Certified Cloud Security Professional – CCSP – Question112

Which of the following is the MOST important requirement and guidance for testing during an audit?

A.
Stakeholders
B. Shareholders
C. Management
D. Regulations

Correct Answer: D

Explanation:

Explanation: During any audit, regulations are the most important factor and guidelines for what must be tested. Although the requirements from management, stakeholders, and shareholders are also important, regulations are not negotiable and pose the biggest risk to any organization for compliance failure.

Certified Cloud Security Professional – CCSP – Question111

Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?

A.
CPU
B. Users
C. Memory
D. Network

Correct Answer: B

Explanation:

Explanation: An SLA requires performance monitoring of CPU, memory, storage, and networking. The number of users active on a system
would not be part of an SLA specifically, other than in regard to the impact on the other four variables.

Certified Cloud Security Professional – CCSP – Question110

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?

A.
2010
B. 2000
C. 1995
D. 1990

Correct Answer: C

Explanation:

Explanation: Adopted in 1995, Directive 95/46 EC establishes strong data protection and policy requirements, including the declaring of data privacy to be a human right. It establishes that an individual has the right to be notified when their personal data is being access or processed, that it only will ever be accessed for legitimate purposes, and that data will only be accessed to the exact extent it needs to be for the particular process or request.

Certified Cloud Security Professional – CCSP – Question109

What is the concept of segregating information or processes, within the same system or application, for security reasons?

A.
fencing
B. Sandboxing
C. Cellblocking
D. Pooling

Correct Answer: B

Explanation:

Explanation: Sandboxing involves segregating and isolating information or processes from others within the same system or application, typically for security concerns. This is generally used for data isolation (for example, keeping different communities and populations of users isolated from other similar data).

Certified Cloud Security Professional – CCSP – Question108

Which type of audit report is considered a "restricted use" report for its intended audience?

A.
SAS-70
B. SSAE-16
C. SOC Type 1
D. SOC Type 2

Correct Answer: C

Explanation:

Explanation: SOC Type 1 reports are considered “restricted use” reports. They are intended for management and stakeholders of an organization, clients of the service organization, and auditors of the organization. They are not intended for release beyond those audiences.

Certified Cloud Security Professional – CCSP – Question107

Which of the cloud cross-cutting aspects relates to the ability to easily move services and applications between different cloud providers?

A.
Reversibility
B. Availability
C. Portability
D. Interoperability

Correct Answer: C

Explanation:

Explanation: Portability is the ease with which a service or application can be moved between different cloud providers. Maintaining portability gives an organization great flexibility between cloud providers and the ability to shop for better deals or offerings.

Certified Cloud Security Professional – CCSP – Question106

Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?

A.
Russia
B. France
C. Germany
D. United States

Correct Answer: A

Explanation:

Explanation: Signed into law and effective starting on September 1, 2015, Russian Law 526-FZ establishes that any collecting, storing, or processing of personal information or data on Russian citizens must be done from systems and databases that are physically located with the Russian Federation.

Certified Cloud Security Professional – CCSP – Question105

What is a standard configuration and policy set that is applied to systems and virtual machines called?

A.
Standardization
B. Baseline
C. Hardening
D. Redline

Correct Answer: B

Explanation:

Explanation: The most common and efficient manner of securing operating systems is through the use of baselines. A baseline is a standardized and understood set of base configurations and settings. When a new system is built or a new virtual machine is established, baselines will be applied to a new image to ensure the base configuration meets organizational policy and regulatory requirements.

Certified Cloud Security Professional – CCSP – Question104

What provides the information to an application to make decisions about the authorization level appropriate when granting access?

A.
User
B. Relying party
C. Federation
D. Identity Provider

Correct Answer: D

Explanation:

Explanation: Upon successful user authentication, the identity provider gives information about the user to the relying party that it needs to make authorization decisions for granting access as well as the level of access needed.

Certified Cloud Security Professional – CCSP – Question103

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

A.
Community
B. Hybrid
C. Private
D. Public

Correct Answer: A

Explanation:

Explanation: A community cloud model is where customers that share a certain common bond or group membership come together to offer cloud services to their members, focused on common goals and interests.