Certified Cloud Security Professional – CCSP – Question462

Because of multitenancy, specific risks in the public cloud that don’t exist in the other cloud service models include all the following except:

A.
DoS/DDoS
B. Information bleed
C. Risk of loss/disclosure due to legal seizures
D. Escalation of privilege

Correct Answer: A

Explanation:

Explanation: DoS/DDoS threats and risks are not unique to the public cloud model.

Certified Cloud Security Professional – CCSP – Question461

Each of the following are dependencies that must be considered when reviewing the BIA after cloud migration except:

A.
The cloud provider’s utilities
B. The cloud provider’s suppliers
C. The cloud provider’s resellers
D. The cloud provider’s vendors

Correct Answer: C

Explanation:

Explanation: The cloud provider’s resellers are a marketing and sales mechanism, not an operational dependency that could affect the security of a cloud customer.

Certified Cloud Security Professional – CCSP – Question460

Countermeasures for protecting cloud operations against internal threats include all of the following except:

A.
Extensive and comprehensive training programs, including initial, recurring, and refresher sessions
B. Skills and knowledge testing
C. Hardened perimeter devices
D. Aggressive background checks

Correct Answer: C

Explanation:

Explanation: Hardened perimeter devices are more useful at attenuating the risk of external attack.

Certified Cloud Security Professional – CCSP – Question459

User access to the cloud environment can be administered in all of the following ways except:

A.
Provider provides administration on behalf the customer
B. Customer directly administers access
C. Third party provides administration on behalf of the customer
D. Customer provides administration on behalf of the provider

Correct Answer: D

Explanation:

Explanation: The customer does not administer on behalf of the provider. All the rest are possible options.

Certified Cloud Security Professional – CCSP – Question458

Countermeasures for protecting cloud operations against external attackers include all of the following except:

A.
Continual monitoring for anomalous activity.
B. Detailed and extensive background checks.
C. Regular and detailed configuration/change management activities
D. Hardened devices and systems, including servers, hosts, hypervisors, and virtual machines.

Correct Answer: B

Explanation:

Explanation: Background checks are controls for attenuating potential threats from internal actors; external threats aren’t likely to submit to background checks.

Certified Cloud Security Professional – CCSP – Question457

The cloud customer will have the most control of their data and systems, and the cloud provider will have the least amount of responsibility, in which cloud computing arrangement?

A.
IaaS
B. SaaS
C. Community cloud
D. PaaS

Correct Answer: A

Explanation:

Explanation: IaaS entails the cloud customer installing and maintaining the OS, programs, and data; PaaS has the customer installing programs and data; in SaaS, the customer only uploads data. In a community cloud, data and device owners are distributed.

Certified Cloud Security Professional – CCSP – Question455

What is the term we use to describe the general ease and efficiency of moving data from one cloud provider either to another cloud provider or down from the cloud?

A.
Obfuscation
B. Elasticity
C. Mobility
D. Portability

Correct Answer: D

Explanation:

Explanation: Elasticity is the name for the benefit of cloud computing where resources can be apportioned as necessary to meet customer demand. Obfuscation is a technique to hide full raw datasets, either from personnel who do not have need to know or for use in testing. Mobility is not a term pertinent to the CBK.

Certified Cloud Security Professional – CCSP – Question454

When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:

A.
Many states have data breach notification laws.
B. Breaches can cause the loss of proprietary data.
C. Breaches can cause the loss of intellectual property.
D. Legal liability can’t be transferred to the cloud provider.

Correct Answer: D

Explanation:

Explanation: State notification laws and the loss of proprietary data/intellectual property pre-existed the cloud; only the lack of ability to transfer liability is new.

Certified Cloud Security Professional – CCSP – Question453

Which kind of SSAE audit report is most beneficial for a cloud customer, even though it’s unlikely the cloud provider will share it?

A.
SOC 3
B. SOC 1 Type 2
C. SOC 2 Type 2
D. SOC 1 Type 1

Correct Answer: C

Explanation:

Explanation: The SOC 3 is the least detailed, so the provider is not concerned about revealing it. The SOC 1 Types 1 and 2 are about financial reporting and not relevant. The SOC 2 Type 2 is much more detailed and will most likely be kept closely held by the provider.