CCSP (ISC)2 Certified Cloud Security Professional official Practice Test (3rd ed.)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/124

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

125 Terms

1
New cards

Tier 3

You are selecting a datacenter environment to host a cloud application run by your organization. Your primary requirement is that the datacenter must require no shutdowns for equipment maintenance. What is the lowest level of datacenter that would be acceptable under the Uptime Institute tier system?

2
New cards

The cloud customer

In an infrastructure as a service (IaaS) arrangement, who accepts responsibility for securing cloud‐based applications?

3
New cards

Software composition analysis (SCA)

Brenda’s company employs a number of application developers who create software to meet many different business needs. She is embarking on a project to validate the use of verified open source software and is concerned about the unknowing use of software libraries by those developers. Which of the following technologies will best assist with identifying these uses?

4
New cards

Network intrusion detection systems (NIDS)

________ are software or devices that monitor networks for malicious activities or policy violations and produce electronic alerts and/or reports to a management station.

5
New cards

Only employees of Carla’s company with the appropriate security training and access rights.

Carla works for an infrastructure as a service (IaaS) provider. She is analyzing the security settings for the hypervisors used in a multitenant environment. Who should have access to modify settings on those hypervisors?

6
New cards

Public cloud

In which cloud computing model does a customer share computing infrastructure with other customers of the cloud vendor where one customer may not know the other’s identity?

7
New cards

Federation

You work for a government research facility. Your organization often shares data with other government research organizations. You would like to create a single sign‐on experience across the organizations, where users at each organization can sign in with the user ID/authentication issued by that organization, then access research data in all the other organizations. Instead of replicating the data stores of each organization at every other organization (which is one way of accomplishing this goal), you instead want every user to have access to each organization’s specific storage resources.

What is the term for this kind of arrangement?

8
New cards

Data loss prevention (DLP) systems

Paul’s organization maintains protected health information that is regulated under HIPAA. He would like to add a new security control capable of detecting when employees attempt to remove this sensitive information from his organization’s systems and networks, either intentionally or unintentionally. What security control would best meet his needs?

9
New cards

Off‐site storage

Which of the following is not an essential element defining cloud computing?

10
New cards

Tabletop exercise

Justin recently participated in a disaster recovery plan test where the team sat together and discussed the response to a scenario but did not actually activate any disaster recovery controls. What type of test did he participate in?

11
New cards

ISO 27017

Tonya is employed by a cloud service provider and is responsible for evaluating the provider’s security program. What ISO standard can best help her ensure that her organization has a robust set of security controls in place?

12
New cards

The data is safe only if data from the tokenization process was secure.

Katie’s organization recently suffered a data breach and exposed a database containing student records. The records contained no identifying information other than tokenized student ID numbers. Which of the following statements most accurately represents how Katie should feel about the exposure of these records?

13
New cards

Purchase uninterruptible power supplies (UPSs) from different vendors.

Bob is designing a datacenter to support his organization, a financial services firm. Which of the following actions would best enhance Bob’s efforts to create resiliency in the datacenter?

14
New cards

EAL4

Under the Common Criteria, which one of the following EAL levels indicates that a system has been methodically designed, tested, and reviewed?

15
New cards

Honeypot

A(n) ______________ consists of a computer, data, or a network site that appears to be part of a network but is actually isolated and monitored. It also appears to contain data or resources of value that are in fact fake.

16
New cards

Transport layer security (TLS)

Rusty is evaluating the security of a web‐based SaaS application and wants to verify that the site provides strong encryption between the web server and the client. What is the most common way to achieve this goal?

17
New cards

SOC 2

You operate a cloud service and would like a report that confirms the effectiveness of your security controls and provides significant detail of control gaps that you can use for remediation. What type of audit should you conduct?

18
New cards

Customers, Regulators, Partners

Adam’s organization recently experienced a security breach that affected customer data. Which one of the following stakeholder groups might Adam be required to inform?

19
New cards

Content filtering

An application programming interface (API) gateway can typically offer all of the following capabilities except _________________.

20
New cards

GPS

When logging information about an internet user’s location, what source provides the most accurate physical location data?

21
New cards

Hardware security module

What type of device is designed to safely store and manage encryption keys?

