Certified Cloud Security Professional – CCSP – Question382

Different security testing methodologies offer different strategies and approaches to testing systems, requiring security personnel to determine the best type to use for their specific circumstances.
What does dynamic application security testing (DAST) NOT entail that SAST does?

A.
Discovery
B. Knowledge of the system
C. Scanning
D. Probing

Correct Answer: B

Explanation:

Explanation: Dynamic application security testing (DAST) is considered “black-box” testing and begins with no inside knowledge of the application or its configurations. Everything about it must be discovered during its testing. As with most types of testing, dynamic application security testing (DAST) involves probing, scanning, and a discovery process for system information.

Certified Cloud Security Professional – CCSP – Question381

Which of the following types of data would fall under data rights management (DRM) rather than information rights management (IRM)?

A.
Personnel data
B. Security profiles
C. Publications
D. Financial records

Correct Answer: C

Explanation:

Explanation: Whereas IRM is used to protect a broad range of data, DRM is focused specifically on the protection of consumer media, such as publications, music, movies, and so on. IRM is used to protect general institution data, so financial records, personnel data, and security profiles would all fall under the auspices of IRM.

Certified Cloud Security Professional – CCSP – Question380

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

A.
TLS
B. HTTPS
C. VPN
D. IRM

Correct Answer: D

Explanation:

Explanation: Information rights management (IRM) technologies allow security controls and policies to be enforced on a data object regardless of where it resides. They also allow for extended controls such as expirations and copying restrictions, which are not available through traditional control mechanisms. Hypertext Transfer Protocol Secure (HTTPS), virtual private network (VPN), and Transport Layer Security (TLS) are all technologies and protocols that are widely used with cloud implementations for secure access to systems and services and likely will be used in conjunction with other object data protection strategies.

Certified Cloud Security Professional – CCSP – Question379

Which cloud service category most commonly uses client-side key management systems?

A.
Software as a Service
B. Infrastructure as a Service
C. Platform as a Service
D. Desktop as a Service

Correct Answer: A

Explanation:

Explanation: SaaS most commonly uses client-side key management. With this type of implementation, the software for doing key management is supplied by the cloud provider, but is hosted and run by the cloud customer. This allows for full integration with the SaaS implementation, but also provides full control to the cloud customer. Although the cloud provider may offer software for performing key management to the cloud customers, with the Infrastructure, Platform, and Desktop as a Service categories, the customers would largely be responsible for their own options and implementations and would not be bound by the offerings from the cloud provider.

Certified Cloud Security Professional – CCSP – Question378

Which of the following is the concept of segregating information or processes, within the same system or application, for security reasons?

A.
Cell blocking
B. Sandboxing
C. Pooling
D. Fencing

Correct Answer: B

Explanation:

Explanation: Sandboxing involves the segregation and isolation of information or processes from other information or processes within the same system or application, typically for security concerns. Sandboxing is generally used for data isolation (for example, keeping different communities and populations of users isolated from others with similar data). In IT terminology, pooling typically means bringing together and consolidating resources or services, not segregating or separating them. Cell blocking and fencing are both erroneous terms.

Certified Cloud Security Professional – CCSP – Question377

What concept does the D represent within the STRIDE threat model?

A.
Denial of service
B. Distributed
C. Data breach
D. Data loss

Correct Answer: A

Explanation:

Explanation: Any application can be a possible target of denial of service (DoS) attacks. From the application side, the developers should minimize how many operations are performed for unauthenticated users. This will keep the application running as quickly as possible and using the least amount of system resources to help minimize the impact of any such attacks. None of the other options provided is the correct term.

Certified Cloud Security Professional – CCSP – Question376

When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.
Which of the following would NOT be something that is predefined as part of the audit agreement?

A.
Size
B. Format
C. Structure
D. Audience

Correct Answer: A

Explanation:

Explanation The ultimate size of the audit report is not something that would ever be included in the audit scope or definition. Decisions about the content of the report should be the only factor that drives the ultimate size of the report. The structure, audience, and format of the audit report are all crucial elements that must be defined and agreed upon as part of the audit scope.

Certified Cloud Security Professional – CCSP – Question375

Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?

A.
Problem management
B. Continuity management
C. Availability management
D. Configuration management

Correct Answer: D

Explanation:

Explanation: Configuration management tracks and maintains detailed information about all IT components within an organization. Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Continuity management (or business continuity management) is focused on planning for the successful restoration of systems or services after an unexpected outage, incident, or disaster. Problem management is focused on identifying and mitigating known problems and deficiencies before they occur.

Certified Cloud Security Professional – CCSP – Question374

Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?

A.
Continuity management
B. Availability management
C. Configuration management
D. Problem management

Correct Answer: B

Explanation:

Explanation: Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Continuity management (or business continuity management) is focused on planning for the successful restoration of systems or services after an unexpected outage, incident, or disaster. Configuration management tracks and maintains detailed information about all IT components within an organization. Problem management is focused on identifying and mitigating known problems and deficiencies before they occur.

Certified Cloud Security Professional – CCSP – Question373

With an application hosted in a cloud environment, who could be the recipient of an eDiscovery order?

A.
Users
B. Both the cloud provider and cloud customer
C. The cloud customer
D. The cloud provider

Correct Answer: B

Explanation:

Explanation: Either the cloud customer or the cloud provider could receive an eDiscovery order, and in almost all circumstances they would need to work together to ensure compliance.