Certified Cloud Security Professional – CCSP – Question222

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.
What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

A.
Distributed clustering
B. Distributed balancing
C. Distributed optimization
D. Distributed resource scheduling

Correct Answer: D

Explanation:

Explanation: Distributed resource scheduling (DRS) is used within all clustered systems as the method for providing high availability, scaling, management, workload distribution, and the balancing of jobs and processes. None of the other choices is the correct term in this case.

Certified Cloud Security Professional – CCSP – Question221

Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?

A.
Cross-site request forgery
B. Missing function-level access control
C. Injection
D. Cross-site scripting

Correct Answer: B

Explanation:

Explanation: It is imperative that applications do checks when each function or portion of the application is accessed to ensure that the user is properly authorized. Without continual checks each time a function is accessed, an attacker could forge requests to access portions of the application where authorization has not been granted. An injection attack is where a malicious actor sends commands or other arbitrary data through input and data fields with the intent of having the application or system execute the code as part of its normal processing and queries. Cross-site scripting occurs when an attacker is able to send untrusted data to a user’s browser without going through validation processes. Cross-site request forgery occurs when an attack forces an authenticated user to send forged requests to an application running under their own access and credentials.

Certified Cloud Security Professional – CCSP – Question220

Data centers have enormous power resources that are distributed and consumed throughout the entire facility.
Which of the following standards pertains to the proper fire safety standards within that scope?

A.
IDCA
B. BICSI
C. NFPA
D. Uptime Institute

Correct Answer: C

Explanation:

Explanation: The National Fire Protection Association (NFPA) publishes a broad range of fire safety and design standards for many different types of facilities. Building Industry Consulting Services International (BICSI) issues certifications for data center cabling. The Uptime Institute publishes the most widely known and used standard for data center topologies and tiers. The International Data Center Authority (IDCA) offers the Infinity Paradigm, which takes a macro-level approach to data center design.

Certified Cloud Security Professional – CCSP – Question219

Which cloud deployment model would be ideal for a group of universities looking to work together, where each university can gain benefits according to its specific needs?

A.
Private
B. Public
C. Hybrid
D. Community

Correct Answer: D

Explanation:

Explanation: A community cloud is owned and maintained by similar organizations working toward a common goal. In this case, the universities would all have very similar needs and calendar requirements, and they would not be financial competitors of each other. Therefore, this would be an ideal group for working together within a community cloud. A public cloud model would not work in this scenario because it is designed to serve the largest number of customers, would not likely be targeted toward specific requirements for individual customers, and would not be willing to make changes for them. A private cloud could accommodate such needs, but would not meet the criteria for a group working together, and a hybrid cloud spanning multiple cloud providers would not fit the specifics of the question.

Certified Cloud Security Professional – CCSP – Question218

Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?

A.
Unstructured
B. Object
C. Volume
D. Structured

Correct Answer: D

Explanation:

Explanation: Structured storage is designed, maintained, and implemented by a cloud service provider as part of a PaaS offering. It is specific to that cloud provider and the way they have opted to implement systems, so special care is required to ensure that applications are not designed in a way that will lock the cloud customer into a specific cloud provider with that dependency. Unstructured storage for auxiliary files would not lock a customer into a specific provider. With volume and object storage, because the cloud customer maintains their own systems with IaaS, moving and replicating to a different cloud provider would be very easy.

Certified Cloud Security Professional – CCSP – Question217

What type of storage structure does object storage employ to maintain files?

A.
Directory
B. Hierarchical
C. tree
D. Flat

Correct Answer: D

Explanation:

Explanation: Object storage uses a flat file system to hold storage objects; it assigns files a key value that is then used to access them, rather than relying on directories or descriptive filenames. Typical storage layouts such as tree, directory, and hierarchical structures are used within volume storage, whereas object storage maintains a flat structure with key values.

Certified Cloud Security Professional – CCSP – Question216

A DLP solution/implementation has three main components.
Which of the following is NOT one of the three main components?

A.
Monitoring
B. Enforcement
C. Auditing
D. Discovery and classification

Correct Answer: C

Explanation:

Explanation: Auditing, which can be supported to varying degrees by DLP solutions, is not a core component of them. Data loss prevention (DLP) solutions have core components of discovery and classification, enforcement, and monitoring. Discovery and classification are concerned with determining which data should be applied to the DLP policies, and then determining its classification level. Monitoring is concerned with the actual watching of data and how it’s used through its various stages. Enforcement is the actual application of policies determined from the discovery stage and then triggered during the monitoring stage.

Certified Cloud Security Professional – CCSP – Question215

The European Union is often considered the world leader in regard to the privacy of personal data and has declared privacy to be a "human right."
In what year did the EU first assert this principle?

A.
1995
B. 2000
C. 2010
D. 1999

Correct Answer: A

Explanation:

Explanation: The EU passed Directive 95/46 EC in 1995, which established data privacy as a human right. The other years listed are incorrect.

Certified Cloud Security Professional – CCSP – Question214

Different certifications and standards take different approaches to data center design and operations. Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?

A.
IDCA
B. BICSI
C. Uptime Institute
D. NFPA

Correct Answer: A

Explanation:

Explanation: The Infinity Paradigm of the International Data Center Authority (IDCA) takes a macro-level approach to data center design. The IDCA does not use a specific, focused approach on specific components to achieve tier status. Building Industry
Consulting Services International (BICSI) issues certifications for data center cabling. The National Fire Protection Association (NFPA) publishes a broad range of fire safety and design standards for many different types of facilities. The Uptime Institute publishes the most widely known and used standard for data center topologies and tiers.

Certified Cloud Security Professional – CCSP – Question213

From the perspective of compliance, what is the most important consideration when it comes to data center location?

A.
Natural disasters
B. Utility access
C. Jurisdiction
D. Personnel access

Correct Answer: C

Explanation:

Explanation: Jurisdiction will dictate much of the compliance and audit requirements for a data center. Although all the aspects listed are very important to security, from a strict compliance perspective, jurisdiction is the most important. Personnel access, natural disasters, and utility access are all important operational considerations for selecting a data center location, but they are not related to compliance issues like jurisdiction is.