Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

All of the following are techniques to enhance the portability of cloud data, in order to minimize the potential of vendor lock-in except:

Options:

A.

Ensure there are no physical limitations to moving


B.

Use DRM and DLP solutions widely throughout the cloud operation


C.

Ensure favorable contract terms to support portability


D.

Avoid proprietary data formats


Expert Solution
Questions # 122:

What concept does the D represent within the STRIDE threat model?

Options:

A.

Denial of service


B.

Distributed


C.

Data breach


D.

Data loss


Expert Solution
Questions # 123:

Legal controls refer to which of the following?

Options:

A.

ISO 27001


B.

PCI DSS


C.

NIST 800-53r4


D.

Controls designed to comply with laws and regulations related to the cloud environment


Expert Solution
Questions # 124:

Which of the following is NOT one of the official risk rating categories?

Options:

A.

Critical


B.

Low


C.

Catastrophic


D.

Minimal


Expert Solution
Questions # 125:

What is the correct order of the phases of the data life cycle?

Options:

A.

Create, Use, Store, Share, Archive, Destroy


B.

Create, Archive, Store, Share, Use, Destroy


C.

Create, Store, Use, Archive, Share, Destroy


D.

Create, Store, Use, Share, Archive, Destroy


Expert Solution
Questions # 126:

Identity and access management (IAM) is a security discipline that ensures which of the following?

Options:

A.

That all users are properly authorized


B.

That the right individual gets access to the right resources at the right time for the right reasons.


C.

That all users are properly authenticated


D.

That unauthorized users will get access to the right resources at the right time for the right reasons


Expert Solution
Questions # 127:

Which of the following best describes the Organizational Normative Framework (ONF)?

Options:

A.

A set of application security, and best practices, catalogued and leveraged by the organization


B.

A container for components of an application’s security, best practices catalogued and leveraged by the organization


C.

A framework of containers for some of the components of application security, best practices, catalogued and leveraged by the organization


D.

A framework of containers for all components of application security, best practices, catalogued and leveraged by the organization.


Expert Solution
Questions # 128:

Which of the following types of data would fall under data rights management (DRM) rather than information rights management (IRM)?

Options:

A.

Personnel data


B.

Security profiles


C.

Publications


D.

Financial records


Expert Solution
Questions # 129:

Because cloud providers will not give detailed information out about their infrastructures and practices to the general public, they will often use established auditing reports to ensure public trust, where the reputation of the auditors serves for assurance.

Which type of audit reports can be used for general public trust assurances?

Options:

A.

SOC 2


B.

SAS-70


C.

SOC 3


D.

SOC 1


Expert Solution
Questions # 130:

Which of the following components are part of what a CCSP should review when looking at contracting with a cloud service provider?

Options:

A.

Redundant uplink grafts


B.

Background checks for the provider’s personnel


C.

The physical layout of the datacenter


D.

Use of subcontractors


Expert Solution
Questions # 131:

Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed.

Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?

Options:

A.

Disclosure


B.

Transparency


C.

Openness


D.

Documentation


Expert Solution
Questions # 132:

What type of masking would you employ to produce a separate data set for testing purposes based on production data without any sensitive information?

Options:

A.

Dynamic


B.

Tokenized


C.

Replicated


D.

Static


Expert Solution
Questions # 133:

The GAPP framework was developed through a joint effort between the major Canadian and American professional accounting associations in order to assist their members with managing and preventing risks to the privacy of their data and customers.

Which of the following is the meaning of GAPP?

Options:

A.

General accounting personal privacy


B.

Generally accepted privacy practices


C.

Generally accepted privacy principles


D.

General accounting privacy policies


Expert Solution
Questions # 134:

All of these are methods of data discovery, except:

Options:

A.

Label-based


B.

User-based


C.

Content-based


D.

Metadata-based


Expert Solution
Questions # 135:

Which of the following areas of responsibility always falls completely under the purview of the cloud provider, regardless of which cloud service category is used?

Options:

A.

Infrastructure


B.

Data


C.

Physical


D.

Governance


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions