Certified Cloud Security Professional – CCSP – Question431

DLP solutions can aid in deterring loss due to which of the following?

A.
Power failure
B. Performance
C. Bad policy
D. Malicious disclosure

Correct Answer: D

Explanation:

Explanation: DLP tools can identify outbound traffic that violates the organization’s policies. DLP will not protect against losses due to performance issues or power failures. The DLP solution must be configured according to the organization’s policies, so bad policies will attenuate the effectiveness of DLP tools, not the other way around.

Certified Cloud Security Professional – CCSP – Question430

All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except:

A.
Tokenization
B. Masking
C. Data discovery
D. Obfuscation

Correct Answer: C

Explanation:

Explanation: Data discovery is a term used to describe the process of identifying information according to specific traits or categories. The rest are all methods for obscuring data.

Certified Cloud Security Professional – CCSP – Question429

Data masking can be used to provide all of the following functionality, except:

A.
Secure remote access
B. test data in sandboxed environments
C. Authentication of privileged users
D. Enforcing least privilege

Correct Answer: C

Explanation:

Explanation: Data masking does not support authentication in any way. All the others are excellent use cases for data masking.

Certified Cloud Security Professional – CCSP – Question428

The goals of SIEM solution implementation include all of the following, except:

A.
Dashboarding
B. Performance enhancement
C. Trend analysis
D. Centralization of log streams

Correct Answer: B

Explanation:

Explanation: SIEM does not intend to provide any enhancement of performance; in fact, a SIEM solution may decrease performance because of additional overhead. All the rest are goals of SIEM implementations.

Certified Cloud Security Professional – CCSP – Question426

In the cloud motif, the data processor is usually:

A.
The cloud customer
B. The cloud provider
C. The cloud access security broker
D. The party that assigns access rights

Correct Answer: B

Explanation:

Explanation: In legal terms, when “data processor” is defined, it refers to anyone who stores, handles, moves, or manipulates data on behalf of the data owner or controller. In the cloud computing realm, this is the cloud provider.

Certified Cloud Security Professional – CCSP – Question425

The most pragmatic option for data disposal in the cloud is which of the following?

A.
Cryptoshredding
B. Overwriting
C. Cold fusion
D. Melting

Correct Answer: A

Explanation:

Explanation: We don’t have physical ownership, control, or even access to the devices holding the data, so physical destruction, including melting, is not an option. Overwriting is a possibility, but it is complicated by the difficulty of locating all the sectors and storage areas that might have contained our data, and by the likelihood that constant backups in the cloud increase the chance we’ll miss something as it’s being overwritten. Cryptoshredding is the only reasonable alternative. Cold fusion is a red herring.

Certified Cloud Security Professional – CCSP – Question424

What is the intellectual property protection for a useful manufacturing innovation?

A.
Trademark
B. Copyright
C. patent
D. Trade secret

Correct Answer: C

Explanation:

Explanation: Patents protect processes (as well as inventions, new plantlife, and decorative patterns). The other answers listed are answers to other questions.

Certified Cloud Security Professional – CCSP – Question423

The goals of DLP solution implementation include all of the following, except:

A.
Elasticity
B. Policy enforcement
C. Data discovery
D. Loss of mitigation

Correct Answer: A

Explanation:

Explanation: DLP does not have anything to do with elasticity, which is the capability of the environment to scale up or down according to demand. All the rest are goals of DLP implementations.