22
New cards

The client

The Transport Layer Security (TLS) protocol creates a secure communications channel over public media (such as the internet). In a typical TLS session, who initiates the protocol?

23
New cards

IaaS

In what cloud computing service model is the customer responsible for installing and maintaining the operating system?

24
New cards

37.5 percent

Please refer to the following scenario:

Darcy is an information security risk analyst for Roscommon Cloud Solutions. She is currently trying to decide whether the company should purchase an upgraded fire suppression system for their primary datacenter. The datacenter facility has a replacement cost of $2 million.

After consulting with actuaries, datacenter managers, and fire subject matter experts, Darcy determined that a typical fire would likely require the replacement of all equipment inside the building but not cause significant structural damage. Together, they estimated that recovering from the fire would cost $750,000. They also determined that the company can expect a fire of this magnitude once every 50 years.

Based on the information in this scenario, what is the exposure factor for the effect of a fire on the Roscommon Cloud Solutions datacenter?

25
New cards

0.02

Please refer to the following scenario:

Darcy is an information security risk analyst for Roscommon Cloud Solutions. She is currently trying to decide whether the company should purchase an upgraded fire suppression system for their primary datacenter. The datacenter facility has a replacement cost of $2 million.

After consulting with actuaries, datacenter managers, and fire subject matter experts, Darcy determined that a typical fire would likely require the replacement of all equipment inside the building but not cause significant structural damage. Together, they estimated that recovering from the fire would cost $750,000. They also determined that the company can expect a fire of this magnitude once every 50 years.

Based on the information in this scenario, what is the annualized rate of occurrence for a fire at the Roscommon Cloud Solutions datacenter?

26
New cards

15,000

Please refer to the following scenario:

Darcy is an information security risk analyst for Roscommon Cloud Solutions. She is currently trying to decide whether the company should purchase an upgraded fire suppression system for their primary datacenter. The datacenter facility has a replacement cost of $2 million.

After consulting with actuaries, datacenter managers, and fire subject matter experts, Darcy determined that a typical fire would likely require the replacement of all equipment inside the building but not cause significant structural damage. Together, they estimated that recovering from the fire would cost $750,000. They also determined that the company can expect a fire of this magnitude once every 50 years.

Based on the information in this scenario, what is the annualized loss expectancy for a fire at the Roscommon Cloud Solutions datacenter?

27
New cards

Coordinating multiple providers that might have relevant records

What is the most significant barrier to eDiscovery efforts in organizations that make heavy use of many different cloud services?

28
New cards

Encryption

David’s organization is preparing to adopt an information rights management tool. What IRM capability focuses on securing data sent by the system while it is in transit over a network?

29
New cards

The idea of identifying specific points of vulnerability and then implementing countermeasures to protect or thwart those points from successful exploitation

Which of the following best describes threat modeling?

30
New cards

Fires in power supplies

Gary is concerned that the environmental controls in his organization’s datacenter may not be effectively controlling humidity. Which of the following circumstances would not commonly result from humidity issues?

31
New cards

Tokenization

Which of the following mechanisms cannot be used by a data loss prevention (DLP) solution to detect the presence of data?

32
New cards

Hashing

Gabriel’s organization maintains a system of voting records. The system uses SHA3 to obscure the contents of sensitive records. What data obfuscation technique is this system using?

33
New cards

SOC 3

Which Statement on Standards for Attestation Engagements (SSAE) 18 report is purposefully designed for public release (for instance, to be posted on a company’s website)?

34
New cards

It must be on a distinct, isolated management network (virtual local area network [VLAN]).

Which of the following is a true statement about the virtualization management toolset?

35
New cards

PaaS

You are the IT director for a small contracting firm. Your company is considering migrating to a cloud production environment. Which service model would best fit your needs if you wanted an option that reduced the chance of vendor lock‐in but also did not require the highest degree of administration by your own personnel?

36
New cards

Rapid elasticity

You are the data manager for a retail company; you anticipate a much higher volume of sales activity in the final quarter of each calendar year than the other quarters. In order to handle these increased transactions, and to accommodate the temporary sales personnel you will hire for only that time period, you consider augmenting your internal, on‐premises production environment with a cloud capability for a specific duration, and will return to operating fully on‐premises after the period of increased activity. Which facet of cloud computing is most important for making this possible?

