Certified Cloud Security Professional – CCSP – Question362

Which of the following provides assurance, to a predetermined acceptable level of certainty, that an entity is indeed who they claim to be?

A.
Authentication
B. Identification
C. Proofing
D. Authorization

Correct Answer: A

Explanation:

Explanation: Authentication goes a step further than identification by providing a means for proving an entity’s identification. Authentication is most commonly done through mechanisms such as passwords. Identification involves ascertaining who the entity is, but without a means of proving it, such as a name or user ID. Authorization occurs after authentication and sets access permissions and other privileges within a system or application for the user. Proofing is not a term that is relevant to the question.

Certified Cloud Security Professional – CCSP – Question361

Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.
Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?

A.
Interoperability
B. Resiliency
C. Scalability
D. Portability

Correct Answer: A

Explanation:

Explanation: Interoperability is ability to easily move between cloud providers, by either moving or reusing components and services. This can pertain to any cloud deployment model, and it gives organizations the ability to constantly evaluate costs and services as well as move their business to another cloud provider as needed or desired. Portability relates to the wholesale moving of services from one cloud provider to another, not necessarily the reuse of components or services for other purposes. Although resiliency is not an official concept within cloud computing, it certainly would be found throughout other topics such as elasticity, auto-scaling, and resource pooling. Scalability pertains to changing resource allocations to a service to meet current demand, either upward or downward in scope.

Certified Cloud Security Professional – CCSP – Question360

Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed. Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?

A.
Disclosure
B. Transparency
C. Openness
D. Documentation

Correct Answer: B

Explanation:

Explanation: Transparency is the official process by which a cloud provider discloses insight and information into its configurations or operations to the appropriate audiences. Disclosure, openness, and documentation are all terms that sound similar to the correct answer, but none of them is the correct term in this case.

Certified Cloud Security Professional – CCSP – Question359

Many activities within a cloud environment are performed via programmatic means, where complex and distributed operations are handled without the need to perform each step individually.
Which of the following concepts does this describe?

A.
Orchestration
B. Provisioning
C. Automation
D. Allocation

Correct Answer: A

Explanation:

Explanation: Orchestration is the programmatic means of managing and coordinating activities within a cloud environment and allowing for a commensurate level of automation and self-service. Provisioning, allocation, and automation are all components of orchestration, but none refers to the overall concept.

Certified Cloud Security Professional – CCSP – Question357

Which protocol, as a part of TLS, handles the actual secure communications and transmission of data?

A.
Negotiation
B. Handshake
C. Transfer
D. Record

Correct Answer: D

Explanation:

Explanation: The TLS record protocol is the actual secure communications method for transmitting data; it’s responsible for encrypting and authenticating packets throughout their transmission between the parties, and in some cases it also performs compression. The TLS handshake protocol is what negotiates and establishes the TLS connection between two parties and enables the secure communications channel to then handle data transmissions. Negotiation and transfer are not protocols under TLS.

Certified Cloud Security Professional – CCSP – Question356

Which component of ITIL involves handling anything that can impact services for either internal or public users?

A.
Incident management
B. Deployment management
C. Problem management
D. Change management

Correct Answer: A

Explanation:

Explanation Incident management is focused on limiting the impact of disruptions to an organization’s services or operations, as well as returning their state to full operational status as soon as possible. Problem management is focused on identifying and mitigating known problems and deficiencies before they occur. Deployment management is a subcomponent of change management and is where the actual code or configuration change is put into place. Change management involves the processes and procedures that allow an organization to make changes to its IT systems and services in a controlled manner.

Certified Cloud Security Professional – CCSP – Question355

Which of the following technologies is NOT commonly used for accessing systems and services in a cloud environment in a secure manner?

A.
KVM
B. HTTPS
C. VPN
D. TLS

Correct Answer: A

Explanation:

Explanation: A keyboard-video-mouse (KVM) system is commonly used for directly accessing server terminals in a data center. It is not a method that would be possible within a cloud environment, primarily due to the use virtualized systems, but also because only the cloud provider’s staff would be allowed the physical access to hardware systems that’s provided by a KVM. Hypertext Transfer Protocol Secure (HTTPS), virtual private network (VPN), and Transport Layer Security (TLS) are all technologies and protocols that are widely used with cloud implementations for secure access to systems and services.

Certified Cloud Security Professional – CCSP – Question354

With a federated identity system, what does the identity provider send information to after a successful authentication?

A.
Relying party
B. Service originator
C. Service relay
D. Service relay

Correct Answer: A

Explanation:

Explanation: Upon successful authentication, the identity provider sends an assertion with appropriate attributes to the relying party to grant access and assign appropriate roles to the user. The other terms provided are similar sounding to the correct term but are not actual components of a federated system.

Certified Cloud Security Professional – CCSP – Question353

What must SOAP rely on for security since it does not provide security as a built-in capability?

A.
Encryption
B. Tokenization
C. TLS
D. SSL

Correct Answer: A

Explanation:

Explanation: Simple Object Access Protocol (SOAP) uses Extensible Markup Language (XML) for data passing, and it must rely on the encryption of those data packages for security. TLS and SSL (before it was deprecated) represent two commons approaches to using encryption for protection of data transmissions. However, they are only two possible options and do not encapsulate the overall concept the question is looking for. Tokenization, which involves the replacement of sensitive data with opaque values, would not be appropriate for use with SOAP because the actual data is needed by the services.