Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which type of controls are the SOC Type 1 reports specifically focused on?

Options:

A.

Integrity


B.

PII


C.

Financial


D.

Privacy


Expert Solution
Questions # 17:

What does dynamic application security testing (DAST) NOT entail?

Options:

A.

Scanning


B.

Probing


C.

Discovery


D.

Knowledge of the system


Expert Solution
Questions # 18:

Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?

Options:

A.

regulatory requirements


B.

Auditability


C.

Service-level agreements


D.

Governance


Expert Solution
Questions # 19:

The SOC Type 2 reports are divided into five principles.

Which of the five principles must also be included when auditing any of the other four principles?

Options:

A.

Confidentiality


B.

Privacy


C.

Security


D.

Availability


Expert Solution
Questions # 20:

What concept does the "D" represent with the STRIDE threat model?

Options:

A.

Data loss


B.

Denial of service


C.

Data breach


D.

Distributed


Expert Solution
Questions # 21:

What does the REST API use to protect data transmissions?

Options:

A.

NetBIOS


B.

VPN


C.

Encapsulation


D.

TLS


Expert Solution
Questions # 22:

Which crucial aspect of cloud computing can be most threatened by insecure APIs?

Options:

A.

Automation


B.

Redundancy


C.

Resource pooling


D.

Elasticity


Expert Solution
Questions # 23:

Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?

Options:

A.

Russia


B.

France


C.

Germany


D.

United States


Expert Solution
Questions # 24:

Which OSI layer does IPsec operate at?

Options:

A.

Network


B.

transport


C.

Application


D.

Presentation


Expert Solution
Questions # 25:

What is the concept of segregating information or processes, within the same system or application, for security reasons?

Options:

A.

fencing


B.

Sandboxing


C.

Cellblocking


D.

Pooling


Expert Solution
Questions # 26:

How many additional DNS queries are needed when DNSSEC integrity checks are added?

Options:

A.

Three


B.

Zero


C.

One


D.

Two


Expert Solution
Questions # 27:

Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?

Options:

A.

Community


B.

Public


C.

Hybrid


D.

Private


Expert Solution
Questions # 28:

Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed?

Options:

A.

IPS


B.

WAF


C.

Firewall


D.

IDS


Expert Solution
Questions # 29:

Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?

Options:

A.

Platform


B.

Infrastructure


C.

Governance


D.

Application


Expert Solution
Questions # 30:

Which audit type has been largely replaced by newer approaches since 2011?

Options:

A.

SOC Type 1


B.

SSAE-16


C.

SAS-70


D.

SOC Type 2


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions