated the same as any traditional storage. The operating system is responsible for formatting and securing volume storage as well as controlling all access to it. Applications, although they may use volume storage and have permissions to write to it, are not responsible for its formatting and security. Both a hypervisor and the management plane are outside of an individual system and are not responsible for managing the files and storage within that system.

Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?

A.
Hardening
A.
Hardening
Answers
B.
Leveling
B.
Leveling
Answers
C.
Baselines
C.
Baselines
Answers
D.
Standards
D.
Standards
Answers
Suggested answer: C

Explanation:

Baselines are a set of configurations and policies applied to all new systems or services, and they serve as the basis for deploying any other services on top of them. Although standards often form the basis for baselines, the term is applicable in this case. Hardening is the process of securing a system, often through the application of baselines. Leveling is an extraneous but similar term to baselining.

Which of the following tasks within a SaaS environment would NOT be something the cloud customer would be responsible for?

A.
Authentication mechanism
A.
Authentication mechanism
Answers
B.
Branding
B.
Branding
Answers
C.
Training
C.
Training
Answers
D.
User access
D.
User access
Answers
Suggested answer: A

Explanation:

The authentication mechanisms and implementations are the responsibility of the cloud provider because they are core components of the application platform and service. Within a SaaS implementation, the cloud customer will provision user access, deploy branding to the application interface (typically), and provide or procure training for its users.

An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer.

Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?

A.
Network
A.
Network
Answers
B.
Users
B.
Users
Answers
C.
Memory
C.
Memory
Answers
D.
CPU
D.
CPU
Answers
Suggested answer: B

Explanation:

Dealing with users or user access would not be an appropriate item for inclusion in an SLA specifically. However, user access and user experience would be covered indirectly through other metrics. Memory, CPU, and network resources are all typically included within an SLA for availability and response times when dealing with any incidents.

Within a federated identity system, which of the following would you be MOST likely to use for sending information for consumption by a relying party?

A.
XML
A.
XML
Answers
B.
HTML
B.
HTML
Answers
C.
WS-Federation
C.
WS-Federation
Answers
D.
SAML
D.
SAML
Answers
Suggested answer: D

Explanation:

The Security Assertion Markup Language (SAML) is the most widely used method for encoding and sending attributes and other information from an identity provider to a relying party.WS-Federation, which is used by Active Directory Federation Services (ADFS), is the second most used method for sending information to a relying party, but it is not a better choice than SAML. XML is similar to SAML in the way it encodes and labels data, but it does not have all of the required extensions that SAML does. HTML is not used within federated systems at all.

Which data state would be most likely to use digital signatures as a security protection mechanism?

A.
Data in use
A.
Data in use
Answers
B.
Data in transit
B.
Data in transit
Answers
C.
Archived
C.
Archived
Answers
D.
Data at rest
D.
Data at rest
Answers
Suggested answer: A

Explanation:

During the data-in-use state, the information has already been accessed from storage and transmitted to the service, so reliance on a technology such as digital signatures is imperative to ensure security and complement the security methods used during previous states. Data in transit relies on technologies such as TLS to encrypt network transmission of packets for security. Data at rest primarily uses encryption for stored file objects. Archived data would be the same as data at rest.

There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the stricter requirements.

Which US program was designed to help companies overcome these differences?

A.
SOX
A.
SOX
Answers
B.
HIPAA
B.
HIPAA
Answers
C.
GLBA
C.
GLBA
Answers
D.
Safe Harbor
D.
Safe Harbor
Answers
Suggested answer: D

Explanation:

The Safe Harbor regulations were developed by the Department of Commerce and are meant to serve as a way to bridge the gap between privacy regulations of the European Union and the United States. Due to the lack of adequate privacy laws and protection on the federal level in the US, European privacy regulations generally prohibit the exporting of PII from Europe to the United States. Participation in the Safe Harbor program is voluntary on the part of US organizations.

These organizations must conform to specific requirements and policies that mirror those from the EU, thus possibly fulfilling the EU requirements for data sharing and export. This way, American businesses can be allowed to serve customers in the EU. The Health Insurance Portability and Accountability Act (HIPAA) pertains to the protection of patient medical records and privacy. The Gramm-Leach-Bliley Act (GLBA) focuses on the use of PII within financial institutions. The Sarbanes-Oxley Act (SOX) regulates the financial and accounting practices used by organizations in order to protect shareholders from improper practices and errors.

Total 512 questions
Go to page: of 52