Exam Code: CCSP (), Exam Name: Certified Cloud Security Professional, Certification Provider: ISC2 Certifitcation, Free Today! Guaranteed Training- Pass CCSP Exam.
Online CCSP free questions and answers of New Version:
NEW QUESTION 1
All of the following methods can be used to attenuate the harm caused by escalation of privilege except: Response:
- A. Extensive access control and authentication tools and techniques
- B. Analysis and review of all log data by trained, skilled personnel on a frequent basis
- C. Periodic and effective use of cryptographic sanitization tools
- D. The use of automated analysis tools such as SIM, SIEM, and SEM solutions
Answer: C
NEW QUESTION 2
What is the risk to the organization posed by dashboards that display data discovery results? Response:
- A. Increased chance of external penetration
- B. Flawed management decisions based on massaged displays
- C. Higher likelihood of inadvertent disclosure
- D. Raised incidence of physical theft
Answer: B
NEW QUESTION 3
Which of the following types of software is a Type 2 hypervisor dependent on that a Type 1 hypervisor isn’t? Response:
- A. VPN
- B. Firewall
- C. Operating system
- D. IDS
Answer: C
NEW QUESTION 4
A honeypot can be used for all the following purposes except ______.
Response:
- A. Gathering threat intelligence
- B. Luring attackers
- C. Distracting attackers
- D. Delaying attackers
Answer: B
NEW QUESTION 5
Your organization has made it a top priority that any cloud environment being considered to host production systems have guarantees that resources will always be available for allocation when needed.
Which of the following concepts will you need to ensure is part of the contract and SLA? Response:
- A. Limits
- B. Shares
- C. Resource pooling
- D. Reservations
Answer: D
NEW QUESTION 6
Aside from the fact that the cloud customer probably cannot locate/reach the physical storage assets of the cloud provider, and that wiping an entire storage space would impact other customers, why would degaussing probably not be an effective means of secure sanitization in the cloud?
Response:
- A. All the data storage space in the cloud is already gaussed.
- B. Cloud data storage may not be affected by degaussing.
- C. Federal law prohibits it in the United States.
- D. The blast radius is too wide.
Answer: B
NEW QUESTION 7
Which standards body depends heavily on contributions and input from its open membership base?
Response:
- A. NIST
- B. ISO
- C. ICANN
- D. CSA
Answer: D
NEW QUESTION 8
Because PaaS implementations are so often used for software development, what is one of the vulnerabilities that should always be kept in mind?
Response:
- A. Malware
- B. Loss/theft of portable devices
- C. Backdoors
- D. DoS/DDoS
Answer: C
NEW QUESTION 9
Which of the following would NOT be used to determine the classification of data?
Response:
- A. Metadata
- B. PII
- C. Creator
- D. Future use
Answer: D
NEW QUESTION 10
All of these are reasons an organization may want to consider cloud migration except: Response:
- A. Reduced personnel costs
- B. Elimination of risks
- C. Reduced operational expenses
- D. Increased efficiency
Answer: B
NEW QUESTION 11
Security best practices in a virtualized network environment would include which of the following? Response:
- A. Using distinct ports and port groups for various VLANs on a virtual switch rather than running them through the same port
- B. Running iSCSI traffic unencrypted in order to have it observed and monitored by NIDS
- C. Adding HIDS to all virtual guests
- D. Hardening all outward-facing firewalls in order to make them resistant to attack
Answer: A
NEW QUESTION 12
Tokenization requires two distinct ______.
Response:
- A. Authentication factors
- B. Databases
- C. Encryption keys
- D. Personnel
Answer: B
NEW QUESTION 13
Which of the following are not examples of personnel controls? Response:
- A. Background checks
- B. Reference checks
- C. Strict access control mechanisms
- D. Continuous security training
Answer: C
NEW QUESTION 14
Vulnerability scans are dependent on ______ in order to function. Response:
- A. Privileged access
- B. Vulnerability signatures
- C. Malware libraries
- D. Forensic analysis
Answer: B
NEW QUESTION 15
What is the term that describes the situation when a malicious user/attacker can exit the restrictions of a single host and access other nodes on the network?
Response:
- A. Host escape
- B. Guest escape
- C. Provider exit
- D. Escalation of privileges
Answer: A
NEW QUESTION 16
A typical DLP tool can enhance the organization’s efforts at accomplishing what legal task? Response:
- A. Evidence collection
- B. Delivering testimony
- C. Criminal prosecution
- D. Enforcement of intellectual property rights
Answer: A
NEW QUESTION 17
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Previous releases have shipped with major flaws that were not detected in the testing phase; leadership wants to avoid repeating that problem.
What tool/technique/technology might you suggest to aid in identifying programming errors?
- A. Vulnerability scans
- B. Open source review
- C. SOC audits
- D. Regulatory review
Answer: B
NEW QUESTION 18
Which of the following tools might be useful in data discovery efforts that are based on content analysis?
- A. DLP
- B. Digital Rights Management (DRM)
- C. iSCSI
- D. Fibre Channel over Ethernet (FCoE)
Answer: A
NEW QUESTION 19
Data labels could include all the following, except: Response:
- A. Confidentiality level
- B. Distribution limitations
- C. Access restrictions
- D. Multifactor authentication
Answer: D
Recommend!! Get the Full CCSP dumps in VCE and PDF From 2passeasy, Welcome to Download: https://www.2passeasy.com/dumps/CCSP/ (New 353 Q&As Version)