Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions
Questions # 91:

A DLP solution/implementation has three main components.

Which of the following is NOT one of the three main components?

Options:

A.

Monitoring


B.

Enforcement


C.

Auditing


D.

Discovery and classification


Expert Solution
Questions # 92:

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

Options:

A.

APIs


B.

Scripts


C.

TLS


D.

XML


Expert Solution
Questions # 93:

Which cloud deployment model is MOST likely to offer free or very cheap services to users?

Options:

A.

Hybrid


B.

Community


C.

Public


D.

Private


Expert Solution
Questions # 94:

Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.

What type of attack is this?

Options:

A.

Injection


B.

Missing function-level access control


C.

Cross-site scripting


D.

Cross-site request forgery


Expert Solution
Questions # 95:

Data centers have enormous power resources that are distributed and consumed throughout the entire facility.

Which of the following standards pertains to the proper fire safety standards within that scope?

Options:

A.

IDCA


B.

BICSI


C.

NFPA


D.

Uptime Institute


Expert Solution
Questions # 96:

With an API, various features and optimizations are highly desirable to scalability, reliability, and security.

What does the REST API support that the SOAP API does NOT support?

Options:

A.

Acceleration


B.

Caching


C.

Redundancy


D.

Encryption


Expert Solution
Questions # 97:

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

Options:

A.

Hypervisor


B.

Management plane


C.

Object storage


D.

Encryption


Expert Solution
Questions # 98:

With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?

Options:

A.

Structured and hierarchical


B.

Volume and object


C.

Volume and database


D.

Structured and unstructured


Expert Solution
Questions # 99:

Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?

Options:

A.

SAML and HTML


B.

XML and SAML


C.

XML and JSON


D.

JSON and SAML


Expert Solution
Questions # 100:

The European Union is often considered the world leader in regard to the privacy of personal data and has declared privacy to be a "human right."

In what year did the EU first assert this principle?

Options:

A.

1995


B.

2000


C.

2010


D.

1999


Expert Solution
Questions # 101:

When dealing with PII, which category pertains to those requirements that can carry legal sanctions or penalties for failure to adequately safeguard the data and address compliance requirements?

Options:

A.

Contractual


B.

Jurisdictional


C.

Regulated


D.

Legal


Expert Solution
Questions # 102:

Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?

Options:

A.

Cross-site request forgery


B.

Missing function-level access control


C.

Injection


D.

Cross-site scripting


Expert Solution
Questions # 103:

Which data state would be most likely to use TLS as a protection mechanism?

Options:

A.

Data in use


B.

Data at rest


C.

Archived


D.

Data in transit


Expert Solution
Questions # 104:

With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?

Options:

A.

Filtering and forwarding


B.

Filtering and firewalling


C.

Firewalling and forwarding


D.

Forwarding and protocol


Expert Solution
Questions # 105:

If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?

Options:

A.

Limit


B.

Reservation


C.

Assurance


D.

Guarantee


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions