Certified Cloud Security Professional – CCSP – Question102

Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?

A.
RSL
B. RPO
C. SRE
D. RTO

Correct Answer: D

Explanation:

Explanation: The recovery time objective (RTO) is a measure of the amount of time it would take to recover operations in the event of a disaster to the point where management’s objectives are met for BCDR.

Certified Cloud Security Professional – CCSP – Question100

What type of PII is controlled based on laws and carries legal penalties for noncompliance with requirements?

A.
Contractual
B. Regulated
C. Specific
D. Jurisdictional

Correct Answer: B

Explanation:

Explanation: Regulated PII involves those requirements put forth by specific laws or regulations, and unlike contractual PII, where a violation can lead to contractual penalties, a violation of regulated PII can lead to fines or even criminal charges in some jurisdictions. PII regulations can depend on either the jurisdiction that applies to the hosting location or application or specific legislation based on the industry or type of data used.

Certified Cloud Security Professional – CCSP – Question099

What expectation of data custodians is made much more challenging by a cloud implementation, especially with PaaS or SaaS?

A.
Data classification
B. Knowledge of systems
C. Access to data
D. Encryption requirements

Correct Answer: B

Explanation:

Explanation: Under the Federal Rules of Civil Procedure, data custodians are assumed and expected to have full and comprehensive knowledge of the internal design and architecture of their systems. In a cloud environment, especially with PaaS and SaaS, it is impossible for the data custodian to have this knowledge because those systems are controlled by the cloud provider and protected as proprietary knowledge.

Certified Cloud Security Professional – CCSP – Question098

Which technique involves replacing values within a specific data field to protect sensitive data?

A.
Anonymization
B. Masking
C. Tokenization
D. Obfuscation

Correct Answer: B

Explanation:

Explanation: Masking involves replacing specific data within a data set with new values. For example, with credit card fields, as most who have ever purchased anything online can attest, nearly the entire credit card number is masked with a character such as an asterisk, with the last four digits left visible for identification and confirmation.

Certified Cloud Security Professional – CCSP – Question097

Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?

A.
Cloud service business manager
B. Cloud service user
C. Cloud service administrator
D. Cloud service integrator

Correct Answer: D

Explanation:

Explanation: The cloud service integrator is the official role that involves connecting and integrating existing systems and services with a cloud environment. This may involve moving services into a cloud environment, or connecting to external cloud services and capabilities from traditional data center-hosted services.

Certified Cloud Security Professional – CCSP – Question096

Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?

A.
NFPA
B. BICSI
C. IDCA
D. Uptime Institute

Correct Answer: A

Explanation:

Explanation: The standards put out by the National Fire Protection Association (NFPA) cover general fire protection best practices for any type of facility, but also specific publications pertaining to IT equipment and data centers.

Certified Cloud Security Professional – CCSP – Question095

Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

A.
Resource pooling
B. Virtualization
C. Multitenancy
D. Regulation

Correct Answer: C

Explanation:

Explanation: With cloud providers hosting a number of different customers, it would be impractical for them to pursue additional certifications based on the needs of a specific customer. Cloud environments are built to a common denominator to serve the greatest number of customers, and especially within a public cloud model, it is not possible or practical for a cloud provider to alter their services for specific customer demands.

Certified Cloud Security Professional – CCSP – Question094

From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?

A.
Notification
B. Key identification
C. Data collection
D. Virtual image snapshots

Correct Answer: A

Explanation:

Explanation: The contract should include requirements for notification by the cloud provider to the cloud customer upon the receipt of such an order. This serves a few important purposes. First, it keeps communication and trust open between the cloud provider and cloud customers. Second, and more importantly, it allows the cloud customer to potentially challenge the order if they feel they have the grounds or desire to do so.

Certified Cloud Security Professional – CCSP – Question093

What does SDN stand for within a cloud environment?

A.
Software-dynamic networking
B. Software-defined networking
C. Software-dependent networking
D. System-dynamic nodes

Correct Answer: B

Explanation:

Explanation: Software-defined networking separates the administration of network filtering and network forwarding to allow for distributed administration.