Certified Cloud Security Professional – CCSP – Question412

To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:

A.
Multifactor authentication
B. DLP agents
C. Two-person integrity
D. Local encryption

Correct Answer: C

Explanation:

Explanation: Although all the other options are ways to harden a mobile device, two-person integrity is a concept that has nothing to do with the topic, and, if implemented, would require everyone in your organization to walk around in pairs while using their mobile devices.

Certified Cloud Security Professional – CCSP – Question411

Which of the following are distinguishing characteristics of a managed service provider?

A.
Be able to remotely monitor and manage objects for the customer and proactively maintain these objects under management.
B. Have some form of a help desk but no NOC.
C. Be able to remotely monitor and manage objects for the customer and reactively maintain these objects under management.
D. Have some form of a NOC but no help desk.

Correct Answer: A

Explanation:

Explanation: According to the MSP Alliance, typically MSPs have the following distinguishing characteristics:
-Have some form of NOC service
-Have some form of help desk service
-Can remotely monitor and manage all or a majority of the objects for the customer
-Can proactively maintain the objects under management for the customer
-Can deliver these solutions with some form of predictable billing model, where the customer knows with great accuracy what her regular IT management expense will be

Certified Cloud Security Professional – CCSP – Question410

What is an experimental technology that is intended to create the possibility of processing encrypted data without having to decrypt it first?

A.
Quantum-state
B. Polyinstantiation
C. Homomorphic
D. Gastronomic

Correct Answer: C

Explanation:

Explanation: Homomorphic encryption hopes to achieve that goal; the other options are terms that have almost nothing to do with encryption.

Certified Cloud Security Professional – CCSP – Question409

Which of the following is considered a physical control?

A.
Fences
B. Ceilings
C. Carpets
D. Doors

Correct Answer: A

Explanation:

Explanation: Fences are physical controls; carpets and ceilings are architectural features, and a door is not necessarily a control: the lock on the door would be a physical security control. Although you might think of a door as a potential answer, the best answer is the fence; the exam will have questions where more than one answer is correct, and the answer that will score you points is the one that is most correct.

Certified Cloud Security Professional – CCSP – Question407

Which of the following are cloud computing roles?

A.
Cloud service broker and user
B. Cloud customer and financial auditor
C. CSP and backup service provider
D. Cloud service auditor and object

Correct Answer: C

Explanation:

Explanation: The following groups form the key roles and functions associated with cloud computing. They do not constitute an exhaustive list but highlight the main roles and functions within cloud computing:
-Cloud customer: An individual or entity that utilizes or subscribes to cloud based services or resources.
-CSP: A company that provides cloud-based platform, infrastructure, application, or storage services to other organizations or individuals, usually for a fee; otherwise known to clients “as a service.
-Cloud backup service provider: A third-party entity that manages and holds operational responsibilities for cloud-based data backup services and solutions to customers from a central data center.
-CSB: Typically a third-party entity or company that looks to extend or enhance value to multiple customers of cloud-based services through relationships with multiple CSPs. It acts as a liaison between cloud services customers and CSPs, selecting the best provider for each customer and monitoring the services. The CSB can be utilized as a “middleman” to broker the best deal and customize services to the customer’s requirements. May also resell cloud services.
-Cloud service auditor: Third-party organization that verifies attainment of SLAs.

Certified Cloud Security Professional – CCSP – Question406

The BIA can be used to provide information about all the following, except:

A.
BC/DR planning
B. Risk analysis
C. Secure acquisition
D. Selection of security controls

Correct Answer: C

Explanation:

Explanation: The business impact analysis gathers asset valuation information that is beneficial for risk analysis and selection of security controls (it helps avoid putting the ten-dollar lock on the five-dollar bicycle), and criticality information that helps in BC/DR planning by letting the organization understand which systems, data, and personnel are necessary to continuously maintain. However, it does not aid secure acquisition efforts, since the assets examined by the BIA have already been acquired.

Certified Cloud Security Professional – CCSP – Question404

Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:

A.
Full inventory
B. Criticality
C. Value
D. Usefulness

Correct Answer: D

Explanation:

Explanation: When we gather information about business requirements, we need to do a complete inventory, receive accurate valuation of assets (usually from the owners of those assets), and assess criticality; this collection of information does not tell us, objectively, how useful an asset is, however.

Certified Cloud Security Professional – CCSP – Question403

What are SOC 1/SOC 2/SOC 3?

A.
Audit reports
B. Risk management frameworks
C. Access controls
D. Software developments

Correct Answer: A

Explanation:

Explanation: An SOC 1 is a report on controls at a service organization that may be relevant to a user entity’s internal control over financial reporting. An SOC 2 report is based on the existing SysTrust and WebTrust principles. The purpose of an SOC 2 report is to evaluate an organization’s information systems relevant to security, availability, processing integrity, confidentiality, or privacy. An SOC 3 report is also based on the existing SysTrust and WebTrust principles, like a SOC 2 report. The difference is that the SOC 3 report does not detail the testing performed.