Exam Code : CCSP
Exam Name : Certified Cloud Security Professional (CCSP)
Vendor Name :
"ISC2"
CCSP Dumps CCSP Braindumps
CCSP Real Questions CCSP Practice Test CCSP Actual Questions
killexams.com
Certified Cloud Security Professional (CCSP)
https://killexams.com/pass4sure/exam-detail/CCSP
Question #501
Which of the following is the primary purpose of an SOC 3 report?
HIPAA compliance
Absolute assurances
Seal of approval
Compliance with PCI/DSS
The SOC 3 report is more of an attestation than a full evaluation of controls associated with a service provider.
Question #502
Which of the following is not an example of a highly regulated environment?
Financial services
Healthcare
Public companies
Wholesale or distribution
Wholesalers or distributors are generally not regulated, although the products they sell may be.
Question #503
Which of the following methods of addressing risk is most associated with insurance?
Mitigation
Transference
Avoidance
Acceptance
Avoidance halts the business process, mitigation entails using controls to reduce risk, acceptance involves taking on the risk, and transference usually involves insurance.
Question #504
Legal controls refer to which of the following?
ISO 27001
PCI DSS
NIST 800-53r4
Controls designed to comply with laws and regulations related to the cloud environment
Legal controls are those controls that are designed to comply with laws and regulations whether they be local or international.
Question #505
Which of the following best describes a cloud carrier?
The intermediary who provides connectivity and transport of cloud providers and cloud consumers
A person or entity responsible for making a cloud service available to consumers
The person or entity responsible for transporting data across the Internet
The person or entity responsible for keeping cloud services running for customers
A cloud carrier is the intermediary who provides connectivity and transport of cloud services between cloud providers and cloud customers.
Question #506
Gap analysis is performed for what reason?
To begin the benchmarking process
To assure proper accounting practices are being used
To provide assurances to cloud customers
To ensure all controls are in place and working properly
The primary purpose of the gap analysis is to begin the benchmarking process against risk and security standards and frameworks.
Question #507
Which of the following frameworks focuses specifically on design implementation and management?
A. ISO 31000:2009
ISO 27017
NIST 800-92
HIPAA
ISO 31000:2009 specifically focuses on design implementation and management. HIPAA refers to health care regulations, NIST 800-92 is about log management, and ISO 27017 is about cloud specific security controls.
Question #508
Which of the following report is most aligned with financial control audits?
SSAE 16
SOC 2
SOC 1
SOC 3
The SOC 1 report focuses primarily on controls associated with financial services. While IT controls are certainly part of most accounting systems today, the focus is on the controls around those financial systems.
Question #509
Which of the following is not a risk management framework?
COBIT
Hex GBL
C. ISO 31000:2009
D. NIST SP 800-37
Hex GBL is a reference to a computer part in Terry Pratchett's fictional Discworld universe. The rest are not.
Question #510
Limits for resource utilization can be set at different levels within a cloud environment to ensure that no particular entity can consume a level of resources that impacts other cloud customers.
Which of the following is NOT a unit covered by limits?
Hypervisor
Cloud customer
Virtual machine
Service
The hypervisor level, as a backend cloud infrastructure component, is not a unit where limits may be applied to control resource utilization. Limits can be placed at the service, virtual machine, and cloud customer levels within a cloud environment.
Question #511
Which of the following is the dominant driver behind the regulations to which a system or application must adhere?
Data source
Locality
Contract
SLA
The locality--or physical location and jurisdiction where the system or data resides--is the dominant driver of regulations. This may be based on the type of data contained within the application or the way in which the data is used. The contract and SLA both articulate requirements for regulatory compliance and the responsibilities for the cloud provider and cloud customer, but neither artifact defines the actual requirements. Instead, the contract and SLA merely form the official documentation between the cloud provider and cloud customer. The source of the data may place contractual requirements or best practice guidelines on its usage, but ultimately jurisdiction has legal force and greater authority.
Question #512
When using a SaaS solution, what is the capability provided to the customer?
To use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.
To use the consumer's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.
To use the consumer's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.
To use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based
email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.
According to "The NIST Definition of Cloud Computing," in SaaS, "The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based e-mail), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings."