Certified Cloud Security Professional – CCSP – Question142

Which security concept would business continuity and disaster recovery fall under?

A.
Confidentiality
B. Availability
C. Fault tolerance
D. Integrity

Correct Answer: B

Explanation:

Explanation: Disaster recovery and business continuity are vital concerns with availability. If data is destroyed or compromised, having regular backup systems in place as well as being able to perform disaster recovery in the event of a major or widespread problem allows operations to continue with an acceptable loss of time and data to management. This also ensures that sensitive data is protected and persisted in the event of the loss or corruption of data systems or physical storage systems.

Certified Cloud Security Professional – CCSP – Question141

Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?

A.
Virtualization
B. Multitenancy
C. Resource pooling
D. Dynamic optimization

Correct Answer: A

Explanation:

Explanation: Cloud environments will regularly change virtual machines as patching and versions are changed. Unlike a physical environment, there is little continuity from one period of time to another. It is very unlikely that the same virtual machines would be in use during a repeat audit.

Certified Cloud Security Professional – CCSP – Question139

Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?

A.
Service-level agreements
B. Governance
C. Regulatory requirements
D. Auditability

Correct Answer: B

Explanation:

Explanation: Governance at its core is the idea of assigning jobs, takes, roles, and responsibilities and ensuring they are satisfactory performed.

Certified Cloud Security Professional – CCSP – Question138

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?

A.
Functionality
B. Programming languages
C. Software platform
D. Security requirements

Correct Answer: D

Explanation:

Explanation: Security requirements should be incorporated into the software development lifecycle (SDLC) from the earliest requirement gathering stage and should be incorporated prior to the requirement analysis phase.

Certified Cloud Security Professional – CCSP – Question137

Which crucial aspect of cloud computing can be most threatened by insecure APIs?

A.
Automation
B. Redundancy
C. Resource pooling
D. Elasticity

Correct Answer: A

Explanation:

Explanation: Cloud environments depend heavily on API calls for management and automation. Any vulnerability with the APIs can cause
significant risk and exposure to all tenants of the cloud environment.

Certified Cloud Security Professional – CCSP – Question136

What is the biggest challenge to data discovery in a cloud environment?

A.
Format
B. Ownership
C. Location
D. Multitenancy

Correct Answer: C

Explanation:

Explanation: With the distributed nature of cloud environments, the foremost challenge for data discovery is awareness of the location of data and keeping track of it during the constant motion of cloud storage systems.

Certified Cloud Security Professional – CCSP – Question135

Which of the following would be a reason to undertake a BCDR test?

A.
Functional change of the application
B. Change in staff
C. User interface overhaul of the application
D. Change in regulations

Correct Answer: A

Explanation:

Explanation: Any time a major functional change of an application occurs, a new BCDR test should be done to ensure the overall strategy and process are still applicable and appropriate.

Certified Cloud Security Professional – CCSP – Question134

What concept does the "T" represent in the STRIDE threat model?

A.
TLS
B. Testing
C. Tampering with data
D. Transport

Correct Answer: C

Explanation:

Explanation Any application that sends data to the user will face the potential that the user could manipulate or alter the data, whether it resides in cookies, GET or POST commands, or headers, or manipulates client-side validations. If the user receives data from the application, it is crucial that the application validate and verify any data that is received back from the user.

Certified Cloud Security Professional – CCSP – Question133

Which aspect of cloud computing makes data classification even more vital than in a traditional data center?

A.
Interoperability
B. Virtualization
C. Multitenancy
D. Portability

Correct Answer: C

Explanation:

Explanation: With multiple tenants within the same hosting environment, any failure to properly classify data may lead to potential exposure to other customers and applications within the same environment.