Certified Cloud Security Professional – CCSP – Question202

One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.
Which aspect of cloud computing makes this particular component more challenging than in a traditional data center?

A.
Portability
B. Virtualization
C. Elasticity
D. Resource pooling

Correct Answer: B

Explanation:

Explanation: Cloud services make exclusive use of virtualization, and systems change over time, including the addition, subtraction, and
reimaging of virtual machines. It is extremely unlikely that the exact same virtual machines and images used in a previous audit would still be in use or even available for a later audit, making the tracking of changes over time extremely difficult, or even impossible. Elasticity refers to the ability to add and remove resources from a system or service to meet current demand, and although it plays a factor in making the tracking of virtual machines very difficult over time, it is not the best answer in this case. Resource pooling pertains to a cloud environment sharing a large amount of resources between different customers and services. Portability refers to the ability to move systems or services easily between different cloud providers.

Certified Cloud Security Professional – CCSP – Question201

Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.
Which role would you be assuming under this directive?

A.
Cloud service administrator
B. Cloud service user
C. Cloud service integrator
D. Cloud service business manager

Correct Answer: C

Explanation:

Explanation: The cloud service integrator role is responsible for connecting and integrating existing services and applications with cloud-based services.A cloud service administrator is responsible for testing, monitoring, and securing cloud services, as well as providing usage reporting and dealing with service problems. The cloud service user is someone who consumes cloud services. The cloud service business manager is responsible for overseeing the billing, auditing, and purchasing of cloud services.

Certified Cloud Security Professional – CCSP – Question200

What concept does the "D" represent with the STRIDE threat model?

A.
Data loss
B. Denial of service
C. Data breach
D. Distributed

Correct Answer: B

Explanation:

Explanation: Any application can be a possible target of denial-of-service (DoS) attacks. From the application side, the developers should minimize how many operations are performed for non-authenticated users. This will keep the application running as quickly as possible and using the least amount of system resources to help minimize the impact of any such attacks.

Certified Cloud Security Professional – CCSP – Question199

Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?

A.
Public
B. Community
C. Hybrid
D. Private

Correct Answer: D

Explanation:

Explanation: A private cloud model, and the specific contractual relationships involved, will give a cloud customer the most level of input and control over how the overall cloud environment is designed and implemented. This would be even more so in cases where the private cloud is owned and operated by the same organization that is hosting services within it.

Certified Cloud Security Professional – CCSP – Question198

What is an often overlooked concept that is essential to protecting the confidentiality of data?

A.
Strong password
B. Training
C. Security controls
D. Policies

Correct Answer: B

Explanation:

Explanation: While the main focus of confidentiality revolves around technological requirements or particular security methods, an important and often overlooked aspect of safeguarding data confidentiality is appropriate and comprehensive training for those with access to it. Training should be focused on the safe handling of sensitive information overall, including best practices for network activities as well as physical security of the devices or workstations used to access the application.

Certified Cloud Security Professional – CCSP – Question197

Over time, what is a primary concern for data archiving?

A.
Size of archives
B. Format of archives
C. Recoverability
D. Regulatory changes

Correct Answer: C

Explanation:

Explanation: Over time, maintaining the ability to restore and read archives is a primary concern for data archiving. As technologies change and new systems are brought in, it is imperative for an organization to ensure they are still able to restore and access archives for the duration of the required retention period.

Certified Cloud Security Professional – CCSP – Question196

Which value refers to the percentage of production level restoration needed to meet BCDR objectives?

A.
RPO
B. RTO
C. RSL
D. SRE

Correct Answer: C

Explanation:

Explanation: The recovery service level (RSL) is a percentage measure of the total typical production service level that needs to be restored to meet BCDR objectives in the case of a failure.

Certified Cloud Security Professional – CCSP – Question195

What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?

A.
Dynamic clustering
B. Dynamic balancing
C. Dynamic resource scheduling
D. Dynamic optimization

Correct Answer: D

Explanation:

Explanation: Dynamic optimization is the process through which the cloud environment is constantly maintained to ensure resources are available when and where needed, and that physical nodes do not become overloaded or near capacity, while others are underutilized.

Certified Cloud Security Professional – CCSP – Question194

Which of the following service capabilities gives the cloud customer an established and maintained framework to deploy code and applications?

A.
Software
B. Desktop
C. Platform
D. Infrastructure

Correct Answer: C

Explanation:

Explanation: The platform service capability provides programming languages and libraries from the cloud provider, where the customer can deploy their own code and applications into a managed and controlled framework.

Certified Cloud Security Professional – CCSP – Question193

What does static application security testing (SAST) offer as a tool to the testers?

A.
Production system scanning
B. Injection attempts
C. Source code access
D. Live testing

Correct Answer: C

Explanation:

Explanation: Static application security testing (SAST) is conducted with knowledge of the system, including source code, and is done against offline systems.