Certified Cloud Security Professional – CCSP – Question481

In addition to battery backup, a UPS can offer which capability?

A.
Breach alert
B. Confidentiality
C. Communication redundancy
D. Line conditioning

Correct Answer: D

Explanation:

Explanation: A UPS can provide line conditioning, adjusting power so that it is optimized for the devices it serves and smoothing any power fluctuations; it does not offer any of the other listed functions.

Certified Cloud Security Professional – CCSP – Question480

A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?

A.
UPS
B. Generators
C. Joint operating agreements
D. Strict adherence to applicable regulations

Correct Answer: C

Explanation:

Explanation: Joint operating agreements can provide nearby relocation sites so that a disruption limited to the organization’s own facility
and campus can be addressed at a different facility and campus. UPS and generators are not limited to serving needs for localized causes. Regulations do not promote cost savings and are not often the immediate concern during BC/DR activities.

Certified Cloud Security Professional – CCSP – Question479

Which of the following best describes a sandbox?

A.
An isolated space where untested code and experimentation can safely occur separate from the production environment.
B. A space where you can safely execute malicious code to see what it does.
C. An isolated space where transactions are protected from malicious software
D. An isolated space where untested code and experimentation can safely occur within the production environment.

Correct Answer: A

Explanation:

Explanation: Options C and B are also correct, but A is more general and incorporates them both. D is incorrect, because sandboxing does not take place in the production environment.

Certified Cloud Security Professional – CCSP – Question478

Which of the following best describes data masking?

A.
A method for creating similar but inauthentic datasets used for software testing and user training.
B. A method used to protect prying eyes from data such as social security numbers and credit card data.
C. A method where the last few numbers in a dataset are not obscured. These are often used for authentication.
D. Data masking involves stripping out all digits in a string of numbers so as to obscure the original number.

Correct Answer: A

Explanation:

Explanation: All of these answers are actually correct, but A is the best answer, because it is the most general, includes the others, and is therefore the optimum choice. This is a good example of the type of question that can appear on the actual exam.

Certified Cloud Security Professional – CCSP – Question477

APIs are defined as which of the following?

A.
A set of protocols, and tools for building software applications to access a web-based software application or tool
B. A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or tool
C. A set of standards for building software applications to access a web-based software application or tool
D. A set of routines and tools for building software applications to access web-based software applications

Correct Answer: B

Explanation:

Explanation: All the answers are true, but B is the most complete.

Certified Cloud Security Professional – CCSP – Question476

Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:

A.
Ransomware
B. Syn floods
C. XSS and SQL injection
D. Password cracking

Correct Answer: C

Explanation:

Explanation: WAFs detect how the application interacts with the environment, so they are optimal for detecting and refuting things like SQL injection and XSS. Password cracking, syn floods, and ransomware usually aren’t taking place in the same way as injection and XSS, and they are better addressed with controls at the router and through the use of HIDS, NIDS, and antimalware tools.

Certified Cloud Security Professional – CCSP – Question475

Which of the following best describes SAML?

A.
A standard used for directory synchronization
B. A standard for developing secure application management logistics
C. A standard for exchanging usernames and passwords across devices.
D. A standards for exchanging authentication and authorization data between security domains.

Correct Answer: D

Certified Cloud Security Professional – CCSP – Question474

Which of the following best describes the purpose and scope of ISO/IEC 27034-1?

A.
Describes international privacy standards for cloud computing
B. Serves as a newer replacement for NIST 800-52 r4
C. Provides on overview of network and infrastructure security designed to secure cloud applications.
D. Provides an overview of application security that introduces definitive concepts, principles, and processes involved in application security.

Correct Answer: D