Certified Cloud Security Professional – CCSP – Question042

Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?

A.
A Type 2 hypervisor runs on top of another operating system and is dependent on the security of the OS for its own security.
B. A Type 2 hypervisor allows users to directly perform some functions with their own access.
C. A Type 2 hypervisor is open source, so attackers can more easily find exploitable vulnerabilities with that access.
D. A Type 2 hypervisor is always exposed to the public Internet for federated identity access.

Correct Answer: A

Explanation:

Explanation: A Type 2 hypervisor differs from a Type 1 hypervisor in that it runs on top of another operating system rather than directly tied into the underlying hardware of the virtual host servers. With this type of implementation, additional security and architecture concerns come into play because the interaction between the operating system and the hypervisor becomes a critical link. The hypervisor no longer has direct interaction and control over the underlying hardware, which means that some performance will be lost due to the operating system in the middle needing its own resources, patching requirements, and operational oversight.

Certified Cloud Security Professional – CCSP – Question041

Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?

A.
Hybrid
B. Public
C. Private
D. Community

Correct Answer: B

Explanation:

Explanation: Popular services such as iCloud, Dropbox, and OneDrive are all publicly available and are open to any user for free, with possible add-on services offered for a cost.

Certified Cloud Security Professional – CCSP – Question040

Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?

A.
SATA
B. iSCSI
C. TLS
D. SCSI

Correct Answer: B

Explanation:

Explanation: iSCSI is a protocol that allows for the transmission and use of SCSI commands and features over a TCP-based network. iSCSI allows systems to use block-level storage that looks and behaves as a SAN would with physical servers, but to leverage the TCP network within a virtualized environment and cloud.

Certified Cloud Security Professional – CCSP – Question039

Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?

A.
Cloud service business manager
B. Cloud service deployment manager
C. Cloud service operations manager
D. Cloud service manager

Correct Answer: C

Explanation:

Explanation: The cloud service operations manager is responsible for preparing systems for the cloud, administering and monitoring services, providing audit data as requested or required, and managing inventory and assets.

Certified Cloud Security Professional – CCSP – Question037

What is the primary reason that makes resolving jurisdictional conflicts complicated?

A.
Different technology standards
B. Costs
C. Language barriers
D. Lack of international authority

Correct Answer: D

Explanation:

Explanation: With international operations, systems ultimately cross many jurisdictional boundaries, and many times, they conflict with each other. The major hurdle to overcome for an organization is the lack of an ultimate international authority to mediate such conflicts, with a likely result of legal efforts in each jurisdiction.

Certified Cloud Security Professional – CCSP – Question036

Which of the following roles involves the provisioning and delivery of cloud services?

A.
Cloud service deployment manager
B. Cloud service business manager
C. Cloud service manager
D. Cloud service operations manager

Correct Answer: C

Explanation:

Explanation: The cloud service manager is responsible for the delivery of cloud services, the provisioning of cloud services, and the overall management of cloud services.

Certified Cloud Security Professional – CCSP – Question035

Which term relates to the application of scientific methods and practices to evidence?

A.
Forensics
B. Methodical
C. Theoretical
D. Measured

Correct Answer: A

Explanation:

Explanation: Forensics is the application of scientific and methodical processes to identify, collect, preserve, analyze, and summarize/ report digital information and evidence.

Certified Cloud Security Professional – CCSP – Question034

Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?

A.
Inter-cloud provider
B. Cloud service broker
C. Cloud auditor
D. Cloud service developer

Correct Answer: B

Explanation:

Explanation: The cloud service broker is responsible for obtaining new customers, analyzing the marketplace, and securing contracts and agreements.

Certified Cloud Security Professional – CCSP – Question033

Which of the following attempts to establish an international standard for eDiscovery processes and best practices?

A.
ISO/IEC 31000
B. ISO/IEC 27050
C. ISO/IEC 19888
D. ISO/IEC 27001

Correct Answer: B

Explanation:

Explanation: ISO/IEC 27050 strives to establish an internationally accepted standard for eDiscovery processes and best practices. It encompasses all steps of the eDiscovery process: identification, preservation, collection, processing, review, analysis, and the final production of the requested data.