Certified Cloud Security Professional – CCSP – Question352

Having a reservation in a cloud environment can ensure operations continue in the event of high utilization across the cloud.
Which of the following would NOT be a capability covered by reservations?

A.
Performing business operations
B. Starting virtual machines
C. Running applications
D. Auto-scaling

Correct Answer: D

Explanation:

Explanation: A reservation will not guarantee auto-scaling is available because it involves the allocation of additional resources beyond what a cloud customer already has provisioned. Reservations will guarantee minimal resources are available to start virtual machines, run applications, and perform normal business operations.

Certified Cloud Security Professional – CCSP – Question351

SOC Type 1 reports are considered "restricted use," in that they are intended only for limited audiences and purposes.
Which of the following is NOT a population that would be appropriate for a SOC Type 1 report?

A.
Current clients
B. Auditors
C. Potential clients
D. The service organization

Correct Answer: C

Explanation:

Explanation: Potential clients are not served by SOC Type 1 audits. A Type 2 or Type 3 report would be appropriate for potential clients. SOC Type 1 reports are intended for restricted use, where only the service organization itself, current clients, or auditors would have access to them.

Certified Cloud Security Professional – CCSP – Question349

Which of the following could be used as a second component of multifactor authentication if a user has an RSA token?

A.
Access card
B. USB thumb drive
C. Retina scan
D. RFID

Correct Answer: C

Explanation:

Explanation: A retina scan could be used in conjunction with an RSA token because it is a biometric factor, and thus a different type of factor. An access card, RFID, and USB thumb drive are all items in possession of a user, the same as an RSA token, and as such would not be appropriate.

Certified Cloud Security Professional – CCSP – Question348

What is the concept of isolating an application from the underlying operating system for testing purposes?

A.
Abstracting
B. Application virtualization
C. Hosting
D. Sandboxing

Correct Answer: B

Explanation:

Explanation: Application virtualization is a software implementation that allows applications and programs to run in an isolated environment rather than directly interacting with the operating system. Sandboxing refers to segregating information or processes for security or testing purposes, but it’s not directly related to isolation from the underlying operating system. Abstracting sounds similar to the correct term but is not pertinent to the question, and hosting is provided as an erroneous answer.

Certified Cloud Security Professional – CCSP – Question347

Which data sanitation method is also commonly referred to as "zeroing"?

A.
Overwriting
B. Nullification
C. Blanking
D. Deleting

Correct Answer: A

Explanation:

Explanation: The zeroing of data–or the writing of null values or arbitrary data to ensure deletion has been fully completed–is officially referred to as overwriting. Nullification, deleting, and blanking are provided as distractor terms.

Certified Cloud Security Professional – CCSP – Question346

Above and beyond general regulations for data privacy and protection, certain types of data are subjected to more rigorous regulations and oversight.
Which of the following is not a regulatory framework for more sensitive or specialized data?

A.
FIPS 140-2
B. FedRAMP
C. PCI DSS
D. HIPAA

Correct Answer: A

Explanation:

Explanation: The FIPS 140-2 standard pertains to the certification of cryptographic modules and is not a regulatory framework. The Payment Card Industry Data Security Standard (PCI DSS), the Federal Risk and Authorization Management Program (FedRAMP), and the Health Insurance Portability and Accountability Act (HIPAA) are all regulatory frameworks for sensitive or specialized data.

Certified Cloud Security Professional – CCSP – Question345

Which of the following is NOT one of the components of multifactor authentication?

A.
Something the user knows
B. Something the user has
C. Something the user sends
D. Something the user is

Correct Answer: C

Explanation:

Explanation: Multifactor authentication systems are composed of something the user knows, has, and/or is, not something the user sends. Multifactor authentication commonly uses something that a user knows, has, and/or is (such as biometrics or features).

Certified Cloud Security Professional – CCSP – Question344

A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.
However, what is one consideration that is often overlooked with the formulation of a BCDR plan?

A.
Availability of staff
B. Capacity at the BCDR site
C. Restoration of services
D. Change management processes

Correct Answer: C

Explanation:

Explanation: BCDR planning tends to focus so much on the failing over of services in the case of a disaster that recovery back to primary hosting after the disaster is often overlooked. In many instances, this can be just as complex a process as failing over, if not more so. Availability of staff, capacity at the BCDR site, and change management processes are typically integral to BCDR plans and are common components of them.

Certified Cloud Security Professional – CCSP – Question343

Which data protection strategy would be useful for a situation where the ability to remove sensitive data from a set is needed, but a requirement to retain the ability to map back to the original values is also present?

A.
Masking
B. Tokenization
C. Encryption
D. Anonymization

Correct Answer: B

Explanation:

Explanation: Tokenization involves the replacement of sensitive data fields with key or token values, which can ultimately be mapped back to the original, sensitive data values. Masking refers to the overall approach to covering sensitive data, and anonymization is a type of masking, where indirect identifiers are removed from a data set to prevent the mapping back of data to an individual. Encryption refers to the overall process of protecting data via key pairs and protecting confidentiality.