Certified Cloud Security Professional – CCSP – Question422

In the cloud motif, the data owner is usually:

A.
The cloud provider
B. In another jurisdiction
C. The cloud customer
D. The cloud access security broker

Correct Answer: C

Explanation:

Explanation: The data owner is usually considered the cloud customer in a cloud configuration; the data in question is the customer’s information, being processed in the cloud. The cloud provider is only leasing services and hardware to the customer. The cloud access security broker (CASB) only handles access control on behalf of the cloud customer, and is not in direct contact with the production data.

Certified Cloud Security Professional – CCSP – Question421

Data labels could include all the following, except:

A.
Multifactor authentication
B. Access restrictions
C. Confidentiality level
D. Distribution limitations

Correct Answer: A

Explanation:

Explanation: All the others might be included in data labels, but multifactor authentication is a procedure used for access control, not a label.

Certified Cloud Security Professional – CCSP – Question420

What is the experimental technology that might lead to the possibility of processing encrypted data without having to decrypt it first?

A.
AES
B. Link encryption
C. One-time pads
D. Homomorphic encryption

Correct Answer: D

Explanation:

Explanation: AES is an encryption standard. Link encryption is a method for protecting communications traffic. One-time pads are an encryption method.

Certified Cloud Security Professional – CCSP – Question419

Proper implementation of DLP solutions for successful function requires which of the following?

A.
Physical access limitations
B. USB connectivity
C. Accurate data categorization
D. Physical presence

Correct Answer: C

Explanation:

Explanation: DLP tools need to be aware of which information to monitor and which requires categorization (usually done upon data creation, by the data owners). DLPs can be implemented with or without physical access or presence. USB connectivity has nothing to do with DLP solutions.

Certified Cloud Security Professional – CCSP – Question418

All policies within the organization should include a section that includes all of the following, except:

A.
Policy adjudication
B. Policy maintenance
C. Policy review
D. Policy enforcement

Correct Answer: A

Explanation:

Explanation: All the elements except adjudication need to be addressed in each policy. Adjudication is not an element of policy.

Certified Cloud Security Professional – CCSP – Question417

DLP solutions can aid in deterring loss due to which of the following?

A.
Inadvertent disclosure
B. Natural disaster
C. Randomization
D. Device failure

Correct Answer: A

Explanation:

Explanation: DLP solutions may protect against inadvertent disclosure. Randomization is a technique for obscuring data, not a risk to data. DLP tools will not protect against risks from natural disasters, or against impacts due to device failure.

Certified Cloud Security Professional – CCSP – Question416

Every security program and process should have which of the following?

A.
Severe penalties
B. Multifactor authentication
C. Foundational policy
D. Homomorphic encryption

Correct Answer: C

Explanation:

Explanation: Policy drives all programs and functions in the organization; the organization should not conduct any operations that don’t have a policy governing them. Penalties may or may not be an element of policy, and severity depends on the topic. Multifactor authentication and homomorphic encryption are red herrings here.

Certified Cloud Security Professional – CCSP – Question414

DLP can be combined with what other security technology to enhance data controls?

A.
DRM
B. Hypervisor
C. SIEM
D. Kerberos

Correct Answer: A

Explanation:

Explanation: DLP can be combined with DRM to protect intellectual property; both are designed to deal with data that falls into special categories. SIEMs are used for monitoring event logs, not live data movement. Kerberos is an authentication mechanism. Hypervisors are used for virtualization.

Certified Cloud Security Professional – CCSP – Question413

Tokenization requires two distinct _________________ .

A.
Authentication factors
B. Personnel
C. Databases
D. Encryption

Correct Answer: C

Explanation:

Explanation: In order to implement tokenization, there will need to be two databases: the database containing the raw, original data, and the token database containing tokens that map to original data. Having two-factor authentication is nice, but certainly not required. Encryption keys are not necessary for tokenization. Two-person integrity does not have anything to do with tokenization.