Certified Cloud Security Professional – CCSP – Question442

Data labels could include all the following, except:

A.
Distribution limitations
B. Multifactor authentication
C. Confidentiality level
D. Access restrictions

Correct Answer: B

Explanation:

Explanation: All the others might be included in data labels, but multifactor authentication is a procedure used for access control, not a label.

Certified Cloud Security Professional – CCSP – Question441

Best practices for key management include all of the following, except:

A.
Ensure multifactor authentication
B. Pass keys out of band
C. Have key recovery processes
D. Maintain key security

Correct Answer: A

Explanation:

Explanation: We should do all of these except for requiring multifactor authentication, which is pointless in key management.

Certified Cloud Security Professional – CCSP – Question440

Tokenization requires two distinct _________________ .

A.
Personnel
B. Authentication factors
C. Encryption keys
D. Databases

Correct Answer: D

Explanation:

Explanation: In order to implement tokenization, there will need to be two databases: the database containing the raw, original data, and the token database containing tokens that map to original data. Having two-factor authentication is nice, but certainly not required. Encryption keys are not necessary for tokenization. Two-person integrity does not have anything to do with tokenization.

Certified Cloud Security Professional – CCSP – Question439

Cryptographic keys for encrypted data stored in the cloud should be ________________ .

A.
Not stored with the cloud provider.
B. Generated with redundancy
C. At least 128 bits long
D. Split into groups

Correct Answer: A

Explanation:

Explanation: Cryptographic keys should not be stored along with the data they secure, regardless of key length. We don’t split crypto keys or generate redundant keys (doing so would violate the principle of secrecy necessary for keys to serve their purpose).

Certified Cloud Security Professional – CCSP – Question438

Data masking can be used to provide all of the following functionality, except:

A.
Test data in sandboxed environments
B. Authentication of privileged users
C. Enforcing least privilege
D. Secure remote access

Correct Answer: B

Explanation:

Explanation: Data masking does not support authentication in any way. All the others are excellent use cases for data masking.

Certified Cloud Security Professional – CCSP – Question437

The goals of SIEM solution implementation include all of the following, except:

A.
Dashboarding
B. Performance enhancement
C. Trend analysis
D. Centralization of log streams

Correct Answer: B

Explanation:

Explanation: SIEM does not intend to provide any enhancement of performance; in fact, a SIEM solution may decrease performance because of additional overhead. All the rest are goals of SIEM implementations.

Certified Cloud Security Professional – CCSP – Question436

DLP can be combined with what other security technology to enhance data controls?

A.
SIEM
B. Hypervisors
C. DRM
D. Kerberos

Correct Answer: C

Explanation:

Explanation: DLP can be combined with DRM to protect intellectual property; both are designed to deal with data that falls into special categories. SIEMs are used for monitoring event logs, not live data movement. Kerberos is an authentication mechanism. Hypervisors are used for virtualization.

Certified Cloud Security Professional – CCSP – Question435

DLP solutions can aid in deterring loss due to which of the following?

A.
Device failure
B. Randomization
C. Inadvertent disclosure
D. Natural disaster

Correct Answer: C

Explanation:

Explanation: DLP solutions may protect against inadvertent disclosure. Randomization is a technique for obscuring data, not a risk to data. DLP tools will not protect against risks from natural disasters, or against impacts due to device failure.

Certified Cloud Security Professional – CCSP – Question433

What are the U.S. State Department controls on technology exports known as?

A.
DRM
B. ITAR
C. EAR
D. EAL

Correct Answer: B

Explanation:

Explanation: ITAR is a Department of State program. Evaluation assurance levels are part of the Common Criteria standard from ISO. Digital rights management tools are used for protecting electronic processing of intellectual property.