Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following does NOT relate to the hiding of sensitive data from data sets?

Options:

A.

Obfuscation


B.

Federation


C.

Masking


D.

Anonymization


Expert Solution
Questions # 47:

Which of the following cloud aspects complicates eDiscovery?

Options:

A.

Resource pooling


B.

On-demand self-service


C.

Multitenancy


D.

Measured service


Expert Solution
Questions # 48:

Which of the following threat types can occur when baselines are not appropriately applied or unauthorized changes are made?

Options:

A.

Insecure direct object references


B.

Unvalidated redirects and forwards


C.

Security misconfiguration


D.

Sensitive data exposure


Expert Solution
Questions # 49:

What does SDN stand for within a cloud environment?

Options:

A.

Software-dynamic networking


B.

Software-defined networking


C.

Software-dependent networking


D.

System-dynamic nodes


Expert Solution
Questions # 50:

Which of the following is NOT a regulatory system from the United States federal government?

Options:

A.

PCI DSS


B.

FISMA


C.

SOX


D.

HIPAA


Expert Solution
Questions # 51:

What is the only data format permitted with the SOAP API?

Options:

A.

HTML


B.

SAML


C.

XSML


D.

XML


Expert Solution
Questions # 52:

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Options:

A.

Cloud auditor


B.

Inter-cloud provider


C.

Cloud service broker


D.

Cloud service developer


Expert Solution
Questions # 53:

What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?

Options:

A.

Scripts


B.

RDP


C.

APIs


D.

XML


Expert Solution
Questions # 54:

Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?

Options:

A.

GLBA


B.

HIPAA


C.

Safe Harbor


D.

SOX


Expert Solution
Questions # 55:

Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?

Options:

A.

SP 800-153


B.

SP 800-145


C.

SP 800-53


D.

SP 800-40


Expert Solution
Questions # 56:

Which data formats are most commonly used with the REST API?

Options:

A.

JSON and SAML


B.

XML and SAML


C.

XML and JSON


D.

SAML and HTML


Expert Solution
Questions # 57:

Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?

Options:

A.

Share


B.

Reservation


C.

Provision


D.

Limit


Expert Solution
Questions # 58:

How is an object stored within an object storage system?

Options:

A.

Key value


B.

Database


C.

LDAP


D.

Tree structure


Expert Solution
Questions # 59:

Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?

Options:

A.

Missing function level access control


B.

Cross-site scripting


C.

Cross-site request forgery


D.

Injection


Expert Solution
Questions # 60:

What controls the formatting and security settings of a volume storage system within a cloud environment?

Options:

A.

Management plane


B.

SAN host controller


C.

Hypervisor


D.

Operating system of the host


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions