Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions
Questions # 61:

What is the best source for information about securing a physical asset's BIOS?

Options:

A.

Security policies


B.

Manual pages


C.

Vendor documentation


D.

Regulations


Expert Solution
Questions # 62:

Which of the following represents a minimum guaranteed resource within a cloud environment for the cloud customer?

Options:

A.

Reservation


B.

Share


C.

Limit


D.

Provision


Expert Solution
Questions # 63:

Which of the following is the biggest concern or challenge with using encryption?

Options:

A.

Dependence on keys


B.

Cipher strength


C.

Efficiency


D.

Protocol standards


Expert Solution
Questions # 64:

Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?

Options:

A.

A Type 1 hypervisor also controls patching of its hosted virtual machines ensure they are always secure.


B.

A Type 1 hypervisor is tied directly to the bare metal and only runs with code necessary to perform its specific mission.


C.

A Type 1 hypervisor performs hardware-level encryption for tighter security and efficiency.


D.

A Type 1 hypervisor only hosts virtual machines with the same operating systems as the hypervisor.


Expert Solution
Questions # 65:

Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?

Options:

A.

Cloud service business manager


B.

Cloud service deployment manager


C.

Cloud service operations manager


D.

Cloud service manager


Expert Solution
Questions # 66:

What does the REST API support that SOAP does NOT support?

Options:

A.

Caching


B.

Encryption


C.

Acceleration


D.

Redundancy


Expert Solution
Questions # 67:

Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

Options:

A.

Resource pooling


B.

Virtualization


C.

Multitenancy


D.

Regulation


Expert Solution
Questions # 68:

Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?

Options:

A.

Security misconfiguration


B.

Insecure direct object references


C.

Sensitive data exposure


D.

Unvalidated redirects and forwards


Expert Solution
Questions # 69:

Which aspect of archiving must be tested regularly for the duration of retention requirements?

Options:

A.

Availability


B.

Recoverability


C.

Auditability


D.

Portability


Expert Solution
Questions # 70:

Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?

Options:

A.

Cryptographic erasure


B.

Zeroing


C.

Overwriting


D.

Deletion


Expert Solution
Questions # 71:

Which of the following are the storage types associated with PaaS?

Options:

A.

Structured and freeform


B.

Volume and object


C.

Structured and unstructured


D.

Database and file system


Expert Solution
Questions # 72:

Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?

Options:

A.

IaaS


B.

DaaS


C.

SaaS


D.

PaaS


Expert Solution
Questions # 73:

What is used for local, physical access to hardware within a data center?

Options:

A.

SSH


B.

KVM


C.

VPN


D.

RDP


Expert Solution
Questions # 74:

Which technique involves replacing values within a specific data field to protect sensitive data?

Options:

A.

Anonymization


B.

Masking


C.

Tokenization


D.

Obfuscation


Expert Solution
Questions # 75:

What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?

Options:

A.

Remove


B.

Monitor


C.

Disable


D.

Stop


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions