ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Which kind of SSAE audit reviews controls dealing with the organization's controls for assuring the confidentiality, integrity, and availability of data?

A.
SOC 1
A.
SOC 1
Answers
B.
SOC 2
B.
SOC 2
Answers
C.
SOC 3
C.
SOC 3
Answers
D.
SOC 4
D.
SOC 4
Answers
Suggested answer: B

Explanation:

SOC 2 deals with the CIA triad. SOC 1 is for financial reporting. SOC 3 is only an attestation by the auditor. There is no SOC 4.

To address shared monitoring and testing responsibilities in a cloud configuration, the provider might offer all these to the cloud customer except:

A.
Access to audit logs and performance data
A.
Access to audit logs and performance data
Answers
B.
DLP solution results
B.
DLP solution results
Answers
C.
Security control administration
C.
Security control administration
Answers
D.
SIM, SEIM. and SEM logs
D.
SIM, SEIM. and SEM logs
Answers
Suggested answer: C

Explanation:

While the provider might share any of the other options listed, the provider will not share administration of security controls with the customer. Security controls are the sole province of the provider.

Which kind of SSAE audit report is most beneficial for a cloud customer, even though it's unlikely the cloud provider will share it?

A.
SOC 3
A.
SOC 3
Answers
B.
SOC 1 Type 2
B.
SOC 1 Type 2
Answers
C.
SOC 2 Type 2
C.
SOC 2 Type 2
Answers
D.
SOC 1 Type 1 Answer: C The SOC 3 is the least detailed, so the provider is not concerned about revealing it. The SOC 1 Types 1 and 2 are about financial reporting and not relevant.The SOC 2 Type 2 is much more detailed and will most likely be kept closely held by the provider.
D.
SOC 1 Type 1 Answer: C The SOC 3 is the least detailed, so the provider is not concerned about revealing it. The SOC 1 Types 1 and 2 are about financial reporting and not relevant.The SOC 2 Type 2 is much more detailed and will most likely be kept closely held by the provider.
Answers
Suggested answer:

When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:

A.
Many states have data breach notification laws.
A.
Many states have data breach notification laws.
Answers
B.
Breaches can cause the loss of proprietary data.
B.
Breaches can cause the loss of proprietary data.
Answers
C.
Breaches can cause the loss of intellectual property.
C.
Breaches can cause the loss of intellectual property.
Answers
D.
Legal liability can't be transferred to the cloud provider.
D.
Legal liability can't be transferred to the cloud provider.
Answers
Suggested answer: D

Explanation:

State notification laws and the loss of proprietary data/intellectual property pre-existed the cloud; only the lack of ability to transfer liability is new.

What is the term we use to describe the general ease and efficiency of moving data from one cloud provider either to another cloud provider or down from the cloud?

A.
Obfuscation
A.
Obfuscation
Answers
B.
Elasticity
B.
Elasticity
Answers
C.
Mobility
C.
Mobility
Answers
D.
Portability
D.
Portability
Answers
Suggested answer: D

Explanation:

Elasticity is the name for the benefit of cloud computing where resources can be apportioned as necessary to meet customer demand. Obfuscation is a technique to hide full raw datasets, either from personnel who do not have need to know or for use in testing. Mobility is not a term pertinent to the CBK.

Countermeasures for protecting cloud operations against internal threats include all of the following except:

A.
Mandatory vacation
A.
Mandatory vacation
Answers
B.
Least privilege
B.
Least privilege
Answers
C.
Separation of duties
C.
Separation of duties
Answers
D.
Conflict of interest
D.
Conflict of interest
Answers
Suggested answer: D

Explanation:

Conflict of interest is a threat, not a control.

The cloud customer will have the most control of their data and systems, and the cloud provider will have the least amount of responsibility, in which cloud computing arrangement?

A.
IaaS
A.
IaaS
Answers
B.
SaaS
B.
SaaS
Answers
C.
Community cloud
C.
Community cloud
Answers
D.
PaaS
D.
PaaS
Answers
Suggested answer: A

Explanation:

IaaS entails the cloud customer installing and maintaining the OS, programs, and data; PaaS has the customer installing programs and data; in SaaS, the customer only uploads data. In a community cloud, data and device owners are distributed.

Countermeasures for protecting cloud operations against external attackers include all of the following except:

A.
Continual monitoring for anomalous activity.
A.
Continual monitoring for anomalous activity.
Answers
B.
Detailed and extensive background checks.
B.
Detailed and extensive background checks.
Answers
C.
Regular and detailed configuration/change management activities
C.
Regular and detailed configuration/change management activities
Answers
D.
Hardened devices and systems, including servers, hosts, hypervisors, and virtual machines.
D.
Hardened devices and systems, including servers, hosts, hypervisors, and virtual machines.
Answers
Suggested answer: B

Explanation:

Background checks are controls for attenuating potential threats from internal actors; external threats aren't likely to submit to background checks.

User access to the cloud environment can be administered in all of the following ways except:

A.
Provider provides administration on behalf the customer
A.
Provider provides administration on behalf the customer
Answers
B.
Customer directly administers access
B.
Customer directly administers access
Answers
C.
Third party provides administration on behalf of the customer
C.
Third party provides administration on behalf of the customer
Answers
D.
Customer provides administration on behalf of the provider
D.
Customer provides administration on behalf of the provider
Answers
Suggested answer: D

Explanation:

The customer does not administer on behalf of the provider. All the rest are possible options.

Countermeasures for protecting cloud operations against internal threats include all of the following except:

A.
Extensive and comprehensive training programs, including initial, recurring, and refresher sessions
A.
Extensive and comprehensive training programs, including initial, recurring, and refresher sessions
Answers
B.
Skills and knowledge testing
B.
Skills and knowledge testing
Answers
C.
Hardened perimeter devices
C.
Hardened perimeter devices
Answers
D.
Aggressive background checks
D.
Aggressive background checks
Answers
Suggested answer: C

Explanation:

Hardened perimeter devices are more useful at attenuating the risk of external attack.

Total 512 questions
Go to page: of 52