Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC Cloud Security CCSP Questions and answers with ValidTests

Exam CCSP All Questions
Exam CCSP Premium Access

View all detail and faqs for the CCSP exam

Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

Options:

A.

Community

B.

Hybrid

C.

Private

D.

Public

Expert Solution
Questions # 62:

Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?

Options:

A.

Interoperability

B.

Resource pooling

C.

Portability

D.

Measured service

Expert Solution
Questions # 63:

Which OSI layer does IPsec operate at?

Options:

A.

Network

B.

transport

C.

Application

D.

Presentation

Expert Solution
Questions # 64:

Which process serves to prove the identity and credentials of a user requesting access to an application or data?

Options:

A.

Repudiation

B.

Authentication

C.

Identification

D.

Authorization

Expert Solution
Questions # 65:

Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed.

Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?

Options:

A.

Disclosure

B.

Transparency

C.

Openness

D.

Documentation

Expert Solution
Questions # 66:

Tokenization requires two distinct _________________ .

Options:

A.

Personnel

B.

Authentication factors

C.

Encryption keys

D.

Databases

Expert Solution
Questions # 67:

Which component of ITIL involves the creation of an RFC ticket and obtaining official approvals for it?

Options:

A.

Problem management

B.

Release management

C.

Deployment management

D.

Change management

Expert Solution
Questions # 68:

Having a reservation in a cloud environment can ensure operations continue in the event of high utilization across the cloud.

Which of the following would NOT be a capability covered by reservations?

Options:

A.

Performing business operations

B.

Starting virtual machines

C.

Running applications

D.

Auto-scaling

Expert Solution
Questions # 69:

What are third-party providers of IAM functions for the cloud environment?

Options:

A.

AESs

B.

SIEMs

C.

DLPs

D.

CASBs

Expert Solution
Questions # 70:

The cloud customer’s trust in the cloud provider can be enhanced by all of the following except:

Options:

A.

SLAs

B.

Shared administration

C.

Audits

D.

real-time video surveillance

Expert Solution
Questions # 71:

Which protocol operates at the network layer and provides for full point-to-point encryption of all communications and transmissions?

Options:

A.

IPSec

B.

VPN

C.

SSL

D.

TLS

Expert Solution
Questions # 72:

When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.

Which of the following is NOT one of the three main approaches to data discovery?

Options:

A.

Content analysis

B.

Hashing

C.

Labels

D.

Metadata

Expert Solution
Questions # 73:

DLP solutions can aid in deterring loss due to which of the following?

Options:

A.

Inadvertent disclosure

B.

Natural disaster

C.

Randomization

D.

Device failure

Expert Solution
Questions # 74:

A variety of security systems can be integrated within a network--some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.

Which of the following types of technologies is best described here?

Options:

A.

IDS

B.

IPS

C.

Proxy

D.

Firewall

Expert Solution
Questions # 75:

Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?

Options:

A.

Data owner

B.

Data processor

C.

Database administrator

D.

Data custodian

Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions