ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.

Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?

A.
Interoperability
A.
Interoperability
Answers
B.
Resiliency
B.
Resiliency
Answers
C.
Scalability
C.
Scalability
Answers
D.
Portability
D.
Portability
Answers
Suggested answer: A

Explanation:

Interoperability is ability to easily move between cloud providers, by either moving or reusing components and services. This can pertain to any cloud deployment model, and it gives organizations the ability to constantly evaluate costs and services as well as move their business to another cloud provider as needed or desired. Portability relates to the wholesale moving of services from one cloud provider to another, not necessarily the reuse of components or services for other purposes. Although resiliency is not an official concept within cloud computing, it certainly would be found throughout other topics such as elasticity, auto-scaling, and resource pooling. Scalability pertains to changing resource allocations to a service to meet current demand, either upward or downward in scope.

Which of the following provides assurance, to a predetermined acceptable level of certainty, that an entity is indeed who they claim to be?

A.
Authentication
A.
Authentication
Answers
B.
Identification
B.
Identification
Answers
C.
Proofing
C.
Proofing
Answers
D.
Authorization
D.
Authorization
Answers
Suggested answer: A

Explanation:

Authentication goes a step further than identification by providing a means for proving an entity's identification. Authentication is most commonly done through mechanisms such as passwords. Identification involves ascertaining who the entity is, but without a means of proving it, such as a name or user ID. Authorization occurs after authentication and sets access permissions and other privileges within a system or application for the user. Proofing is not a term that is relevant to the question.

Whereas a contract articulates overall priorities and requirements for a business relationship, which artifact enumerates specific compliance requirements, metrics, and response times?

A.
Service level agreement
A.
Service level agreement
Answers
B.
Service level contract
B.
Service level contract
Answers
C.
Service compliance contract
C.
Service compliance contract
Answers
D.
Service level amendment
D.
Service level amendment
Answers
Suggested answer: A

Explanation:

The service level agreement (SLA) articulates minimum requirements for uptime, availability, processes, customer service and support, security controls, auditing requirements, and any other key aspect or requirement of the contract. Although the other choices sound similar to the correct answer, none is the proper term for this concept.

When an organization is considering the use of cloud services for BCDR planning and solutions, which of the following cloud concepts would be the most important?

A.
Reversibility
A.
Reversibility
Answers
B.
Elasticity
B.
Elasticity
Answers
C.
Interoperability
C.
Interoperability
Answers
D.
Portability
D.
Portability
Answers
Suggested answer: D

Explanation:

Portability is the ability for a service or system to easily move among different cloud providers. This is essential for using a cloud solution for BCDR because vendor lock-in would inhibit easily moving and setting up services in the event of a disaster, or it would necessitate a large number of configuration or component changes to implement. Interoperability, or the ability to reuse components for other services or systems, would not be an important factor for BCDR.

Reversibility, or the ability to remove all data quickly and completely from a cloud environment, would be important at the end of a disaster, but would not be important during setup and deployment. Elasticity, or the ability to resize resources to meet current demand, would be very beneficial to a BCDR situation, but not as vital as portability.

What masking strategy involves the replacing of sensitive data at the time it is accessed and used as it flows between the data and application layers of a service?

A.
Active
A.
Active
Answers
B.
Static
B.
Static
Answers
C.
Dynamic
C.
Dynamic
Answers
D.
Transactional
D.
Transactional
Answers
Suggested answer: C

Explanation:

Dynamic masking involves the live replacing of sensitive data fields during transactional use between the data and application layers of a service. Static masking involves creating a full data set with the sensitive data fields masked, but is not done during live transactions like dynamic masking. Active and transactional are offered as similar types of answers but are not types of masking.

Which of the following would be considered an example of insufficient due diligence leading to security or operational problems when moving to a cloud?

A.
Monitoring
A.
Monitoring
Answers
B.
Use of a remote key management system
B.
Use of a remote key management system
Answers
C.
Programming languages used
C.
Programming languages used
Answers
D.
Reliance on physical network controls
D.
Reliance on physical network controls
Answers
Suggested answer: D

Explanation:

Many organizations in a traditional data center make heavy use of physical network controls for security. Although this is a perfectly acceptable best practice in a traditional data center, this reliance is not something that will port to a cloud environment. The failure of an organization to properly understand and adapt to the difference in network controls when moving to a cloud will likely leave an application with security holes and vulnerabilities. The use of a remote key management system, monitoring, or certain programming languages would not constitute insufficient due diligence by itself.

Which aspect of cloud computing serves as the biggest challenge to using DLP to protect data at rest?

A.
Portability
A.
Portability
Answers
B.
Resource pooling
B.
Resource pooling
Answers
C.
Interoperability
C.
Interoperability
Answers
D.
Reversibility
D.
Reversibility
Answers
Suggested answer: B

Explanation:

Resource pooling serves as the biggest challenge to using DLP solutions to protect data at rest because data is spread across large systems, which are also shared by many different clients. With the data always moving and being distributed, additional challenges for protection are created versus a physical and isolated storage system. Portability is the ability to easily move between different cloud providers, and interoperability is focused on the ability to reuse components or services. Reversibility pertains to the ability of a cloud customer to easily and completely remove their data and services from a cloud provider.

What category of PII data can carry potential fines or even criminal charges for its improper use or disclosure?

A.
Protected
A.
Protected
Answers
B.
Legal
B.
Legal
Answers
C.
Regulated
C.
Regulated
Answers
D.
Contractual
D.
Contractual
Answers
Suggested answer: C

Explanation:

Regulated PII data carries legal and jurisdictional requirements, along with official penalties for its misuse or disclosure, which can be either civil or criminal in nature. Legal and protected are similar terms, but neither is the correct answer in this case. Contractual requirements can carry financial or contractual impacts for the improper use or disclosure of PII data, but not legal or criminal penalties that are officially enforced.

A variety of security systems can be integrated within a network--some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.

Which of the following types of technologies is best described here?

A.
IDS
A.
IDS
Answers
B.
IPS
B.
IPS
Answers
C.
Proxy
C.
Proxy
Answers
D.
Firewall
D.
Firewall
Answers
Suggested answer: B

Explanation:

An intrusion prevention system (IPS) can inspect traffic and detect any suspicious traffic based on a variety of factors, but it can also actively block such traffic.

Although an IDS can detect the same types of suspicious traffic as an IPS, it is only design to alert, not to block. A firewall is only concerned with IP addresses, ports, and protocols; it cannot be used for the signature-based detection of traffic. A proxy can limit or direct traffic based on more extensive factors than a network firewall can, but it's not capable of using the same signature detection rules as an IPS.

Upon completing a risk analysis, a company has four different approaches to addressing risk. Which approach it takes will be based on costs, available options, and adherence to any regulatory requirements from independent audits.

Which of the following groupings correctly represents the four possible approaches?

A.
Accept, avoid, transfer, mitigate
A.
Accept, avoid, transfer, mitigate
Answers
B.
Accept, deny, transfer, mitigate
B.
Accept, deny, transfer, mitigate
Answers
C.
Accept, deny, mitigate, revise
C.
Accept, deny, mitigate, revise
Answers
D.
Accept, dismiss, transfer, mitigate
D.
Accept, dismiss, transfer, mitigate
Answers
Suggested answer: A

Explanation:

The four possible approaches to risk are as follows: accept (do not patch and continue with the risk), avoid (implement solutions to prevent the risk from occurring), transfer (take out insurance), and mitigate (change configurations or patch to resolve the risk). Each of these answers contains at least one incorrect approach name.

Total 512 questions
Go to page: of 52