Certified Cloud Security Professional – CCSP – Question192

Which attribute of data poses the biggest challenge for data discovery?

A.
Labels
B. Quality
C. Volume
D. Format

Correct Answer: B

Explanation:

Explanation: The main problem when it comes to data discovery is the quality of the data that analysis is being performed against. Data that is malformed, incorrectly stored or labeled, or incomplete makes it very difficult to use analytical tools against.

Certified Cloud Security Professional – CCSP – Question191

What concept does the "A" represent in the DREAD model?

A.
Affected users
B. Authentication
C. Affinity
D. Authorization

Correct Answer: A

Explanation:

Explanation: Affected users refers to the percentage of users who would be impacted by a successful exploit. Scoring ranges from 0, which means no users are impacted, to 10, which means all users are impacted.

Certified Cloud Security Professional – CCSP – Question190

Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed?

A.
IPS
B. WAF
C. Firewall
D. IDS

Correct Answer: D

Explanation:

Explanation: An intrusion detection system (IDS) is designed to analyze network packets, compare their contents or characteristics against a set of configurations or signatures, and alert personnel if anything is detected that could constitute a threat or is otherwise designated for alerting.

Certified Cloud Security Professional – CCSP – Question188

Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?

A.
Hybrid
B. Community
C. Private
D. Public

Correct Answer: D

Explanation:

Explanation: Because the public cloud model is available to everyone, in most instances all a customer will need to do to gain access is set up an account and provide a credit card number through the service’s web portal. No additional contract negotiations, agreements, or specific group memberships are typically needed to get started.

Certified Cloud Security Professional – CCSP – Question187

Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?

A.
Interoperability
B. Resource pooling
C. Portability
D. Measured service

Correct Answer: D

Explanation:

Explanation: Measured service means that costs are only incurred when a cloud customer is actually using cloud services. This is ideal for a business continuity and disaster recovery (BCDR) solution because it negates the need to keep hardware or resources on standby in case of a disaster. Services can be initiated when needed and without costs unless needed.

Certified Cloud Security Professional – CCSP – Question186

Which of the following is NOT part of a retention policy?

A.
Format
B. Costs
C. Accessibility
D. Duration

Correct Answer: B

Explanation:

Explanation: The data retention policy covers the duration, format, technologies, protection, and accessibility of archives, but does not address the specific costs of its implementation and maintenance.

Certified Cloud Security Professional – CCSP – Question185

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?

A.
Broad network access
B. Interoperability
C. Resource pooling
D. Portability

Correct Answer: A

Explanation:

Explanation: With a typical BCDR solution, an organization would need some number of staff to quickly travel to the location of the BCDR site to configure systems and applications for recovery. With a cloud environment, everything is done over broad network access, with no need (or even possibility) to travel to a remote site at any time.

Certified Cloud Security Professional – CCSP – Question184

What is the minimum regularity for testing a BCDR plan to meet best practices?

A.
Once year
B. Once a month
C. Every six months
D. When the budget allows it

Correct Answer: A

Explanation:

Explanation: Best practices and industry standards dictate that a BCDR solution should be tested at least once a year, though specific regulatory requirements may dictate more regular testing. The BCDR plan should also be tested whenever a major modification to a system occurs.

Certified Cloud Security Professional – CCSP – Question183

Who would be responsible for implementing IPsec to secure communications for an application?

A.
Developers
B. Systems staff
C. Auditors
D. Cloud customer

Correct Answer: B

Explanation:

Explanation: Because IPsec is implemented at the system or network level, it is the responsibility of the systems staff. IPsec removes the responsibility from developers, whereas other technologies such as TLS would be implemented by developers.