Cause all that matters here is passing exam with . Cause all that you need is a high score of . The only one thing you need to do is downloading free now. We will not let you down with our money-back guarantee.
Online ISC2 CCSP free dumps demo Below:
NEW QUESTION 1
All of the following are activities that should be performed when capturing and maintaining an accurate, secure system baseline, except ______.
Response:
- A. Audit the baseline to ensure that all configuration items have been included and applied correctly
- B. Impose the baseline throughout the environment
- C. Capture an image of the baseline system for future reference/versioning/rollback purposes
- D. Document all baseline configuration elements and versioning data
Answer: B
NEW QUESTION 2
One of the security challenges of operating in the cloud is that additional controls must be placed on file storage systems because ______ .
Response:
- A. File stores are always kept in plain text in the cloud
- B. There is no way to sanitize file storage space in the cloud
- C. Virtualization necessarily prevents the use of application-based security controls
- D. Virtual machines are stored as snapshotted files when not in use
Answer: D
NEW QUESTION 3
Which type of testing tends to produce the best and most comprehensive results for discovering system vulnerabilities?
Response:
- A. Static
- B. Dynamic
- C. Pen
- D. Vulnerability
Answer: A
NEW QUESTION 4
Which of the following is a possible negative aspect of bit-splitting?
- A. Greater chance of physical theft of assets
- B. Loss of public image
- C. Some risk to availability, depending on the implementation
- D. A small fire hazard
Answer: C
NEW QUESTION 5
Why are PaaS environments at a higher likelihood of suffering backdoor vulnerabilities?
- A. They rely on virtualization.
- B. They are often used for software development.
- C. They have multitenancy.
- D. They are scalable.
Answer: B
NEW QUESTION 6
What can tokenization be used for? Response:
- A. Encryption
- B. Compliance with PCI DSS
- C. Enhancing the user experience
- D. Giving management oversight to e-commerce functions
Answer: B
NEW QUESTION 7
You are the security manager for an online retail sales company with 100 employees and a production environment hosted in a PaaS model with a major cloud provider.
Your company policies have allowed for a BYOD workforce that work equally from the company offices and their own homes or other locations. The policies also allow users to select which APIs they install and use on their own devices in order to access and manipulate company data.
Of the following, what is a security control you’d like to implement to offset the risk(s) incurred by this practice?
- A. Regular and widespread integrity checks on sampled data throughout the managed environment
- B. More extensive and granular background checks on all employees, particularly new hires
- C. Inclusion of references to all applicable regulations in the policy documents
- D. Increased enforcement of separation of duties for all workflows
Answer: A
NEW QUESTION 8
Software-defined networking (SDN) is intended to separate different network capabilities and allow for the granting of granular configurations, permissions, and features to non-network staff or customers. Which network capability is separated from forwarding of traffic?
Response:
- A. Routing
- B. Firewalling
- C. Filtering
- D. IPS
Answer: C
NEW QUESTION 9
TLS uses ______ to authenticate a connection and create a shared secret for the duration of the session.
- A. SAML 2.0
- B. X.509 certificates
- C. 802.11X
- D. The Diffie-Hellman process
Answer: B
NEW QUESTION 10
Which characteristic of automated patching makes it attractive? Response:
- A. Cost
- B. Speed
- C. Noise reduction
- D. Capability to recognize problems quickly
Answer: B
NEW QUESTION 11
You are the security manager for a small application development company. Your company is considering the use of the cloud for software testing purposes. Which cloud service model is most likely to suit your needs?
Response:
- A. IaaS
- B. PaaS
- C. SaaS
- D. LaaS
Answer: B
NEW QUESTION 12
Single sign-on systems work by authenticating users from a centralized location or using a centralized method, and then allowing applications that trust the system to grant those users access. What would be passed between the authentication system and the applications to grant a user access?
Response:
- A. Ticket
- B. Certificate
- C. Credential
- D. Token
Answer: D
NEW QUESTION 13
Every cloud service provider that opts to join the CSA STAR program registry must complete a ______.
- A. SOC 2, Type 2 audit report
- B. Consensus Assessment Initiative Questionnaire (CAIQ)
- C. NIST 800-37 RMF audit
- D. ISO 27001 ISMS review
Answer: B
NEW QUESTION 14
The Transport Layer Security (TLS) protocol creates a secure communications channel over public media (such as the Internet). In a typical TLS session, what is the usual means for establishing trust between the parties?
Response:
- A. Out-of-band authentication
- B. Multifactor authentication
- C. PKI certificates
- D. Preexisting knowledge of each other
Answer: C
NEW QUESTION 15
Which type of threat is often used in conjunction with phishing attempts and is often viewed as greatly increasing the likeliness of success?
Response:
- A. Unvalidated redirects and forwards
- B. Cross-site request forgery
- C. Cross-site scripting
- D. Insecure direct object references
Answer: A
NEW QUESTION 16
What type of identity system allows trust and verifications between the authentication systems of multiple organizations?
Response:
- A. Federated
- B. Collaborative
- C. Integrated
- D. Bidirectional
Answer: A
NEW QUESTION 17
What aspect of a Type 2 hypervisor involves additional security concerns that are not relevant with a Type 1 hypervisor?
Response:
- A. Reliance on a host operating system
- B. Auditing
- C. Proprietary software
- D. Programming languages
Answer: A
NEW QUESTION 18
The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is composed by a member-driven OWASP committee of application development experts and published approximately every 24 months. The 2013 OWASP Top Ten list includes “cross-site scripting (XSS).”
Which of the following is not a method for reducing the risk of XSS attacks? Response:
- A. Use an auto-escaping template system.
- B. XML escape all identity assertions.
- C. Sanitize HTML markup with a library designed for the purpose.
- D. HTML escape JSON values in an HTML context and read the data with JSON.parse.
Answer: B
NEW QUESTION 19
Which of the following is a method for apportioning resources that involves setting guaranteed minimums for all tenants/customers within the environment?
Response:
- A. Reservations
- B. Shares
- C. Cancellations
- D. Limits
Answer: A
P.S. Easily pass CCSP Exam with 353 Q&As Exambible Dumps & pdf Version, Welcome to Download the Newest Exambible CCSP Dumps: https://www.exambible.com/CCSP-exam/ (353 New Questions)