Certified Cloud Security Professional – CCSP – Question131

Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?

A.
Community
B. Public
C. Hybrid
D. Private

Correct Answer: C

Explanation:

Explanation: A hybrid cloud model involves the use of more than one type of cloud hosting models, typically the mix of private and public cloud hosting models.

Certified Cloud Security Professional – CCSP – Question130

Which of the following is NOT a factor that is part of a firewall configuration?

A.
Encryption
B. Port
C. Protocol
D. Source IP

Correct Answer: A

Explanation:

Explanation: Firewalls take into account source IP, destination IP, the port the traffic is using, as well as the network protocol (UDP/TCP). Whether or not the traffic is encrypted is not something a firewall is concerned with.

Certified Cloud Security Professional – CCSP – Question129

Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?

A.
Platform
B. Data
C. Physical environment
D. Infrastructure

Correct Answer: C

Explanation:

Explanation:
Regardless of which cloud-hosting model is used, the cloud provider always has sole responsibility for the physical environment.

Certified Cloud Security Professional – CCSP – Question128

Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?

A.
Sandboxing
B. Encryption
C. Firewalls
D. Access control

Correct Answer: B

Explanation:

Explanation: In any environment, data encryption is incredibly important to prevent unauthorized exposure of data either internally or externally. If a system is compromised by an attack, having the data encrypted on the system will prevent its unauthorized exposure or export, even with the system itself being exposed.

Certified Cloud Security Professional – CCSP – Question126

Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?

A.
Integrity
B. Availability
C. Confidentiality
D. Nonrepudiation

Correct Answer: C

Explanation:

Explanation: The main goal of confidentiality is to ensure that sensitive information is not made available or leaked to parties that should not have access to it, while at the same time ensuring that those with appropriate need and authorization to access it can do so in a manner commensurate with their needs and confidentiality requirements.

Certified Cloud Security Professional – CCSP – Question124

What changes are necessary to application code in order to implement DNSSEC?

A.
Adding encryption modules
B. Implementing certificate validations
C. Additional DNS lookups
D. No changes are needed.

Correct Answer: D

Explanation:

Explanation: To implement DNSSEC, no additional changes are needed to applications or their code because the integrity checks are all performed at the system level.

Certified Cloud Security Professional – CCSP – Question123

Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?

A.
Six months
B. One month
C. One year
D. One week

Correct Answer: A

Explanation:

Explanation: SOC Type 2 reports are focused on the same policies and procedures, as well as their effectiveness, as SOC Type 1 reports, but are evaluated over a period of at least six consecutive months, rather than a finite point in time.