Certified Cloud Security Professional – CCSP – Question392

The different cloud service models have varying levels of responsibilities for functions and operations depending with the model's level of service.
In which of the following models would the responsibility for patching lie predominantly with the cloud customer?

A.
DaaS
B. SaaS
C. PaaS
D. IaaS

Correct Answer: D

Explanation:

Explanation: With Infrastructure as a Service (IaaS), the cloud customer is responsible for deploying and maintaining its own systems and virtual machines. Therefore, the customer is solely responsible for patching and any other security updates it finds necessary. With Software as a Service (SaaS), Platform as a Service (PaaS), and Desktop as a Service (DaaS), the cloud provider maintains the infrastructure components and is responsible for maintaining and patching them.

Certified Cloud Security Professional – CCSP – Question391

What type of solution is at the core of virtually all directory services?

A.
WS
B. LDAP
C. ADFS
D. PKI

Correct Answer: B

Explanation:

Explanation: The Lightweight Directory Access Protocol (LDAP) forms the basis of virtually all directory services, regardless of the specific vendor or software package.WS is a protocol for information exchange between two systems and does not actually store the data. ADFS is a Windows component for enabling single sign-on for the operating system and applications, but it relies on data from an LDAP server. PKI is used for managing and issuing security certificates.

Certified Cloud Security Professional – CCSP – Question390

Just like the risk management process, the BCDR planning process has a defined sequence of steps and processes to follow to ensure the production of a comprehensive and successful plan.
Which of the following is the correct sequence of steps for a BCDR plan?

A.
Define scope, gather requirements, assess risk, implement
B. Define scope, gather requirements, implement, assess risk
C. Gather requirements, define scope, implement, assess risk
D. Gather requirements, define scope, assess risk, implement

Correct Answer: A

Explanation:

Explanation: The correct sequence for a BCDR plan is to define the scope, gather requirements based on the scope, assess overall risk, and implement the plan. The other sequences provided are not in the correct order.

Certified Cloud Security Professional – CCSP – Question389

When an organization is considering a cloud environment for hosting BCDR solutions, which of the following would be the greatest concern?

A.
Self-service
B. Resource pooling
C. Availability
D. Location

Correct Answer: D

Explanation:

Explanation: If an organization wants to use a cloud service for BCDR, the location of the cloud hosting becomes a very important security consideration due to regulations and jurisdiction, which could be dramatically different from the organization’s normal hosting locations. Availability is a hallmark of any cloud service provider, and likely will not be a prime consideration when an organization is considering using a cloud for BCDR; the same goes for self-service options. Resource pooling is common among all cloud systems and would not be a concern when an organization is dealing with the provisioning of resources during a disaster.

Certified Cloud Security Professional – CCSP – Question388

Which aspect of data poses the biggest challenge to using automated tools for data discovery and programmatic data classification?

A.
Quantity
B. Language
C. Quality
D. Number of courses

Correct Answer: C

Explanation:

Explanation: The biggest challenge for properly using any programmatic tools in data discovery is the actual quality of the data, including the data being uniform and well structured, labels being properly applied, and other similar facets. Without data being organized in such a manner, it is extremely difficult for programmatic tools to automatically synthesize and make determinations from it. The overall quantity of data, as well as the number of sources, does not pose an enormous challenge for data discovery programs, other than requiring a longer time to process the data. The language of the data itself should not matter to a program that is designed to process it, as long as the data is well formed and consistent.

Certified Cloud Security Professional – CCSP – Question387

What type of masking would you employ to produce a separate data set for testing purposes based on production data without any sensitive information?

A.
Dynamic
B. Tokenized
C. Replicated
D. Static

Correct Answer: D

Explanation:

Explanation: Static masking involves taking a data set and replacing sensitive fields and values with non-sensitive or garbage data. This is done to enable testing of an application against data that resembles production data, both in size and format, but without containing anything sensitive. Dynamic masking involves the live and transactional masking of data while an application is using it. Tokenized would refer to tokenization, which is the replacing of sensitive data with a key value that can later be matched back to the original value, and although it could be used as part of the production of test data, it does not refer to the overall process. Replicated is provided as an erroneous answer, as replicated data would be identical in value and would not accomplish the production of a test set.

Certified Cloud Security Professional – CCSP – Question386

Which of the following areas of responsibility always falls completely under the purview of the cloud provider, regardless of which cloud service category is used?

A.
Infrastructure
B. Data
C. Physical
D. Governance

Correct Answer: C

Explanation:

Explanation: Regardless of the cloud service category used, the physical environment is always the sole responsibility of the cloud provider. In many instances, the cloud provider will supply audit reports or some general information about their physical security practices, especially to those customers or potential customers that may have regulatory requirements, but otherwise the cloud customer will have very little insight into the physical environment. With IaaS, the infrastructure is a shared responsibility between the cloud provider and cloud customer. With all cloud service categories, the data and governance are always the sole responsibility of the cloud customer.

Certified Cloud Security Professional – CCSP – Question385

A main objective for an organization when utilizing cloud services is to avoid vendor lock-in so as to ensure flexibility and maintain independence.
Which core concept of cloud computing is most related to vendor lock-in?

A.
Scalability
B. Interoperability
C. Portability
D. Reversibility

Correct Answer: C

Explanation:

Explanation: Portability is the ability for a cloud customer to easily move their systems, services, and applications among different cloud providers. By avoiding reliance on proprietary APIs and other vendor-specific cloud features, an organization can maintain flexibility to move among the various cloud providers with greater ease. Reversibility refers to the ability for a cloud customer to quickly and easy remove all their services and data from a cloud provider. Interoperability is the ability to reuse services and components for other applications and uses. Scalability refers to the ability of a cloud environment to add or remove resources to meet current demands.

Certified Cloud Security Professional – CCSP – Question384

What does static application security testing (SAST) offer as a tool to the testers that makes it unique compared to other common security testing methodologies?

A.
Live testing
B. Source code access
C. Production system scanning
D. Injection attempts

Correct Answer: B

Explanation:

Explanation: Static application security testing (SAST) is conducted against offline systems with previous knowledge of them, including their source code. Live testing is not part of static testing but rather is associated with dynamic testing. Production system scanning is not appropriate because static testing is done against offline systems. Injection attempts are done with many different types of testing and are not unique to one particular type. It is therefore not the best answer to the question.

Certified Cloud Security Professional – CCSP – Question383

You need to gain approval to begin moving your company's data and systems into a cloud environment. However, your CEO has mandated the ability to easily remove your IT assets from the cloud provider as a precondition.
Which of the following cloud concepts would this pertain to?

A.
Removability
B. Extraction
C. Portability
D. Reversibility

Correct Answer: D

Explanation:

Explanation: Reversibility is the cloud concept involving the ability for a cloud customer to remove all of its data and IT assets from a cloud provider. Also, processes and agreements would be in place with the cloud provider that ensure all removals have been completed fully within the agreed upon timeframe. Portability refers to the ability to easily move between different cloud providers and not be locked into a specific one. Removability and extraction are both provided as terms similar to reversibility, but neither is the official term or concept.