Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions
Questions # 106:

Which of the following systems is used to employ a variety of different techniques to discover and alert on threats and potential threats to systems and networks?

Options:

A.

IDS


B.

IPS


C.

Firewall


D.

WAF


Expert Solution
Questions # 107:

Many aspects and features of cloud computing can make eDiscovery compliance more difficult or costly.

Which aspect of cloud computing would be the MOST complicating factor?

Options:

A.

Measured service


B.

Broad network access


C.

Multitenancy


D.

Portability


Expert Solution
Questions # 108:

Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?

Options:

A.

Security misconfiguration


B.

Insecure direct object references


C.

Unvalidated redirects and forwards


D.

Sensitive data exposure


Expert Solution
Questions # 109:

With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.

What is the term associated with this determination?

Options:

A.

Weighting


B.

Prioritization


C.

Shares


D.

Scoring


Expert Solution
Questions # 110:

Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.

Which of the following is the optimal humidity level, as established by ASHRAE?

Options:

A.

20 to 40 percent relative humidity


B.

50 to 75 percent relative humidity


C.

40 to 60 percent relative humidity


D.

30 to 50 percent relative humidity


Expert Solution
Questions # 111:

Where is a DLP solution generally installed when utilized for monitoring data at rest?

Options:

A.

Network firewall


B.

Host system


C.

Application server


D.

Database server


Expert Solution
Questions # 112:

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?

Options:

A.

Memory


B.

Number of users


C.

Storage


D.

CPU


Expert Solution
Questions # 113:

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?

Options:

A.

Inter-cloud provider


B.

Cloud service business manager


C.

Cloud service administrator


D.

Cloud service integrator


Expert Solution
Questions # 114:

Which of the following is not a risk management framework?

Options:

A.

COBIT


B.

Hex GBL


C.

ISO 31000:2009


D.

NIST SP 800-37


Expert Solution
Questions # 115:

What does a cloud customer purchase or obtain from a cloud provider?

Options:

A.

Services


B.

Hosting


C.

Servers


D.

Customers


Expert Solution
Questions # 116:

Data center and operations design traditionally takes a tiered, topological approach.

Which of the following standards is focused on that approach and is prevalently used throughout the industry?

Options:

A.

IDCA


B.

NFPA


C.

BICSI


D.

Uptime Institute


Expert Solution
Questions # 117:

Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?

Options:

A.

Injection


B.

Cross-site request forgery


C.

Missing function-level access control


D.

Cross-site scripting


Expert Solution
Questions # 118:

In which cloud service model is the customer required to maintain the OS?

Options:

A.

Iaas


B.

CaaS


C.

PaaS


D.

SaaS


Expert Solution
Questions # 119:

Cryptographic keys for encrypted data stored in the cloud should be ________________ .

Options:

A.

Not stored with the cloud provider.


B.

Generated with redundancy


C.

At least 128 bits long


D.

Split into groups


Expert Solution
Questions # 120:

Which is the lowest level of the CSA STAR program?

Options:

A.

Attestation


B.

Self-assessment


C.

Hybridization


D.

Continuous monitoring


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions