Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC Cloud Security CCSP Questions and answers with ValidTests

Exam CCSP All Questions
Exam CCSP Premium Access

View all detail and faqs for the CCSP exam

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following are distinguishing characteristics of a managed service provider?

Options:

A.

Be able to remotely monitor and manage objects for the customer and proactively maintain these objects under management.

B.

Have some form of a help desk but no NOC.

C.

Be able to remotely monitor and manage objects for the customer and reactively maintain these objects under management.

D.

Have some form of a NOC but no help desk.

Expert Solution
Questions # 77:

What are the U.S. State Department controls on technology exports known as?

Options:

A.

DRM

B.

ITAR

C.

EAR

D.

EAL

Expert Solution
Questions # 78:

All of these are methods of data discovery, except:

Options:

A.

Label-based

B.

User-based

C.

Content-based

D.

Metadata-based

Expert Solution
Questions # 79:

Which of the following best describes the Organizational Normative Framework (ONF)?

Options:

A.

A set of application security, and best practices, catalogued and leveraged by the organization

B.

A container for components of an application’s security, best practices catalogued and leveraged by the organization

C.

A framework of containers for some of the components of application security, best practices, catalogued and leveraged by the organization

D.

A framework of containers for all components of application security, best practices, catalogued and leveraged by the organization.

Expert Solution
Questions # 80:

The various models generally available for cloud BC/DR activities include all of the following except:

Options:

A.

Private architecture, cloud backup

B.

Cloud provider, backup from another cloud provider

C.

Cloud provider, backup from same provider

D.

Cloud provider, backup from private provider

Expert Solution
Questions # 81:

Every security program and process should have which of the following?

Options:

A.

Severe penalties

B.

Multifactor authentication

C.

Foundational policy

D.

Homomorphic encryption

Expert Solution
Questions # 82:

Which of the following would be considered an example of insufficient due diligence leading to security or operational problems when moving to a cloud?

Options:

A.

Monitoring

B.

Use of a remote key management system

C.

Programming languages used

D.

Reliance on physical network controls

Expert Solution
Questions # 83:

Many activities within a cloud environment are performed via programmatic means, where complex and distributed operations are handled without the need to perform each step individually.

Which of the following concepts does this describe?

Options:

A.

Orchestration

B.

Provisioning

C.

Automation

D.

Allocation

Expert Solution
Questions # 84:

SOC Type 1 reports are considered "restricted use," in that they are intended only for limited audiences and purposes.

Which of the following is NOT a population that would be appropriate for a SOC Type 1 report?

Options:

A.

Current clients

B.

Auditors

C.

Potential clients

D.

The service organization

Expert Solution
Questions # 85:

Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?

Options:

A.

Cryptographic erasure

B.

Zeroing

C.

Overwriting

D.

Deletion

Expert Solution
Questions # 86:

What is a serious complication an organization faces from the perspective of compliance with international operations?

Options:

A.

Different certifications

B.

Multiple jurisdictions

C.

Different capabilities

D.

Different operational procedures

Expert Solution
Questions # 87:

Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?

Options:

A.

Provision

B.

Limit

C.

Reservation

D.

Share

Expert Solution
Questions # 88:

What is the biggest concern with hosting a key management system outside of the cloud environment?

Options:

A.

Confidentiality

B.

Portability

C.

Availability

D.

Integrity

Expert Solution
Questions # 89:

What type of masking strategy involves making a separate and distinct copy of data with masking in place?

Options:

A.

Dynamic

B.

Replication

C.

Static

D.

Duplication

Expert Solution
Questions # 90:

Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?

Options:

A.

Modifying metadata

B.

Importing data

C.

Modifying data

D.

Constructing new data

Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions