Certified Cloud Security Professional – CCSP – Question182

Which process serves to prove the identity and credentials of a user requesting access to an application or data?

A.
Repudiation
B. Authentication
C. Identification
D. Authorization

Correct Answer: B

Explanation:

Explanation: Authentication is the process of proving whether the identity presented by a user is true and valid. This can be done through common mechanisms such as user ID and password combinations or with more secure methods such as multifactor authentication.

Certified Cloud Security Professional – CCSP – Question181

Which aspect of security is DNSSEC designed to ensure?

A.
Integrity
B. Authentication
C. Availability
D. Confidentiality

Correct Answer: A

Explanation:

Explanation: DNSSEC is a security extension to the regular DNS protocol and services that allows for the validation of the integrity of DNS lookups. It does not address confidentiality or availability at all. It allows for a DNS client to perform DNS lookups and validate both their origin and authority via the cryptographic signature that accompanies the DNS response.

Certified Cloud Security Professional – CCSP – Question179

What type of masking strategy involves replacing data on a system while it passes between the data and application layers?

A.
Dynamic
B. Static
C. Replication
D. Duplication

Correct Answer: A

Explanation:

Explanation: With dynamic masking, production environments are protected with the masking process being implemented between the application and data layers of the application. This allows for a masking translation to take place live in the system and during normal application processing of data.

Certified Cloud Security Professional – CCSP – Question178

Where is an XML firewall most commonly deployed in the environment?

A.
Between the application and data layers
B. Between the IPS and firewall
C. Between the presentation and application layers
D. Between the firewall and application server

Correct Answer: D

Explanation:

Explanation: XML firewalls are most commonly deployed in line between the firewall and application server to validate XML code before it reaches the application.

Certified Cloud Security Professional – CCSP – Question177

What does dynamic application security testing (DAST) NOT entail?

A.
Scanning
B. Probing
C. Discovery
D. Knowledge of the system

Correct Answer: D

Explanation:

Explanation: Dynamic application security testing (DAST) is considered “black box” testing and begins with no inside knowledge of the application or its configurations. Everything about the application must be discovered during the testing.

Certified Cloud Security Professional – CCSP – Question176

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?

A.
Applications
B. Key performance indicators (KPIs)
C. Services
D. Security

Correct Answer: B

Explanation:

Explanation: KPIs fall under the “business” aspect of QoS, along with monitoring and measuring of events and business processes. Services, security, and applications are all core components and concepts of the “IT” aspect of QoS.

Certified Cloud Security Professional – CCSP – Question175

With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?

A.
Routing
B. Session
C. Filtering
D. Firewalling

Correct Answer: C

Explanation:

Explanation: With software-defined networking (SDN), the filtering of network traffic is separated from the forwarding of network traffic so that it can be independently administered.

Certified Cloud Security Professional – CCSP – Question174

What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?

A.
Masking
B. Anonymization
C. Tokenization
D. Obfuscation

Correct Answer: C

Explanation:

Explanation: Tokenization is the practice of utilizing a random and opaque “token” value in data to replace what otherwise would be a sensitive or protected data object. The token value is usually generated by the application with a means to map it back to the actual real value, and then the token value is placed in the data set with the same formatting and requirements of the actual real value so that the application can continue to function without different modifications or code changes.

Certified Cloud Security Professional – CCSP – Question173

What does the REST API use to protect data transmissions?

A.
NetBIOS
B. VPN
C. Encapsulation
D. TLS

Correct Answer: D

Explanation:

Explanation: Representational State Transfer (REST) uses TLS for communication over secured channels. Although REST also supports SSL, at this point SSL has been phased out due to vulnerabilities and has been replaced by TLS.