Certified Cloud Security Professional – CCSP – Question032

Which of the following APIs are most commonly used within a cloud environment?

A.
REST and SAML
B. SOAP and REST
C. REST and XML
D. XML and SAML

Correct Answer: B

Explanation:

Explanation: Simple Object Access Protocol (SOAP) and Representational State Transfer (REST) are the most commonly used APIs within a cloud environment. Extensible Markup Language (XML) and Security Assertion Markup Language (SAML) are both standards for exchanging encoded data between two parties, with XML being for more general use and SAML focused on authentication and authorization data.

Certified Cloud Security Professional – CCSP – Question031

Which aspect of cloud computing will be most negatively impacted by vendor lock-in?

A.
Elasticity
B. Reversibility
C. Interoperability
D. Portability

Correct Answer: D

Explanation:

Explanation: A cloud customer utilizing proprietary APIs or services from one cloud provider that are unlikely to be available from another cloud provider will most negatively impact portability.

Certified Cloud Security Professional – CCSP – Question030

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

A.
Dedicated switches
B. Trust zones
C. Redundant network circuits
D. Direct connections

Correct Answer: B

Explanation:

Explanation: Trust zones can be implemented to separate systems or tiers along logical lines for great security and access controls. Each zone can then have its own security controls and monitoring based on its particular needs.

Certified Cloud Security Professional – CCSP – Question029

What is the biggest benefit to leasing space in a data center versus building or maintain your own?

A.
Certification
B. Costs
C. Regulation
D. Control

Correct Answer: B

Explanation:

Explanation: When leasing space in a data center, an organization can avoid the enormous startup and building costs associated with a data center, and can instead leverage economies of scale by grouping with other organizations and sharing costs.

Certified Cloud Security Professional – CCSP – Question028

Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?

A.
GLBA
B. HIPAA
C. Safe Harbor
D. SOX

Correct Answer: C

Explanation:

Explanation: Due to the lack of an adequate privacy law or protection at the federal level in the United States, European privacy regulations generally prohibit the exporting or sharing of PII from Europe with the United States. Participation in the Safe Harbor program is voluntary on behalf of an organization, but it does require them to conform to specific requirements and policies that mirror those from the EU. Thus, organizations can fulfill requirements for data sharing and export and possibly serve customers in the EU.

Certified Cloud Security Professional – CCSP – Question027

Which protocol does the REST API depend on?

A.
HTTP
B. XML
C. SAML
D. SSH

Correct Answer: A

Explanation:

Explanation: Representational State Transfer (REST) is a software architectural scheme that applies the components, connectors, and data conduits for many web applications used on the Internet. It uses and relies on the HTTP protocol and supports a variety of data formats.

Certified Cloud Security Professional – CCSP – Question026

Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?

A.
Cloud service manager
B. Cloud service deployment
C. Cloud service business manager
D. Cloud service operations manager

Correct Answer: C

Explanation:

Explanation: The cloud service business manager is responsible for overseeing business plans and customer relationships as well as processing financial transactions.

Certified Cloud Security Professional – CCSP – Question025

Which of the following storage types is most closely associated with a database-type storage implementation?

A.
Object
B. Unstructured
C. Volume
D. Structured

Correct Answer: D

Explanation:

Explanation: Structured storage involves organized and categorized data, which most closely resembles and operates like a database system would.

Certified Cloud Security Professional – CCSP – Question024

What type of masking strategy involves making a separate and distinct copy of data with masking in place?

A.
Dynamic
B. Replication
C. Static
D. Duplication

Correct Answer: C

Explanation:

Explanation: With static masking, a separate and distinct copy of the data set is created with masking in place. This is typically done through a script or other process that takes a standard data set, processes it to mask the appropriate and predefined fields, and then outputs the data set as a new one with the completed masking done.

Certified Cloud Security Professional – CCSP – Question023

Which United States law is focused on accounting and financial practices of organizations?

A.
Safe Harbor
B. GLBA
C. SOX
D. HIPAA

Correct Answer: C

Explanation:

Explanation: The Sarbanes-Oxley (SOX) Act is not an act that pertains to privacy or IT security directly, but rather regulates accounting and financial practices used by organizations. It was passed to protect stakeholders and shareholders from improper practices and errors, and it sets forth rules for compliance, regulated and enforced by the Securities and Exchange Commission (SEC). The main influence on IT systems and operations is the requirements it sets for data retention, specifically in regard to what types of records must be preserved and for how long.