Certified Cloud Security Professional – CCSP – Question372

What concept does the A represent within the DREAD model?

A.
Affected users
B. Authorization
C. Authentication
D. Affinity

Correct Answer: A

Explanation:

Explanation: The concept of affected users measures the percentage of users who would be impacted by a successful exploit. Scoring ranges from 0, which would impact no users, to 10, which would impact all users. None of the other options provided is the correct term.

Certified Cloud Security Professional – CCSP – Question371

Which of the following is NOT a component of access control?

A.
Accounting
B. Federation
C. Authorization
D. Authentication

Correct Answer: B

Explanation:

Explanation: Federation is not a component of access control. Instead, it is used to allow users possessing credentials from other authorities and systems to access services outside of their domain. This allows for access and trust without the need to create additional, local credentials. Access control encompasses not only the key concepts of authorization and authentication, but also accounting. Accounting consists of collecting and maintaining logs for both authentication and authorization for operational and regulatory requirements.

Certified Cloud Security Professional – CCSP – Question370

Upon completing a risk analysis, a company has four different approaches to addressing risk. Which approach it takes will be based on costs, available options, and adherence to any regulatory requirements from independent audits.
Which of the following groupings correctly represents the four possible approaches?

A.
Accept, avoid, transfer, mitigate
B. Accept, deny, transfer, mitigate
C. Accept, deny, mitigate, revise
D. Accept, dismiss, transfer, mitigate

Correct Answer: A

Explanation:

Explanation: The four possible approaches to risk are as follows: accept (do not patch and continue with the risk), avoid (implement solutions to prevent the risk from occurring), transfer (take out insurance), and mitigate (change configurations or patch to resolve the risk). Each of these answers contains at least one incorrect approach name.

Certified Cloud Security Professional – CCSP – Question369

A variety of security systems can be integrated within a network–some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.
Which of the following types of technologies is best described here?

A.
IDS
B. IPS
C. Proxy
D. Firewall

Correct Answer: B

Explanation:

Explanation: An intrusion prevention system (IPS) can inspect traffic and detect any suspicious traffic based on a variety of factors, but it can also actively block such traffic. Although an IDS can detect the same types of suspicious traffic as an IPS, it is only design to alert, not to block. A firewall is only concerned with IP addresses, ports, and protocols; it cannot be used for the signature-based detection of traffic. A proxy can limit or direct traffic based on more extensive factors than a network firewall can, but it’s not capable of using the same signature detection rules as an IPS.

Certified Cloud Security Professional – CCSP – Question368

What category of PII data can carry potential fines or even criminal charges for its improper use or disclosure?

A.
Protected
B. Legal
C. Regulated
D. Contractual

Correct Answer: C

Explanation:

Explanation: Regulated PII data carries legal and jurisdictional requirements, along with official penalties for its misuse or disclosure, which can be either civil or criminal in nature. Legal and protected are similar terms, but neither is the correct answer in this case. Contractual requirements can carry financial or contractual impacts for the improper use or disclosure of PII data, but not legal or criminal penalties that are officially enforced.

Certified Cloud Security Professional – CCSP – Question367

Which aspect of cloud computing serves as the biggest challenge to using DLP to protect data at rest?

A.
Portability
B. Resource pooling
C. Interoperability
D. Reversibility

Correct Answer: B

Explanation:

Explanation: Resource pooling serves as the biggest challenge to using DLP solutions to protect data at rest because data is spread across large systems, which are also shared by many different clients. With the data always moving and being distributed, additional challenges for protection are created versus a physical and isolated storage system. Portability is the ability to easily move between different cloud providers, and interoperability is focused on the ability to reuse components or services. Reversibility pertains to the ability of a cloud customer to easily and completely remove their data and services from a cloud provider.

Certified Cloud Security Professional – CCSP – Question366

Which of the following would be considered an example of insufficient due diligence leading to security or operational problems when moving to a cloud?

A.
Monitoring
B. Use of a remote key management system
C. Programming languages used
D. Reliance on physical network controls

Correct Answer: D

Explanation:

Explanation: Many organizations in a traditional data center make heavy use of physical network controls for security. Although this is a perfectly acceptable best practice in a traditional data center, this reliance is not something that will port to a cloud environment. The failure of an organization to properly understand and adapt to the difference in network controls when moving to a cloud will likely leave an application with security holes and vulnerabilities. The use of a remote key management system, monitoring, or certain programming languages would not constitute insufficient due diligence by itself.

Certified Cloud Security Professional – CCSP – Question365

What masking strategy involves the replacing of sensitive data at the time it is accessed and used as it flows between the data and application layers of a service?

A.
Active
B. Static
C. Dynamic
D. Transactional

Correct Answer: C

Explanation:

Explanation: Dynamic masking involves the live replacing of sensitive data fields during transactional use between the data and application layers of a service. Static masking involves creating a full data set with the sensitive data fields masked, but is not done during live transactions like dynamic masking. Active and transactional are offered as similar types of answers but are not types of masking.

Certified Cloud Security Professional – CCSP – Question364

When an organization is considering the use of cloud services for BCDR planning and solutions, which of the following cloud concepts would be the most important?

A.
Reversibility
B. Elasticity
C. Interoperability
D. Portability

Correct Answer: D

Explanation:

Explanation: Portability is the ability for a service or system to easily move among different cloud providers. This is essential for using a cloud solution for BCDR because vendor lock-in would inhibit easily moving and setting up services in the event of a disaster, or it would necessitate a large number of configuration or component changes to implement. Interoperability, or the ability to reuse components for other services or systems, would not be an important factor for BCDR. Reversibility, or the ability to remove all data quickly and completely from a cloud environment, would be important at the end of a disaster, but would not be important during setup and deployment. Elasticity, or the ability to resize resources to meet current demand, would be very beneficial to a BCDR situation, but not as vital as portability.

Certified Cloud Security Professional – CCSP – Question363

Whereas a contract articulates overall priorities and requirements for a business relationship, which artifact enumerates specific compliance requirements, metrics, and response times?

A.
Service level agreement
B. Service level contract
C. Service compliance contract
D. Service level amendment

Correct Answer: A

Explanation:

Explanation: The service level agreement (SLA) articulates minimum requirements for uptime, availability, processes, customer service and support, security controls, auditing requirements, and any other key aspect or requirement of the contract. Although the other choices sound similar to the correct answer, none is the proper term for this concept.