Want to know features? Want to lear more about experience? Study . Gat a success with an absolute guarantee to pass ISC2 CCSP (Certified Cloud Security Professional) test on your first attempt.
Free CCSP Demo Online For Microsoft Certifitcation:
NEW QUESTION 1
A denial of service (DoS) attack can potentially impact all customers within a cloud environment with the continued allocation of additional resources. Which of the following can be useful for a customer to protect themselves from a DoS attack against another customer?
Response:
- A. Limits
- B. Reservations
- C. Shares
- D. Borrows
Answer: B
NEW QUESTION 2
______ is perhaps the main external factor driving IAM efforts. Response:
- A. Regulation
- B. Business need
- C. The evolving threat landscape
- D. Monetary value
Answer: A
NEW QUESTION 3
A truly airgapped machine selector will ______.
Response:
- A. Terminate a connection before creating a new connection
- B. Be made of composites and not metal
- C. Have total Faraday properties
- D. Not be portable
Answer: A
NEW QUESTION 4
The destruction of a cloud customer’s data can be required by all of the following except ______.
Response:
- A. Statute
- B. Regulation
- C. The cloud provider’s policy
- D. Contract
Answer: C
NEW QUESTION 5
Which of the following is considered an administrative control?
- A. Access control process
- B. Keystroke logging
- C. Door locks
- D. Biometric authentication
Answer: A
NEW QUESTION 6
Which of the following might make crypto-shredding difficult or useless? Response:
- A. Cloud provider also managing the organization’s keys
- B. Lack of physical access to the environment
- C. External attackers
- D. Lack of user training and awareness
Answer: A
NEW QUESTION 7
In general, a cloud BCDR solution will be ______ than a physical solution. Response:
- A. Slower
- B. Less expensive
- C. Larger
- D. More difficult to engineer
Answer: B
NEW QUESTION 8
Egress monitoring solutions usually include a function that ______.
Response:
- A. Uses biometrics to scan users
- B. Inspects incoming packets
- C. Resides on client machines
- D. Uses stateful inspection
Answer: C
NEW QUESTION 9
Anonymization is the process of removing from data sets. Response:
- A. Access
- B. Cryptographic keys
- C. Numeric values
- D. Identifying information
Answer: D
NEW QUESTION 10
In a data retention policy, what is perhaps the most crucial element? Response:
- A. Location of the data archive
- B. Frequency of backups
- C. Security controls in long-term storage
- D. Data recovery procedures
Answer: D
NEW QUESTION 11
All of the following might be used as data discovery characteristics in a content-analysis-based data discovery effort except ______.
Response:
- A. Keywords
- B. Pattern-matching
- C. Frequency
- D. Inheritance
Answer: D
NEW QUESTION 12
Of the following, which is probably the most significant risk in a managed cloud environment? Response:
- A. DDoS
- B. Management plane breach
- C. Guest escape
- D. Physical attack on the utility service lines
Answer: B
NEW QUESTION 13
At which phase of the SDLC process should security begin participating? Response:
- A. Requirements gathering
- B. Requirements analysis
- C. Design
- D. Testing
Answer: A
NEW QUESTION 14
Which of the following best describes data masking? Response:
- A. A method where the last few numbers in a dataset are not obscure
- B. These are often used for authentication.
- C. A method for creating similar but inauthentic datasets used for software testing and user training.
- D. A method used to protect prying eyes from data such as social security numbers and credit card data.
- E. Data masking involves stripping out all similar digits in a string of numbers so as to obscure the original number.
Answer: B
NEW QUESTION 15
DRM solutions should generally include all the following functions, except:
- A. Persistency
- B. Automatic self-destruct
- C. Automatic expiration
- D. Dynamic policy control
Answer: B
NEW QUESTION 16
Your company operates in a highly competitive market, with extremely high-value data assets. Senior management wants to migrate to a cloud environment but is concerned that providers will not meet the company’s security needs.
Which deployment model would probably best suit the company’s needs? Response:
- A. Public
- B. Private
- C. Community
- D. Hybrid
Answer: B
NEW QUESTION 17
Which of the following would probably best aid an organization in deciding whether to migrate from a legacy environment to a particular cloud provider?
Response:
- A. Rate sheets comparing a cloud provider to other cloud providers
- B. Cloud provider offers to provide engineering assistance during the migration
- C. The cost/benefit measure of closing the organization’s relocation site (hot site/warm site) and using the cloud for disaster recovery instead
- D. SLA satisfaction surveys from other (current and past) cloud customers
Answer: D
NEW QUESTION 18
In a Lightweight Directory Access Protocol (LDAP) environment, each entry in a directory server is identified by a ______.
Response:
- A. Domain name (DN)
- B. Distinguished name (DN)
- C. Directory name (DN)
- D. Default name (DN)
Answer: B
NEW QUESTION 19
The use of which of the following technologies will NOT require the security dependency of an operating system, other than its own?
- A. Management plane
- B. Type 1 hypervisor
- C. Type 2 hypervisor
- D. Virtual machine
Answer: B
100% Valid and Newest Version CCSP Questions & Answers shared by Exambible, Get Full Dumps HERE: https://www.exambible.com/CCSP-exam/ (New 353 Q&As)