Certified Cloud Security Professional – CCSP – Question162

Which OSI layer does IPsec operate at?

A.
Network
B. transport
C. Application
D. Presentation

Correct Answer: A

Explanation:

Explanation: A major difference between IPsec and other protocols such as TLS is that IPsec operates at the Internet network layer rather than the application layer, allowing for complete end-to-end encryption of all communications and traffic.

Certified Cloud Security Professional – CCSP – Question161

Which security concept is focused on the trustworthiness of data?

A.
Integrity
B. Availability
C. Nonrepudiation
D. Confidentiality

Correct Answer: A

Explanation:

Explanation: Integrity is focused on the trustworthiness of data as well as the prevention of unauthorized modification or tampering of it. A prime consideration for maintaining integrity is an emphasis on the change management and configuration management aspects of operations, so that all modifications are predictable, tracked, logged, and verified, whether they are performed by actual human users or systems processes and scripts.

Certified Cloud Security Professional – CCSP – Question160

What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?

A.
Proxy
B. Bastion
C. Honeypot
D. WAF

Correct Answer: B

Explanation:

Explanation: A bastion host is a server that is fully exposed to the public Internet, but is extremely hardened to prevent attacks and is usually dedicated for a specific application or usage; it is not something that will serve multiple purposes. This singular focus allows for much more stringent security hardening and monitoring.

Certified Cloud Security Professional – CCSP – Question159

Which data point that auditors always desire is very difficult to provide within a cloud environment?

A.
Access policy
B. Systems architecture
C. Baselines
D. Privacy statement

Correct Answer: B

Explanation:

Explanation: Cloud environments are constantly changing and often span multiple physical locations. A cloud customer is also very unlikely to have knowledge and insight into the underlying systems architecture in a cloud environment. Both of these realities make it very difficult, if not impossible, for an organization to provide a comprehensive systems design document.

Certified Cloud Security Professional – CCSP – Question158

Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?

A.
regulatory requirements
B. Auditability
C. Service-level agreements
D. Governance

Correct Answer: A

Explanation:

Explanation: Regulatory requirements are those imposed upon businesses and their operations either by law, regulation, policy, or standards and guidelines. These requirements are specific either to the locality in which the company or application is based or to the specific nature of the data and transactions conducted.

Certified Cloud Security Professional – CCSP – Question157

Which European Union directive pertains to personal data privacy and an individual's control over their personal data?

A.
99/9/EC
B. 95/46/EC
C. 2000/1/EC
D. 2013/27001/EC

Correct Answer: B

Explanation:

Explanation: Directive 95/46/EC is titled “On the protection of individuals with regard to the processing of personal data and on the free movement of such data.”

Certified Cloud Security Professional – CCSP – Question155

What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?

A.
Anonymization
B. Tokenization
C. Masking
D. Obfuscation

Correct Answer: A

Explanation:

Explanation: With data anonymization, data is manipulated in such a way so as to prevent the identification of an individual through various data objects, and is often used in conjunction with other concepts such as masking.

Certified Cloud Security Professional – CCSP – Question154

Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?

A.
Delete
B. Modify
C. Read
D. Print

Correct Answer: D

Explanation:

Explanation: IRM allows an organization to control who can print a set of information. This is not be possible under traditional file system controls, where if a user can read a file, they are able to print it as well.

Certified Cloud Security Professional – CCSP – Question153

Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?

A.
Availability
B. Interoperability
C. Reversibility
D. Portability

Correct Answer: B

Explanation:

Explanation: Interoperability is the ease with which one can move or reuse components of an application or service. This is maximized when services are designed without specific dependencies on underlying platforms, operating systems, locations, or cloud providers.