ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 41

Question list
Search
Search

In which cloud service model is the customer required to maintain the OS?

A.
Iaas
A.
Iaas
Answers
B.
CaaS
B.
CaaS
Answers
C.
PaaS
C.
PaaS
Answers
D.
SaaS
D.
SaaS
Answers
Suggested answer: A

Explanation:

In IaaS, the service is bare metal, and the customer has to install the OS and the software; the customer then is responsible for maintaining that OS. In the other models, the provider installs and maintains the OS.

When using a PaaS solution, what is the capability provided to the customer?

A.
To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The provider does not manage or control the underlyingcloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
A.
To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The provider does not manage or control the underlyingcloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
Answers
B.
To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlyingcloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
B.
To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlyingcloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
Answers
C.
To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the consumer supports. The consumer does not manage or control the underlyingcloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
C.
To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the consumer supports. The consumer does not manage or control the underlyingcloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
Answers
D.
To deploy onto the cloud infrastructure provider-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlyingcloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
D.
To deploy onto the cloud infrastructure provider-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlyingcloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
Answers
Suggested answer: B

Explanation:

According to "The NIST Definition of Cloud Computing," in PaaS, "the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

What are SOC 1/SOC 2/SOC 3?

A.
Audit reports
A.
Audit reports
Answers
B.
Risk management frameworks
B.
Risk management frameworks
Answers
C.
Access controls
C.
Access controls
Answers
D.
Software developments
D.
Software developments
Answers
Suggested answer: A

Explanation:

An SOC 1 is a report on controls at a service organization that may be relevant to a user entity's internal control over financial reporting. An SOC 2 report is based on the existing SysTrust and WebTrust principles. The purpose of an SOC 2 report is to evaluate an organization's information systems relevant to security, availability, processing integrity, confidentiality, or privacy. An SOC 3 report is also based on the existing SysTrust and WebTrust principles, like a SOC 2 report. The difference is that the SOC 3 report does not detail the testing performed.

Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:

A.
Full inventory
A.
Full inventory
Answers
B.
Criticality
B.
Criticality
Answers
C.
Value
C.
Value
Answers
D.
Usefulness
D.
Usefulness
Answers
Suggested answer: D

Explanation:

When we gather information about business requirements, we need to do a complete inventory, receive accurate valuation of assets (usually from the owners of those assets), and assess criticality; this collection of information does not tell us, objectively, how useful an asset is, however.

In attempting to provide a layered defense, the security practitioner should convince senior management to include security controls of which type?

A.
Physical
A.
Physical
Answers
B.
All of the above
B.
All of the above
Answers
C.
technological
C.
technological
Answers
D.
Administrative
D.
Administrative
Answers
Suggested answer: B

Explanation:

Layered defense calls for a diverse approach to security.

The BIA can be used to provide information about all the following, except:

A.
BC/DR planning
A.
BC/DR planning
Answers
B.
Risk analysis
B.
Risk analysis
Answers
C.
Secure acquisition
C.
Secure acquisition
Answers
D.
Selection of security controls
D.
Selection of security controls
Answers
Suggested answer: C

Explanation:

The business impact analysis gathers asset valuation information that is beneficial for risk analysis and selection of security controls (it helps avoid putting the ten-dollar lock on the five-dollar bicycle), and criticality information that helps in BC/DR planning by letting the organization understand which systems, data, and personnel are necessary to continuously maintain. However, it does not aid secure acquisition efforts, since the assets examined by the BIA have already been acquired.

Which of the following are cloud computing roles?

A.
Cloud service broker and user
A.
Cloud service broker and user
Answers
B.
Cloud customer and financial auditor
B.
Cloud customer and financial auditor
Answers
C.
CSP and backup service provider
C.
CSP and backup service provider
Answers
D.
Cloud service auditor and object
D.
Cloud service auditor and object
Answers
Suggested answer: C

Explanation:

The following groups form the key roles and functions associated with cloud computing. They do not constitute an exhaustive list but highlight the main roles and functions within cloud computing:

- Cloud customer: An individual or entity that utilizes or subscribes to cloud based services or resources.

- CSP: A company that provides cloud-based platform, infrastructure, application, or storage services to other organizations or individuals, usually for a fee; otherwise known to clients "as a service.

- Cloud backup service provider: A third-party entity that manages and holds operational responsibilities for cloud-based data backup services and solutions to customers from a central data center.

- CSB: Typically a third-party entity or company that looks to extend or enhance value to multiple customers of cloud-based services through relationships with multiple CSPs. It acts as a liaison between cloud services customers and CSPs,selecting the best provider for each customer and monitoring the services. The CSB can be utilized as a "middleman" to broker the best deal and customize services to the customer's requirements. May also resell cloud services.

- Cloud service auditor: Third-party organization that verifies attainment of SLAs.

Which of the following are considered to be the building blocks of cloud computing?

A.
CPU, RAM, storage, and networking
A.
CPU, RAM, storage, and networking
Answers
B.
Data, CPU, RAM, and access control
B.
Data, CPU, RAM, and access control
Answers
C.
Data, access control, virtualization, and services
C.
Data, access control, virtualization, and services
Answers
D.
Storage, networking, printing, and virtualization
D.
Storage, networking, printing, and virtualization
Answers
Suggested answer: A

Which of the following is considered a physical control?

A.
Fences
A.
Fences
Answers
B.
Ceilings
B.
Ceilings
Answers
C.
Carpets
C.
Carpets
Answers
D.
Doors
D.
Doors
Answers
Suggested answer: A

Explanation:

Fences are physical controls; carpets and ceilings are architectural features, and a door is not necessarily a control: the lock on the door would be a physical security control. Although you might think of a door as a potential answer, the best answer is the fence; the exam will have questions where more than one answer is correct, and the answer that will score you points is the one that is most correct.

What is an experimental technology that is intended to create the possibility of processing encrypted data without having to decrypt it first?

A.
Quantum-state
A.
Quantum-state
Answers
B.
Polyinstantiation
B.
Polyinstantiation
Answers
C.
Homomorphic
C.
Homomorphic
Answers
D.
Gastronomic
D.
Gastronomic
Answers
Suggested answer: C

Explanation:

Homomorphic encryption hopes to achieve that goal; the other options are terms that have almost nothing to do with encryption.

Total 512 questions
Go to page: of 52