Certified Cloud Security Professional – CCSP – Question342

IRM solutions allow an organization to place different restrictions on data usage than would otherwise be possible through traditional security controls.
Which of the following controls would be possible with IRM that would not with traditional security controls?

A.
Copy
B. Read
C. Delete
D. Print

Correct Answer: D

Explanation:

Explanation: Traditional security controls would not be able to restrict a user from printing something that they have the ability to access and read, but IRM solutions would allow for such a restriction. If a user has permissions to read a file, he can also copy the file or print it under traditional controls, and the ability to modify or write will give the user the ability to delete.

Certified Cloud Security Professional – CCSP – Question341

Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?

A.
Data owner
B. Data processor
C. Database administrator
D. Data custodian

Correct Answer: A

Explanation:

Explanation: Data owner is a management role that’s responsible for all aspects of how data is used and protected. The database administrator, data custodian, and data processor are all technical roles that involve the actual use and consumption of data, or the implementation of security controls and policies with the data.

Certified Cloud Security Professional – CCSP – Question340

Your company is in the planning stages of moving applications that have large data sets to a cloud environment.
What strategy for data removal would be the MOST appropriate for you to recommend if costs and speed are primary considerations?

A.
Shredding
B. Media destruction
C. Crypthographic erasure
D. Overwriting

Correct Answer: C

Explanation:

Explanation: Cryptographic erasure involves having the data encrypted, typically as a matter of standard operations, and then rendering the data useless and unreadable by destroying the encryption keys for it. It represents a very cheap and immediate way to destroy data, and it works in all environments. With a cloud environment and multitenancy, media destruction or the physical destruction of storage devices, including shredding, would not be possible. Depending on the environment, overwriting may or may not be possible, but cryptographic erasure is the best answer because it is always an available option and is very quick to implement.

Certified Cloud Security Professional – CCSP – Question339

BCDR strategies typically do not involve the entire operations of an organization, but only those deemed critical to their business.
Which concept pertains to the required amount of time to restore services to the predetermined level?

A.
RPO
B. RSL
C. RTO
D. SRE

Correct Answer: C

Explanation:

Explanation: The recovery time objective (RTO) measures the amount of time necessary to recover operations to meet the BCDR plan. The recovery service level (RSL) measures the percentage of operations that would be recovered during a BCDR situation. The recovery point objective (RPO) sets and defines the amount of data an organization must have available or accessible to reach the predetermined level of operations necessary during a BCDR situation. SRE is provided as an erroneous response.

Certified Cloud Security Professional – CCSP – Question338

Which protocol, as a part of TLS, handles negotiating and establishing a connection between two parties?

A.
Record
B. Binding
C. Negotiation
D. Handshake

Correct Answer: D

Explanation:

Explanation: The TLS handshake protocol is what negotiates and establishes the TLS connection between two parties and enables a secure communications channel to then handle data transmissions. The TLS record protocol is the actual secure communications method for transmitting data; it’s responsible for the encryption and authentication of packets throughout their transmission between the parties, and in some cases it also performs compression. Negotiation and binding are not protocols under TLS.

Certified Cloud Security Professional – CCSP – Question337

The WS-Security standards are built around all of the following standards except which one?

A.
SAML
B. WDSL
C. XML
D. SOAP

Correct Answer: A

Explanation:

Explanation: The WS-Security specifications, as well as the WS-Federation system, are built upon XML, WDSL, and SOAP. SAML is a very similar protocol that is used as an alternative to WS.XML, WDSL, and SOAP are all integral to the WS-Security specifications.

Certified Cloud Security Professional – CCSP – Question336

Which crucial aspect of cloud computing can be most threatened by insecure APIs?

A.
Automation
B. Resource pooling
C. Elasticity
D. Redundancy

Correct Answer: A

Explanation:

Explanation: Cloud environments depend heavily on API calls for management and automation. Any vulnerability with the APIs can cause significant risk and exposure to all tenants of the cloud environment. Resource pooling and elasticity could both be impacted by insecure APIs, as both require automation and orchestration to operate properly, but automation is the better answer here. Redundancy would not be directly impacted by insecure APIs.

Certified Cloud Security Professional – CCSP – Question335

Which of the following is NOT a commonly used communications method within cloud environments to secure data in transit?

A.
IPSec
B. HTTPS
C. VPN
D. DNSSEC

Correct Answer: D

Explanation:

Explanation: DNSSEC is used as a security extension to DNS lookup queries in order to ensure the authenticity and authoritativeness of hostname resolutions, in order to prevent spoofing and redirection of traffic. Although it is a very important concept to be employed for security practices, it is not used to secure or encrypt data transmissions. HTTPS is the most commonly used security mechanism for data communications between clients and websites and web services. IPSec is less commonly used, but is also intended to secure communications between servers. VPN is commonly used to secure traffic into a network area or subnet for developers and administrative users.

Certified Cloud Security Professional – CCSP – Question334

BCDR strategies typically do not involve the entire operations of an organization, but only those deemed critical to their business.
Which concept pertains to the amount of data and services needed to reach the predetermined level of operations?

A.
SRE
B. RPO
C. RSL
D. RTO

Correct Answer: B

Explanation:

Explanation: The recovery point objective (RPO) sets and defines the amount of data an organization must have available or accessible to reach the predetermined level of operations necessary during a BCDR situation. The recovery time objective (RTO) measures the amount of time necessary to recover operations to meet the BCDR plan. The recovery service level (RSL) measures the percentage of operations that would be recovered during a BCDR situation. SRE is provided as an erroneous response.

Certified Cloud Security Professional – CCSP – Question333

Without the extensive funds of a large corporation, a small-sized company could gain considerable and cost-effective services for which of the following concepts by moving to a cloud environment?

A.
Regulatory
B. Security
C. Testing
D. Development

Correct Answer: B

Explanation:

Explanation: Cloud environments, regardless of the specific deployment model used, have extensive and robust security controls in place, especially in regard to physical and infrastructure security. A small company can leverage the extensive security controls and monitoring provided by a cloud provider, which they would unlikely ever be able to afford on their own. Moving to a cloud would not result in any gains for development and testing because these areas require the same rigor regardless of where deployment and hosting occur. Regulatory compliance in a cloud would not be a gain for an organization because it would likely result in additional oversight and auditing as well as require the organization to adapt to a new environment.