37
New cards

The data owner

Which one of the following individuals is typically responsible for making high‐level data classification decisions for an organization?

38
New cards

Cross‐site scripting

Brad is assisting with the implementation of a cloud‐based SaaS solution where users can post content that is viewed by other users. He is concerned that users might store executable content on the site that then might be executed automatically by the browsers of other site visitors. What type of vulnerability would permit this attack?

39
New cards

Wait three weeks for additional data before making a final decision.

You are the security manager for an online marketing company. Your company has recently migrated to a cloud production environment and has deployed a number of new cloud‐based protection mechanisms offered by both third parties and the cloud provider, including data loss prevention (DLP) and security information and event management (SIEM) solutions.

After one week of operation, your security team reports an inordinate amount of time responding to potential incidents that have turned out to only be false‐positive reports. Management is concerned that the cloud migration was a bad idea and that it is too costly in terms of misspent security efforts. What do you recommend?

40
New cards

Customers

Which one of the following stakeholders is most likely to demand communication about service outages for a cloud service provider?

41
New cards

Logical design phase

Which is the part of the SDLC in which all functional features of the system chosen for development in analysis are described independently of any computer platform?

42
New cards

Health Insurance Portability and Accountability Act (HIPAA)

A group of clinics decides to create an identification federation for their users (medical providers and clinicians). In this federation, all of the participating organizations would need to be in compliance with what U.S. federal regulation?

43
New cards

Hybrid cloud

You are the data manager for a retail company; you anticipate a much higher volume of sales activity in the final quarter of each calendar year than the other quarters. In order to handle these increased transactions, and to accommodate the temporary sales personnel you will hire for only that time period, you consider augmenting your internal, on‐premises production environment with a cloud capability for a specific duration, and will return to operating fully on‐premises after the period of increased activity. Which deployment model best describes this type of arrangement?

44
New cards

uniform resource identifiers (URIs)

How does representational state transfer (REST) make web service requests?

45
New cards

Information Technology Infrastructure Library (ITIL)

Which of the following best describes a set of practices that focus on aligning IT services with business needs?

46
New cards

Block storage

What type of cloud storage is typically used to provide disk volumes for use with virtual server instances that will store important long‐term data?

47
New cards

statement of work (SOW)

Lisa is working to develop a long‐term relationship with a consulting firm that will assist in her organization’s cloud migration. She has a contract in place that governs the terms of many different projects and would like to create a document that will describe one specific new project. What type of document should she create?

48
New cards

Multitenancy

Full isolation of user activity, processes, and virtual network segments in a cloud environment is incredibly important because of risks due to _________________.

49
New cards

The relying party is the service provider and they would consume the tokens generated by the identity provider.

In a federated environment, who is the relying party, and what do they do?

50
New cards

Volume encryption

Christine is concerned about the risk that another customer will be able to access sensitive data elements stored in her organization’s database in a multitenant public cloud environment. What control would best mitigate this risk?

51
New cards

Inert gas

Which one of the following fire suppression systems is least likely to damage sensitive electronic equipment in a datacenter?

52
New cards

Portability

You are the security manager for a data analysis company. Your senior management is considering a cloud migration in order to use the greater capabilities of a cloud provider to perform calculations and computations. Your company wants to ensure that neither the contractual nor the technical setup of the cloud service will affect your data sets in any way so that you are not locked into a single provider.

Which of the following criteria will probably be most crucial for your choice of cloud providers?

53
New cards

FIPS 140‐2

Which one of the following standards is most likely to contain detailed technical requirements for a hardware security module (HSM) used in a cloud environment?

54
New cards

Enhanced user experience

Which of the following is not a reason for conducting audits?

55
New cards
56
New cards
57
New cards
58
New cards
59
New cards
60
New cards
61
New cards
62
New cards
63
New cards
64
New cards
65
New cards
66
New cards
67
New cards
68
New cards
69
New cards
70
New cards
71
New cards
72
New cards
73
New cards
74
New cards
75
New cards
76
New cards
77
New cards
78
New cards
79
New cards
80
New cards
81
New cards
82
New cards
83
New cards
84
New cards
85
New cards
86
New cards
87
New cards
88
New cards
89
New cards
90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards
96
New cards
97
New cards
98
New cards
99
New cards
100
New cards