Certified Cloud Security Professional – CCSP – Question012

Which of the following cloud aspects complicates eDiscovery?

A.
Resource pooling
B. On-demand self-service
C. Multitenancy
D. Measured service

Correct Answer: C

Explanation:

Explanation: With multitenancy, eDiscovery becomes more complicated because the data collection involves extra steps to ensure that only those customers or systems that are within scope are turned over to the requesting authority.

Certified Cloud Security Professional – CCSP – Question011

Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?

A.
Cryptographic erasure
B. Zeroing
C. Overwriting
D. Deletion

Correct Answer: D

Explanation:

Explanation: Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.

Certified Cloud Security Professional – CCSP – Question010

What is the biggest concern with hosting a key management system outside of the cloud environment?

A.
Confidentiality
B. Portability
C. Availability
D. Integrity

Correct Answer: C

Explanation:

Explanation: When a key management system is outside of the cloud environment hosting the application, availability is a primary concern because any access issues with the encryption keys will render the entire application unusable.

Certified Cloud Security Professional – CCSP – Question009

Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?

A.
Cloud service user
B. Cloud service business manager
C. Cloud service administrator
D. Cloud service integrator

Correct Answer: B

Explanation:

Explanation: The cloud service business manager is responsible for overseeing business and billing administration, purchasing cloud services, and requesting audit reports when necessary

Certified Cloud Security Professional – CCSP – Question008

Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?

A.
Injection
B. Missing function-level access control
C. Cross-site request forgery
D. Cross-site scripting

Correct Answer: B

Explanation:

Explanation: It is imperative that an application perform checks when each function or portion of the application is accessed, to ensure that the user is properly authorized to access it. Without continual checks each time a function is accessed, an attacker could forge requests to access portions of the application where authorization has not been granted.

Certified Cloud Security Professional – CCSP – Question007

Which data formats are most commonly used with the REST API?

A.
JSON and SAML
B. XML and SAML
C. XML and JSON
D. SAML and HTML

Correct Answer: C

Explanation:

Explanation: JavaScript Object Notation (JSON) and Extensible Markup Language (XML) are the most commonly used data formats for the Representational State Transfer (REST) API, and are typically implemented with caching for increased scalability and performance.

Certified Cloud Security Professional – CCSP – Question005

Which of the following roles involves testing, monitoring, and securing cloud services for an organization?

A.
Cloud service integrator
B. Cloud service business manager
C. Cloud service user
D. Cloud service administrator

Correct Answer: D

Explanation:

Explanation: The cloud service administrator is responsible for testing cloud services, monitoring services, administering security for services, providing usage reports on cloud services, and addressing problem reports

Certified Cloud Security Professional – CCSP – Question004

Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?

A.
Consumable service
B. Measured service
C. Billable service
D. Metered service

Correct Answer: B

Explanation:

Explanation: Measured service is where cloud services are delivered and billed in a metered way, where the cloud customer only pays for those that they actually use, and for the duration of time that they use them.