Certified Cloud Security Professional – CCSP – Question292

With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?

A.
Filtering and forwarding
B. Filtering and firewalling
C. Firewalling and forwarding
D. Forwarding and protocol

Correct Answer: A

Explanation:

Explanation: With SDN, the filtering and forwarding capabilities and administration are separated. This allows the cloud provider to build interfaces and management tools for administrative delegation of filtering configuration, without having to allow direct access to underlying network equipment. Firewalling and protocols are both terms related to networks, but they are not components SDN is concerned with.

Certified Cloud Security Professional – CCSP – Question291

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.
Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

A.
SOC Type 2, one year
B. SOC Type 1, one year
C. SOC Type 2, one month
D. SOC Type 2, six months

Correct Answer: D

Explanation:

Explanation: SOC Type 2 audits are done over a period of time, with six months being the minimum duration. SOC Type 1 audits are designed with a scope that’s a static point in time, and the other times provided for SOC Type 2 are incorrect.

Certified Cloud Security Professional – CCSP – Question290

There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the stricter requirements.
Which US program was designed to help companies overcome these differences?

A.
SOX
B. HIPAA
C. GLBA
D. Safe Harbor

Correct Answer: D

Explanation:

Explanation: The Safe Harbor regulations were developed by the Department of Commerce and are meant to serve as a way to bridge the gap between privacy regulations of the European Union and the United States. Due to the lack of adequate privacy laws and protection on the federal level in the US, European privacy regulations generally prohibit the exporting of PII from Europe to the United States. Participation in the Safe Harbor program is voluntary on the part of US organizations. These organizations must conform to specific requirements and policies that mirror those from the EU, thus possibly fulfilling the EU requirements for data sharing and export. This way, American businesses can be allowed to serve customers in the EU. The Health Insurance Portability and Accountability Act (HIPAA) pertains to the protection of patient medical records and privacy. The Gramm-Leach-Bliley Act (GLBA) focuses on the use of PII within financial institutions. The Sarbanes-Oxley Act (SOX) regulates the financial and accounting practices used by organizations in order to protect shareholders from improper practices and errors.

Certified Cloud Security Professional – CCSP – Question289

Which data state would be most likely to use digital signatures as a security protection mechanism?

A.
Data in use
B. Data in transit
C. Archived
D. Data at rest

Correct Answer: A

Explanation:

Explanation: During the data-in-use state, the information has already been accessed from storage and transmitted to the service, so reliance on a technology such as digital signatures is imperative to ensure security and complement the security methods used during previous states. Data in transit relies on technologies such as TLS to encrypt network transmission of packets for security. Data at rest primarily uses encryption for stored file objects. Archived data would be the same as data at rest.

Certified Cloud Security Professional – CCSP – Question288

Within a federated identity system, which of the following would you be MOST likely to use for sending information for consumption by a relying party?

A.
XML
B. HTML
C. WS-Federation
D. SAML

Correct Answer: D

Explanation:

Explanation: The Security Assertion Markup Language (SAML) is the most widely used method for encoding and sending attributes and other information from an identity provider to a relying party.WS-Federation, which is used by Active Directory Federation Services (ADFS), is the second most used method for sending information to a relying party, but it is not a better choice than SAML. XML is similar to SAML in the way it encodes and labels data, but it does not have all of the required extensions that SAML does. HTML is not used within federated systems at all.

Certified Cloud Security Professional – CCSP – Question287

An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer.
Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?

A.
Network
B. Users
C. Memory
D. CPU

Correct Answer: B

Explanation:

Explanation: Dealing with users or user access would not be an appropriate item for inclusion in an SLA specifically. However, user access and user experience would be covered indirectly through other metrics. Memory, CPU, and network resources are all typically included within an SLA for availability and response times when dealing with any incidents.

Certified Cloud Security Professional – CCSP – Question286

Which of the following tasks within a SaaS environment would NOT be something the cloud customer would be responsible for?

A.
Authentication mechanism
B. Branding
C. Training
D. User access

Correct Answer: A

Explanation:

Explanation: The authentication mechanisms and implementations are the responsibility of the cloud provider because they are core components of the application platform and service. Within a SaaS implementation, the cloud customer will provision user access, deploy branding to the application interface (typically), and provide or procure training for its users.

Certified Cloud Security Professional – CCSP – Question285

Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?

A.
Hardening
B. Leveling
C. Baselines
D. Standards

Correct Answer: C

Explanation:

Explanation: Baselines are a set of configurations and policies applied to all new systems or services, and they serve as the basis for deploying any other services on top of them. Although standards often form the basis for baselines, the term is applicable in this case. Hardening is the process of securing a system, often through the application of baselines. Leveling is an extraneous but similar term to baselining.

Certified Cloud Security Professional – CCSP – Question284

With IaaS, what is responsible for handling the security and control over the volume storage space?

A.
Management plane
B. Operating system
C. Application
D. Hypervisor

Correct Answer: B

Explanation:

Explanation: Volume storage is allocated via a LUN to a system and then treated the same as any traditional storage. The operating system is responsible for formatting and securing volume storage as well as controlling all access to it. Applications, although they may use volume storage and have permissions to write to it, are not responsible for its formatting and security. Both a hypervisor and the management plane are outside of an individual system and are not responsible for managing the files and storage within that system.

Certified Cloud Security Professional – CCSP – Question283

Where is a DLP solution generally installed when utilized for monitoring data in transit?

A.
Network perimeter
B. Database server
C. Application server
D. Web server

Correct Answer: A

Explanation:

Explanation: To monitor data in transit, a DLP solution would optimally be installed at the network perimeter, to ensure that data leaving the network through various protocols conforms to security controls and policies. An application server or a web server would be more appropriate for monitoring data in use, and a database server would be an example of a location appropriate for monitoring data at rest.