Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 10 out of 11 pages
Viewing questions 136-150 out of questions
Questions # 136:

With the rapid emergence of cloud computing, very few regulations were in place that pertained to it specifically, and organizations often had to resort to using a collection of regulations that were not specific to cloud in order to drive audits and policies.

Which standard from the ISO/IEC was designed specifically for cloud computing?

Options:

A.

ISO/IEC 27001


B.

ISO/IEC 19889


C.

ISO/IEC 27001:2015


D.

ISO/IEC 27018


Expert Solution
Questions # 137:

Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?

Options:

A.

Problem management


B.

Continuity management


C.

Availability management


D.

Configuration management


Expert Solution
Questions # 138:

Which of the following is the best example of a key component of regulated PII?

Options:

A.

Audit rights of subcontractors


B.

Items that should be implemented


C.

PCI DSS


D.

Mandatory breach reporting


Expert Solution
Questions # 139:

Which of the following best describes data masking?

Options:

A.

A method for creating similar but inauthentic datasets used for software testing and user training.


B.

A method used to protect prying eyes from data such as social security numbers and credit card data.


C.

A method where the last few numbers in a dataset are not obscured. These are often used for authentication.


D.

Data masking involves stripping out all digits in a string of numbers so as to obscure the original number.


Expert Solution
Questions # 140:

Which of the following is NOT one of the components of multifactor authentication?

Options:

A.

Something the user knows


B.

Something the user has


C.

Something the user sends


D.

Something the user is


Expert Solution
Questions # 141:

An audit scope statement defines the limits and outcomes from an audit.

Which of the following would NOT be included as part of an audit scope statement?

Options:

A.

Reports


B.

Certification


C.

Billing


D.

Exclusions


Expert Solution
Questions # 142:

Just like the risk management process, the BCDR planning process has a defined sequence of steps and processes to follow to ensure the production of a comprehensive and successful plan.

Which of the following is the correct sequence of steps for a BCDR plan?

Options:

A.

Define scope, gather requirements, assess risk, implement


B.

Define scope, gather requirements, implement, assess risk


C.

Gather requirements, define scope, implement, assess risk


D.

Gather requirements, define scope, assess risk, implement


Expert Solution
Questions # 143:

Which of the following jurisdictions lacks a comprehensive national policy on data privacy and the protection of personally identifiable information (PII)?

Options:

A.

European Union


B.

Asian-Pacific Economic Cooperation


C.

United States


D.

Russia


Expert Solution
Questions # 144:

For optimal security, trust zones are used for network segmentation and isolation. They allow for the separation of various systems and tiers, each with its own security level.

Which of the following is typically used to allow administrative personnel access to trust zones?

Options:

A.

IPSec


B.

SSH


C.

VPN


D.

TLS


Expert Solution
Questions # 145:

When an organization is considering the use of cloud services for BCDR planning and solutions, which of the following cloud concepts would be the most important?

Options:

A.

Reversibility


B.

Elasticity


C.

Interoperability


D.

Portability


Expert Solution
Questions # 146:

What are the U.S. State Department controls on technology exports known as?

Options:

A.

DRM


B.

ITAR


C.

EAR


D.

EAL


Expert Solution
Questions # 147:

IRM solutions allow an organization to place different restrictions on data usage than would otherwise be possible through traditional security controls.

Which of the following controls would be possible with IRM that would not with traditional security controls?

Options:

A.

Copy


B.

Read


C.

Delete


D.

Print


Expert Solution
Questions # 148:

What's a potential problem when object storage versus volume storage is used within IaaS for application use and dependency?

Options:

A.

Object storage is only optimized for small files.


B.

Object storage is its own system, and data consistency depends on replication.


C.

Object storage may have availability issues.


D.

Object storage is dependent on access control from the host server.


Expert Solution
Questions # 149:

Which cloud service category most commonly uses client-side key management systems?

Options:

A.

Software as a Service


B.

Infrastructure as a Service


C.

Platform as a Service


D.

Desktop as a Service


Expert Solution
Questions # 150:

The BC/DR kit should include all of the following except:

Options:

A.

Annotated asset inventory


B.

Flashlight


C.

Hard drives


D.

Documentation equipment


Expert Solution
Viewing page 10 out of 11 pages
Viewing questions 136-150 out of questions