ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

What's a potential problem when object storage versus volume storage is used within IaaS for application use and dependency?

A.
Object storage is only optimized for small files.
A.
Object storage is only optimized for small files.
Answers
B.
Object storage is its own system, and data consistency depends on replication.
B.
Object storage is its own system, and data consistency depends on replication.
Answers
C.
Object storage may have availability issues.
C.
Object storage may have availability issues.
Answers
D.
Object storage is dependent on access control from the host server.
D.
Object storage is dependent on access control from the host server.
Answers
Suggested answer: B

Explanation:

Object storage runs on its own independent systems, which have their own redundancy and distribution. To ensure data consistency, sufficient time is needed for objects to fully replicate to all potential locations before being accessed. Object storage is optimized for high availability and will not be any less reliable than any other virtual machine within a cloud environment. It is hosted on a separate system that does not have dependencies in local host servers for access control, and it is optimized for files of all different sizes and uses.

Many aspects of cloud computing bring enormous benefits over a traditional data center, but also introduce new challenges unique to cloud computing.

Which of the following aspects of cloud computing makes appropriate data classification of high importance?

A.
Multitenancy
A.
Multitenancy
Answers
B.
Interoperability
B.
Interoperability
Answers
C.
Portability
C.
Portability
Answers
D.
Reversibility
D.
Reversibility
Answers
Suggested answer: A

Explanation:

With multitenancy, where different cloud customers all share the same physical systems and networks, data classification becomes even more important to ensure that the appropriate security controls are applied immediately to prevent any potential leakage or exposure to other customers. Portability refers to the ability to move easily from one cloud provider to another. Interoperability refers to the ability to reuse components and services for different uses. Reversibility refers to the ability of the cloud customer to quickly and completely remove all data and services from a cloud provider and to verify the removal.

Without the extensive funds of a large corporation, a small-sized company could gain considerable and cost-effective services for which of the following concepts by moving to a cloud environment?

A.
Regulatory
A.
Regulatory
Answers
B.
Security
B.
Security
Answers
C.
Testing
C.
Testing
Answers
D.
Development
D.
Development
Answers
Suggested answer: B

Explanation:

Cloud environments, regardless of the specific deployment model used, have extensive and robust security controls in place, especially in regard to physical and infrastructure security. A small company can leverage the extensive security controls and monitoring provided by a cloud provider, which they would unlikely ever be able to afford on their own. Moving to a cloud would not result in any gains for development and testing because these areas require the same rigor regardless of where deployment and hosting occur. Regulatory compliance in a cloud would not be a gain for an organization because it would likely result in additional oversight and auditing as well as require the organization to adapt to a new environment.

BCDR strategies typically do not involve the entire operations of an organization, but only those deemed critical to their business.

Which concept pertains to the amount of data and services needed to reach the predetermined level of operations?

A.
SRE
A.
SRE
Answers
B.
RPO
B.
RPO
Answers
C.
RSL
C.
RSL
Answers
D.
RTO
D.
RTO
Answers
Suggested answer: B

Explanation:

The recovery point objective (RPO) sets and defines the amount of data an organization must have available or accessible to reach the predetermined level of operations necessary during a BCDR situation. The recovery time objective (RTO) measures the amount of time necessary to recover operations to meet the BCDR plan. The recovery service level (RSL) measures the percentage of operations that would be recovered during a BCDR situation. SRE is provided as an erroneous response.

Which of the following is NOT a commonly used communications method within cloud environments to secure data in transit?

A.
IPSec
A.
IPSec
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
VPN
C.
VPN
Answers
D.
DNSSEC
D.
DNSSEC
Answers
Suggested answer: D

Explanation:

DNSSEC is used as a security extension to DNS lookup queries in order to ensure the authenticity and authoritativeness of hostname resolutions, in order to prevent spoofing and redirection of traffic. Although it is a very important concept to be employed for security practices, it is not used to secure or encrypt data transmissions. HTTPS is the most commonly used security mechanism for data communications between clients and websites and web services. IPSec is less commonly used, but is also intended to secure communications between servers. VPN is commonly used to secure traffic into a network area or subnet for developers and administrative users.

Which crucial aspect of cloud computing can be most threatened by insecure APIs?

A.
Automation
A.
Automation
Answers
B.
Resource pooling
B.
Resource pooling
Answers
C.
Elasticity
C.
Elasticity
Answers
D.
Redundancy
D.
Redundancy
Answers
Suggested answer: A

Explanation:

Cloud environments depend heavily on API calls for management and automation. Any vulnerability with the APIs can cause significant risk and exposure to all tenants of the cloud environment. Resource pooling and elasticity could both be impacted by insecure APIs, as both require automation and orchestration to operate properly, but automation is the better answer here. Redundancy would not be directly impacted by insecure APIs.

The WS-Security standards are built around all of the following standards except which one?

A.
SAML
A.
SAML
Answers
B.
WDSL
B.
WDSL
Answers
C.
XML
C.
XML
Answers
D.
SOAP
D.
SOAP
Answers
Suggested answer: A

Explanation:

The WS-Security specifications, as well as the WS-Federation system, are built upon XML, WDSL, and SOAP. SAML is a very similar protocol that is used as an alternative to WS.XML, WDSL, and SOAP are all integral to the WS-Security specifications.

Which protocol, as a part of TLS, handles negotiating and establishing a connection between two parties?

A.
Record
A.
Record
Answers
B.
Binding
B.
Binding
Answers
C.
Negotiation
C.
Negotiation
Answers
D.
Handshake
D.
Handshake
Answers
Suggested answer: D

Explanation:

The TLS handshake protocol is what negotiates and establishes the TLS connection between two parties and enables a secure communications channel to then handle data transmissions. The TLS record protocol is the actual secure communications method for transmitting data; it's responsible for the encryption and authentication of packets throughout their transmission between the parties, and in some cases it also performs compression. Negotiation and binding are not protocols under TLS.

BCDR strategies typically do not involve the entire operations of an organization, but only those deemed critical to their business.

Which concept pertains to the required amount of time to restore services to the predetermined level?

A.
RPO
A.
RPO
Answers
B.
RSL
B.
RSL
Answers
C.
RTO
C.
RTO
Answers
D.
SRE
D.
SRE
Answers
Suggested answer: C

Explanation:

The recovery time objective (RTO) measures the amount of time necessary to recover operations to meet the BCDR plan. The recovery service level (RSL) measures the percentage of operations that would be recovered during a BCDR situation. The recovery point objective (RPO) sets and defines the amount of data an organization must have available or accessible to reach the predetermined level of operations necessary during a BCDR situation. SRE is provided as an erroneous response.

Your company is in the planning stages of moving applications that have large data sets to a cloud environment.

What strategy for data removal would be the MOST appropriate for you to recommend if costs and speed are primary considerations?

A.
Shredding
A.
Shredding
Answers
B.
Media destruction
B.
Media destruction
Answers
C.
Crypthographic erasure
C.
Crypthographic erasure
Answers
D.
Overwriting
D.
Overwriting
Answers
Suggested answer: C

Explanation:

Cryptographic erasure involves having the data encrypted, typically as a matter of standard operations, and then rendering the data useless and unreadable by destroying the encryption keys for it. It represents a very cheap and immediate way to destroy data, and it works in all environments. With a cloud environment and multitenancy, media destruction or the physical destruction of storage devices, including shredding, would not be possible. Depending on the environment, overwriting may or may not be possible, but cryptographic erasure is the best answer because it is always an available option and is very quick to implement.

Total 512 questions
Go to page: of 52