Certified Cloud Security Professional – CCSP – Question322

Because cloud providers will not give detailed information out about their infrastructures and practices to the general public, they will often use established auditing reports to ensure public trust, where the reputation of the auditors serves for assurance.
Which type of audit reports can be used for general public trust assurances?

A.
SOC 2
B. SAS-70
C. SOC 3
D. SOC 1

Correct Answer: C

Explanation:

Explanation: SOC Type 3 audit reports are very similar to SOC Type 2, with the exception that they are intended for general release and public audiences.SAS-70 audits have been deprecated. SOC Type 1 audit reports have a narrow scope and are intended for very limited release, whereas SOC Type 2 audit reports are intended for wider audiences but not general release.

Certified Cloud Security Professional – CCSP – Question321

What process entails taking sensitive data and removing the indirect identifiers from each data object so that the identification of a single entity would not be possible?

A.
Tokenization
B. Encryption
C. Anonymization
D. Masking

Correct Answer: C

Explanation:

Explanation: Anonymization is a type of masking, where indirect identifiers are removed from a data set to prevent the mapping back of data to an individual. Although masking refers to the overall approach of covering sensitive data, anonymization is the best answer here because it is more specific to exactly what is being asked. Tokenization involves the replacement of sensitive data with a key value that can be matched back to the real value. However, it is not focused on indirect identifiers or preventing the matching to an individual. Encryption refers to the overall process of protecting data via key pairs and protecting confidentiality.

Certified Cloud Security Professional – CCSP – Question320

Which component of ITIL pertains to planning, coordinating, executing, and validating changes and rollouts to production environments?

A.
Release management
B. Availability management
C. Problem management
D. Change management

Correct Answer: A

Explanation:

Explanation: Release management involves planning, coordinating, executing, and validating changes and rollouts to the production environment. Change management is a higher-level component than release management and also involves stakeholder and management approval, rather than specifically focusing the actual release itself. Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Problem management is focused on identifying and mitigating known problems and deficiencies before they occur.

Certified Cloud Security Professional – CCSP – Question319

Which component of ITIL involves planning for the restoration of services after an unexpected outage or incident?

A.
Continuity management
B. Problem management
C. Configuration management
D. Availability management

Correct Answer: A

Explanation:

Explanation: Continuity management (or business continuity management) is focused on planning for the successful restoration of systems or services after an unexpected outage, incident, or disaster. Problem management is focused on identifying and mitigating known problems and deficiencies before they occur. Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Configuration management tracks and maintains detailed information about all IT components within an organization.

Certified Cloud Security Professional – CCSP – Question318

Which of the following jurisdictions lacks a comprehensive national policy on data privacy and the protection of personally identifiable information (PII)?

A.
European Union
B. Asian-Pacific Economic Cooperation
C. United States
D. Russia

Correct Answer: C

Explanation:

Explanation: The United States has a myriad of regulations focused on specific types of data, such as healthcare and financial, but lacks an overall comprehensive privacy law on the national level. The European Union, the Asian-Pacific Economic Cooperation, and Russia all have national privacy protections and regulations for the handling the PII data of their citizens.

Certified Cloud Security Professional – CCSP – Question317

Which of the following is NOT considered a type of data loss?

A.
Data corruption
B. Stolen by hackers
C. Accidental deletion
D. Lost or destroyed encryption keys

Correct Answer: B

Explanation:

Explanation: The exposure of data by hackers is considered a data breach. Data loss focuses on the data availability rather than security. Data loss occurs when data becomes lost, unavailable, or destroyed, when it should not have been.

Certified Cloud Security Professional – CCSP – Question316

With the rapid emergence of cloud computing, very few regulations were in place that pertained to it specifically, and organizations often had to resort to using a collection of regulations that were not specific to cloud in order to drive audits and policies.
Which standard from the ISO/IEC was designed specifically for cloud computing?

A.
ISO/IEC 27001
B. ISO/IEC 19889
C. ISO/IEC 27001:2015
D. ISO/IEC 27018

Correct Answer: D

Explanation:

Explanation: ISO/IEC 27018 was implemented to address the protection of personal and sensitive information within a cloud environment. ISO/IEC 27001 and its later 27001:2015 revision are both general-purpose data security standards. ISO/IEC 19889 is an erroneous answer.

Certified Cloud Security Professional – CCSP – Question315

When a system needs to be exposed to the public Internet, what type of secure system would be used to perform only the desired operations?

A.
Firewall
B. Proxy
C. Honeypot
D. Bastion

Correct Answer: D

Explanation:

Explanation: A bastion is a system that is exposed to the public Internet to perform a specific function, but it is highly restricted and secured to just that function. Any nonessential services and access are removed from the bastion so that security countermeasures and monitoring can be focused just on the bastion’s specific duties. A honeypot is a system designed to look like a production system to entice attackers, but it does not contain any real data. It is used for learning about types of attacks and enabling countermeasures for them. A firewall is used within a network to limit access between IP addresses and ports. A proxy server provides additional security to and rulesets for network traffic that is allowed to pass through it to a service destination.

Certified Cloud Security Professional – CCSP – Question314

Which of the following areas of responsibility would be shared between the cloud customer and cloud provider within the Software as a Service (SaaS) category?

A.
Data
B. Governance
C. Application
D. Physical

Correct Answer: C

Explanation:

Explanation: With SaaS, the application is a shared responsibility between the cloud provider and cloud customer. Although the cloud provider is responsible for deploying, maintaining, and securing the application, the cloud customer does carry some responsibility for the configuration of users and options. Regardless of the cloud service category used, the physical environment is always the sole responsibility of the cloud provider. With all cloud service categories, the data and governance are always the sole responsibility of the cloud customer.

Certified Cloud Security Professional – CCSP – Question313

Which ITIL component is focused on anticipating predictable problems and ensuring that configurations and operations are in place to prevent these problems from ever occurring?

A.
Availability management
B. Continuity management
C. Configuration management
D. Problem management

Correct Answer: D

Explanation:

Explanation: Problem management is focused on identifying and mitigating known problems and deficiencies before they are able to occur, as well as on minimizing the impact of incidents that cannot be prevented. Continuity management (or business continuity management) is focused on planning for the successful restoration of systems or services after an unexpected outage, incident, or disaster. Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Configuration management tracks and maintains detailed information about all IT components within an organization.