Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
CCSP
Free trial
Verified
Question 26
What process is used within a clustered system to provide high availability and load balancing?
- A: Dynamic balancing
- B: Dynamic clustering
- C: Dynamic optimization
- D: Dynamic resource scheduling
Question 27
Which of the following is NOT a function performed by the handshake protocol of TLS?
- A: Key exchange
- B: Encryption
- C: Negotiation of connection
- D: Establish session ID
Question 28
Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?
- A: Six months
- B: One month
- C: One year
- D: One week
Question 29
What changes are necessary to application code in order to implement DNSSEC?
- A: Adding encryption modules
- B: Implementing certificate validations
- C: Additional DNS lookups
- D: No changes are needed.
Question 30
Which type of controls are the SOC Type 1 reports specifically focused on?
- A: Integrity
- B: PII
- C: Financial
- D: Privacy
Question 31
Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?
- A: Integrity
- B: Availability
- C: Confidentiality
- D: Nonrepudiation
Question 32
Which of the following is NOT a domain of the Cloud Controls Matrix (CCM)?
- A: Data center security
- B: Human resources
- C: Mobile security
- D: Budgetary and cost controls
Question 33
Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?
- A: Sandboxing
- B: Encryption
- C: Firewalls
- D: Access control
Question 34
Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?
- A: Platform
- B: Data
- C: Physical environment
- D: Infrastructure
Question 35
What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?
- A: Scripts
- B: RDP
- C: APIs
- D: XML
Question 36
Which of the following is NOT a factor that is part of a firewall configuration?
- A: Encryption
- B: Port
- C: Protocol
- D: Source IP
Question 37
Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?
- A: Community
- B: Public
- C: Hybrid
- D: Private
Question 38
Which of the following is NOT one of five principles of SOC Type 2 audits?
- A: Privacy
- B: Processing integrity
- C: Financial
- D: Security
Question 39
Which aspect of cloud computing makes data classification even more vital than in a traditional data center?
- A: Interoperability
- B: Virtualization
- C: Multitenancy
- D: Portability
Question 40
What concept does the "T" represent in the STRIDE threat model?
- A: TLS
- B: Testing
- C: Tampering with data
- D: Transport
Question 41
Which of the following would be a reason to undertake a BCDR test?
- A: Functional change of the application
- B: Change in staff
- C: User interface overhaul of the application
- D: Change in regulations
Question 42
What is the biggest challenge to data discovery in a cloud environment?
- A: Format
- B: Ownership
- C: Location
- D: Multitenancy
Question 43
Which crucial aspect of cloud computing can be most threatened by insecure APIs?
- A: Automation
- B: Redundancy
- C: Resource pooling
- D: Elasticity
Question 44
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
- A: Functionality
- B: Programming languages
- C: Software platform
- D: Security requirements
Question 45
Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?
- A: Service-level agreements
- B: Governance
- C: Regulatory requirements
- D: Auditability
Question 46
What is a serious complication an organization faces from the perspective of compliance with international operations?
- A: Different certifications
- B: Multiple jurisdictions
- C: Different capabilities
- D: Different operational procedures
Question 47
Which regulatory system pertains to the protection of healthcare data?
- A: HIPAA
- B: HAS
- C: HITECH
- D: HFCA
Question 48
Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?
- A: Virtualization
- B: Multitenancy
- C: Resource pooling
- D: Dynamic optimization
Question 49
Which security concept would business continuity and disaster recovery fall under?
- A: Confidentiality
- B: Availability
- C: Fault tolerance
- D: Integrity
Question 50
Which of the following is NOT an application or utility to apply and enforce baselines on a system?
- A: Chef
- B: GitHub
- C: Puppet
- D: Active Directory
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!