Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?

Options:

A.

Cloud service business manager


B.

Cloud service user


C.

Cloud service administrator


D.

Cloud service integrator


Expert Solution
Questions # 77:

What is a serious complication an organization faces from the perspective of compliance with international operations?

Options:

A.

Different certifications


B.

Multiple jurisdictions


C.

Different capabilities


D.

Different operational procedures


Expert Solution
Questions # 78:

What is the primary reason that makes resolving jurisdictional conflicts complicated?

Options:

A.

Different technology standards


B.

Costs


C.

Language barriers


D.

Lack of international authority


Expert Solution
Questions # 79:

You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.

Which of the following would be the most appropriate action to take first?

Options:

A.

Take a shapshot of the virtual machines


B.

Escrow the encryption keys


C.

Copy the data


D.

Notify the customer


Expert Solution
Questions # 80:

Where is a DLP solution generally installed when utilized for monitoring data in transit?

Options:

A.

Network perimeter


B.

Database server


C.

Application server


D.

Web server


Expert Solution
Questions # 81:

Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.

Which of the following is NOT a regulatory system from the United States federal government?

Options:

A.

HIPAA


B.

SOX


C.

FISMA


D.

PCI DSS


Expert Solution
Questions # 82:

Three central concepts define what type of data and information an organization is responsible for pertaining to eDiscovery.

Which of the following are the three components that comprise required disclosure?

Options:

A.

Possession, ownership, control


B.

Ownership, use, creation


C.

Control, custody, use


D.

Possession, custody, control


Expert Solution
Questions # 83:

Different certifications and standards take different approaches to data center design and operations. Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?

Options:

A.

IDCA


B.

BICSI


C.

Uptime Institute


D.

NFPA


Expert Solution
Questions # 84:

Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?

Options:

A.

Cross-site scripting


B.

Missing function-level access control


C.

Injection


D.

Cross-site forgery


Expert Solution
Questions # 85:

Which phase of the cloud data lifecycle would be the MOST appropriate for the use of DLP technologies to protect the data?

Options:

A.

Use


B.

Store


C.

Share


D.

Create


Expert Solution
Questions # 86:

Which of the following is NOT one of the main intended goals of a DLP solution?

Options:

A.

Showing due diligence


B.

Preventing malicious insiders


C.

Regulatory compliance


D.

Managing and minimizing risk


Expert Solution
Questions # 87:

If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?

Options:

A.

Memory and networking


B.

CPU and software


C.

CPU and storage


D.

CPU and memory


Expert Solution
Questions # 88:

During which phase of the cloud data lifecycle is it possible for the classification of data to change?

Options:

A.

Use


B.

Archive


C.

Create


D.

Share


Expert Solution
Questions # 89:

Most APIs will support a variety of different data formats or structures.

However, the SOAP API will only support which one of the following data formats?

Options:

A.

XML


B.

XSLT


C.

JSON


D.

SAML


Expert Solution
Questions # 90:

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

Options:

A.

Distributed clustering


B.

Distributed balancing


C.

Distributed optimization


D.

Distributed resource scheduling


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions