ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 50

Question list
Search
Search

Which of the following storage types is most closely associated with a database-type storage implementation?

A.
Object
A.
Object
Answers
B.
Unstructured
B.
Unstructured
Answers
C.
Volume
C.
Volume
Answers
D.
Structured
D.
Structured
Answers
Suggested answer: D

Explanation:

Structured storage involves organized and categorized data, which most closely resembles and operates like a database system would.

A data custodian is responsible for which of the following?

A.
Data context
A.
Data context
Answers
B.
Data content
B.
Data content
Answers
C.
The safe custody, transport, storage of the data, and implementation of business rules
C.
The safe custody, transport, storage of the data, and implementation of business rules
Answers
D.
Logging access and alerts
D.
Logging access and alerts
Answers
Suggested answer: C

Explanation:

A data custodian is responsible for the safe custody, transport, and storage of data, and the implementation of business roles.

Which of the following is the least challenging with regard to eDiscovery in the cloud?

A.
Identifying roles such as data owner, controller and processor
A.
Identifying roles such as data owner, controller and processor
Answers
B.
Decentralization of data storage
B.
Decentralization of data storage
Answers
C.
Forensic analysis
C.
Forensic analysis
Answers
D.
Complexities of International law
D.
Complexities of International law
Answers
Suggested answer: C

Explanation:

Forensic analysis is the least challenging of the answers provided as it refers to the analysis of data once it is obtained. The challenges revolve around obtaining the data for analysis due to the complexities of international law, the decentralization of data storage or difficulty knowing where to look, and identifying the data owner, controller, and processor.

What is the Cloud Security Alliance Cloud Controls Matrix (CCM)?

A.
A set of software development life cycle requirements for cloud service providers
A.
A set of software development life cycle requirements for cloud service providers
Answers
B.
An inventory of cloud services security controls that are arranged into a hierarchy of security domains
B.
An inventory of cloud services security controls that are arranged into a hierarchy of security domains
Answers
C.
An inventory of cloud service security controls that are arranged into separate security domains
C.
An inventory of cloud service security controls that are arranged into separate security domains
Answers
D.
A set of regulatory requirements for cloud service providers
D.
A set of regulatory requirements for cloud service providers
Answers
Suggested answer: C

Explanation:

The CSA CCM is an inventory of cloud service security controls that are arranged into separate security domains, not a hierarchy.

Which of the following is a valid risk management metric?

A.
KPI
A.
KPI
Answers
B.
KRI
B.
KRI
Answers
C.
SOC
C.
SOC
Answers
D.
SLA
D.
SLA
Answers
Suggested answer: B

Explanation:

KRI stands for key risk indicator. KRIs are the red flags if you will in the world of risk management. When these change, they indicate something is amiss and should be looked at quickly to determine if the change is minor or indicative of something important.

Which of the following is the best example of a key component of regulated PII?

A.
Audit rights of subcontractors
A.
Audit rights of subcontractors
Answers
B.
Items that should be implemented
B.
Items that should be implemented
Answers
C.
PCI DSS
C.
PCI DSS
Answers
D.
Mandatory breach reporting
D.
Mandatory breach reporting
Answers
Suggested answer: D

Explanation:

Mandatory breach reporting is the best example of regulated PII components. The rest are generally considered components of contractual PII.

Which of the following components are part of what a CCSP should review when looking at contracting with a cloud service provider?

A.
Redundant uplink grafts
A.
Redundant uplink grafts
Answers
B.
Background checks for the provider's personnel
B.
Background checks for the provider's personnel
Answers
C.
The physical layout of the datacenter
C.
The physical layout of the datacenter
Answers
D.
Use of subcontractors
D.
Use of subcontractors
Answers
Suggested answer: D

Explanation:

The use of subcontractors can add risk to the supply chain and should be considered; trusting the provider's management of their vendors and suppliers (including subcontractors) is important to trusting the provider. Conversely, the customer is not likely to be allowed to review the physical design of the datacenter (or, indeed, even know the exact location of the datacenter) or the personnel security specifics for the provider's staff. "Redundant uplink grafts" is a nonsense term used as a distractor.

Which of the following is not a way to manage risk?

A.
Transferring
A.
Transferring
Answers
B.
Accepting
B.
Accepting
Answers
C.
Mitigating
C.
Mitigating
Answers
D.
Enveloping
D.
Enveloping
Answers
Suggested answer: D

Explanation:

Enveloping is a nonsense term, unrelated to risk management. The rest are not.

Which of the following terms is not associated with cloud forensics?

A.
eDiscovery
A.
eDiscovery
Answers
B.
Chain of custody
B.
Chain of custody
Answers
C.
Analysis
C.
Analysis
Answers
D.
Plausibility
D.
Plausibility
Answers
Suggested answer: D

Explanation:

Plausibility, here, is a distractor and not specifically relevant to cloud forensics.

Which is the lowest level of the CSA STAR program?

A.
Attestation
A.
Attestation
Answers
B.
Self-assessment
B.
Self-assessment
Answers
C.
Hybridization
C.
Hybridization
Answers
D.
Continuous monitoring
D.
Continuous monitoring
Answers
Suggested answer: B

Explanation:

The lowest level is Level 1, which is self-assessment, Level 2 is an external third-party attestation, and Level 3 is a continuous-monitoring program. Hybridization does not exist as part of the CSA STAR program.

Total 512 questions
Go to page: of 52