CCSP Dumps CCSP Braindumps

CCSP Real Questions CCSP Practice Test CCSP Actual Questions


killexams.com


ISC2


CCSP


Certified Cloud Security Professional (CCSP)


https://killexams.com/pass4sure/exam-detail/CCSP


Question #501


Which of the following is the primary purpose of an SOC 3 report?


  1. HIPAA compliance

  2. Absolute assurances

  3. Seal of approval

  4. Compliance with PCI/DSS


Answer: C

The SOC 3 report is more of an attestation than a full evaluation of controls associated with a service provider.


Question #502


Which of the following is not an example of a highly regulated environment?


  1. Financial services

  2. Healthcare

  3. Public companies

  4. Wholesale or distribution


Answer: D

Wholesalers or distributors are generally not regulated, although the products they sell may be.


Question #503


Which of the following methods of addressing risk is most associated with insurance?


  1. Mitigation

  2. Transference

  3. Avoidance

  4. Acceptance


Answer: B

Avoidance halts the business process, mitigation entails using controls to reduce risk, acceptance involves taking on the risk, and transference usually involves insurance.


Question #504


Legal controls refer to which of the following?


  1. ISO 27001

  2. PCI DSS

  3. NIST 800-53r4

  4. Controls designed to comply with laws and regulations related to the cloud environment


Answer: D

Legal controls are those controls that are designed to comply with laws and regulations whether they be local or international.


Question #505

Which of the following best describes a cloud carrier?


  1. The intermediary who provides connectivity and transport of cloud providers and cloud consumers

  2. A person or entity responsible for making a cloud service available to consumers

  3. The person or entity responsible for transporting data across the Internet

  4. The person or entity responsible for keeping cloud services running for customers


Answer: A

A cloud carrier is the intermediary who provides connectivity and transport of cloud services between cloud providers and cloud customers.


Question #506


Gap analysis is performed for what reason?


  1. To begin the benchmarking process

  2. To assure proper accounting practices are being used

  3. To provide assurances to cloud customers

  4. To ensure all controls are in place and working properly


Answer: A

The primary purpose of the gap analysis is to begin the benchmarking process against risk and security standards and frameworks.


Question #507


Which of the following frameworks focuses specifically on design implementation and management?


A. ISO 31000:2009

  1. ISO 27017

  2. NIST 800-92

  3. HIPAA


Answer: A

ISO 31000:2009 specifically focuses on design implementation and management. HIPAA refers to health care regulations, NIST 800-92 is about log management, and ISO 27017 is about cloud specific security controls.


Question #508


Which of the following report is most aligned with financial control audits?


  1. SSAE 16

  2. SOC 2

  3. SOC 1

  4. SOC 3


Answer: C

The SOC 1 report focuses primarily on controls associated with financial services. While IT controls are certainly part of most accounting systems today, the focus is on the controls around those financial systems.


Question #509


Which of the following is not a risk management framework?


  1. COBIT

  2. Hex GBL

C. ISO 31000:2009

D. NIST SP 800-37

Answer: B

Hex GBL is a reference to a computer part in Terry Pratchett's fictional Discworld universe. The rest are not.


Question #510


Limits for resource utilization can be set at different levels within a cloud environment to ensure that no particular entity can consume a level of resources that impacts other cloud customers.

Which of the following is NOT a unit covered by limits?


  1. Hypervisor

  2. Cloud customer

  3. Virtual machine

  4. Service


Answer: A

The hypervisor level, as a backend cloud infrastructure component, is not a unit where limits may be applied to control resource utilization. Limits can be placed at the service, virtual machine, and cloud customer levels within a cloud environment.


Question #511


Which of the following is the dominant driver behind the regulations to which a system or application must adhere?


  1. Data source

  2. Locality

  3. Contract

  4. SLA


Answer: B

The locality--or physical location and jurisdiction where the system or data resides--is the dominant driver of regulations. This may be based on the type of data contained within the application or the way in which the data is used. The contract and SLA both articulate requirements for regulatory compliance and the responsibilities for the cloud provider and cloud customer, but neither artifact defines the actual requirements. Instead, the contract and SLA merely form the official documentation between the cloud provider and cloud customer. The source of the data may place contractual requirements or best practice guidelines on its usage, but ultimately jurisdiction has legal force and greater authority.


Question #512


When using a SaaS solution, what is the capability provided to the customer?


  1. To use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.

  2. To use the consumer's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.

  3. To use the consumer's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.

  4. To use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based

email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings.


Answer: D

According to "The NIST Definition of Cloud Computing," in SaaS, "The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based e-mail), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user- specific application configuration settings."