ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

SOC Type 1 reports are considered "restricted use," in that they are intended only for limited audiences and purposes.

Which of the following is NOT a population that would be appropriate for a SOC Type 1 report?

A.
Current clients
A.
Current clients
Answers
B.
Auditors
B.
Auditors
Answers
C.
Potential clients
C.
Potential clients
Answers
D.
The service organization
D.
The service organization
Answers
Suggested answer: C

Explanation:

Potential clients are not served by SOC Type 1 audits. A Type 2 or Type 3 report would be appropriate for potential clients. SOC Type 1 reports are intended for restricted use, where only the service organization itself, current clients, or auditors would have access to them.

Having a reservation in a cloud environment can ensure operations continue in the event of high utilization across the cloud.

Which of the following would NOT be a capability covered by reservations?

A.
Performing business operations
A.
Performing business operations
Answers
B.
Starting virtual machines
B.
Starting virtual machines
Answers
C.
Running applications
C.
Running applications
Answers
D.
Auto-scaling
D.
Auto-scaling
Answers
Suggested answer: D

Explanation:

A reservation will not guarantee auto-scaling is available because it involves the allocation of additional resources beyond what a cloud customer already has provisioned. Reservations will guarantee minimal resources are available to start virtual machines, run applications, and perform normal business operations.

What must SOAP rely on for security since it does not provide security as a built-in capability?

A.
Encryption
A.
Encryption
Answers
B.
Tokenization
B.
Tokenization
Answers
C.
TLS
C.
TLS
Answers
D.
SSL
D.
SSL
Answers
Suggested answer: A

Explanation:

Simple Object Access Protocol (SOAP) uses Extensible Markup Language (XML) for data passing, and it must rely on the encryption of those data packages for security. TLS and SSL (before it was deprecated) represent two commons approaches to using encryption for protection of data transmissions. However, they are only two possible options and do not encapsulate the overall concept the question-is looking for. Tokenization, which involves the replacement of sensitive data with opaque values, would not be appropriate for use with SOAP because the actual data is needed by the services.

With a federated identity system, what does the identity provider send information to after a successful authentication?

A.
Relying party
A.
Relying party
Answers
B.
Service originator
B.
Service originator
Answers
C.
Service relay
C.
Service relay
Answers
D.
Service relay
D.
Service relay
Answers
Suggested answer: A

Explanation:

Upon successful authentication, the identity provider sends an assertion with appropriate attributes to the relying party to grant access and assign appropriate roles to the user. The other terms provided are similar sounding to the correct term but are not actual components of a federated system.

Which of the following technologies is NOT commonly used for accessing systems and services in a cloud environment in a secure manner?

A.
KVM
A.
KVM
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
VPN
C.
VPN
Answers
D.
TLS
D.
TLS
Answers
Suggested answer: A

Explanation:

A keyboard-video-mouse (KVM) system is commonly used for directly accessing server terminals in a data center. It is not a method that would be possible within a cloud environment, primarily due to the use virtualized systems, but also because only the cloud provider's staff would be allowed the physical access to hardware systems that's provided by a KVM. Hypertext Transfer Protocol Secure (HTTPS), virtual private network (VPN), and Transport Layer Security (TLS) are all technologies and protocols that are widely used with cloud implementations for secure access to systems and services.

Which component of ITIL involves handling anything that can impact services for either internal or public users?

A.
Incident management
A.
Incident management
Answers
B.
Deployment management
B.
Deployment management
Answers
C.
Problem management
C.
Problem management
Answers
D.
Change management
D.
Change management
Answers
Suggested answer: A

Explanation:

Incident management is focused on limiting the impact of disruptions to an organization's services or operations, as well as returning their state to full operational status as soon as possible. Problem management is focused on identifying and mitigating known problems and deficiencies before they occur. Deployment management is a subcomponent of change management and is where the actual code or configuration change is put into place. Change management involves the processes and procedures that allow an organization to make changes to its IT systems and services in a controlled manner.

Which protocol, as a part of TLS, handles the actual secure communications and transmission of data?

A.
Negotiation
A.
Negotiation
Answers
B.
Handshake
B.
Handshake
Answers
C.
Transfer
C.
Transfer
Answers
D.
Record
D.
Record
Answers
Suggested answer: D

Explanation:

The TLS record protocol is the actual secure communications method for transmitting data; it's responsible for encrypting and authenticating packets throughout their transmission between the parties, and in some cases it also performs compression. The TLS handshake protocol is what negotiates and establishes the TLS connection between two parties and enables the secure communications channel to then handle data transmissions. Negotiation and transfer are not protocols under TLS.

Which of the following terms is NOT a commonly used category of risk acceptance?

A.
Moderate
A.
Moderate
Answers
B.
Critical
B.
Critical
Answers
C.
Minimal
C.
Minimal
Answers
D.
Accepted
D.
Accepted
Answers
Suggested answer: D

Explanation:

Accepted is not a risk acceptance category. The risk acceptance categories are minimal, low, moderate, high, and critical.

Many activities within a cloud environment are performed via programmatic means, where complex and distributed operations are handled without the need to perform each step individually.

Which of the following concepts does this describe?

A.
Orchestration
A.
Orchestration
Answers
B.
Provisioning
B.
Provisioning
Answers
C.
Automation
C.
Automation
Answers
D.
Allocation
D.
Allocation
Answers
Suggested answer: A

Explanation:

Orchestration is the programmatic means of managing and coordinating activities within a cloud environment and allowing for a commensurate level of automation and self-service. Provisioning, allocation, and automation are all components of orchestration, but none refers to the overall concept.

Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed. Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?

A.
Disclosure
A.
Disclosure
Answers
B.
Transparency
B.
Transparency
Answers
C.
Openness
C.
Openness
Answers
D.
Documentation
D.
Documentation
Answers
Suggested answer: B

Explanation:

Transparency is the official process by which a cloud provider discloses insight and information into its configurations or operations to the appropriate audiences. Disclosure, openness, and documentation are all terms that sound similar to the correct answer, but none of them is the correct term in this case.

Total 512 questions
Go to page: of 52