ISC ccsp practice test

Certified Cloud Security Professional Exam

Last exam update: Nov 30 ,2023
Page 1 out of 35
Viewing questions 1-15 out of 512

Question 1

When using a SaaS solution, what is the capability provided to the customer?

  • A. To use the providers applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
  • B. To use the consumers applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
  • C. To use the consumers applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
  • D. To use the providers applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (for example, web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Answer:

D

Explanation:
According to The NIST Definition of Cloud Computing, in SaaS, The capability provided to the
consumer is to use the providers applications running on a cloud infrastructure. The applications are
accessible from various client devices through either a thin client interface, such as a web browser
(e.g., web-based e-mail), or a program interface. The consumer does not manage or control the
underlying cloud infrastructure including network, servers, operating systems, storage, or even
individual application capabilities, with the possible exception of limited user-specific application
configuration settings.

Discussions
0 / 1000

Question 2

Which of the following is the dominant driver behind the regulations to which a system or
application must adhere?

  • A. Data source
  • B. Locality
  • C. Contract
  • D. SLA
Answer:

B

Explanation:
The locality--or physical location and jurisdiction where the system or data resides--is the dominant
driver of regulations. This may be based on the type of data contained within the application or the
way in which the data is used. The contract and SLA both articulate requirements for regulatory
compliance and the responsibilities for the cloud provider and cloud customer, but neither artifact
defines the actual requirements. Instead, the contract and SLA merely form the official
documentation between the cloud provider and cloud customer. The source of the data may place
contractual requirements or best practice guidelines on its usage, but ultimately jurisdiction has legal
force and greater authority.

Discussions
0 / 1000

Question 3

Limits for resource utilization can be set at different levels within a cloud environment to ensure that
no particular entity can consume a level of resources that impacts other cloud customers.
Which of the following is NOT a unit covered by limits?

  • A. Hypervisor
  • B. Cloud customer
  • C. Virtual machine
  • D. Service
Answer:

A

Explanation:
The hypervisor level, as a backend cloud infrastructure component, is not a unit where limits may be
applied to control resource utilization. Limits can be placed at the service, virtual machine, and cloud
customer levels within a cloud environment.

Discussions
0 / 1000

Question 4

Which of the following is not a risk management framework?

  • A. COBIT
  • B. Hex GBL
  • C. ISO 31000:2009
  • D. NIST SP 800-37
Answer:

B

Explanation:
Hex GBL is a reference to a computer part in Terry Pratchetts fictional Discworld universe. The rest
are not.

Discussions
0 / 1000

Question 5

Which of the following report is most aligned with financial control audits?

  • A. SSAE 16
  • B. SOC 2
  • C. SOC 1
  • D. SOC 3
Answer:

C

Explanation:
The SOC 1 report focuses primarily on controls associated with financial services. While IT controls
are certainly part of most accounting systems today, the focus is on the controls around those
financial systems.

Discussions
0 / 1000

Question 6

Which of the following frameworks focuses specifically on design implementation and management?

  • A. ISO 31000:2009
  • B. ISO 27017
  • C. NIST 800-92
  • D. HIPAA
Answer:

A

Explanation:
ISO 31000:2009 specifically focuses on design implementation and management. HIPAA refers to
health care regulations, NIST 800-92 is about log management, and ISO 27017 is about cloud specific
security controls.

Discussions
0 / 1000

Question 7

Gap analysis is performed for what reason?

  • A. To begin the benchmarking process
  • B. To assure proper accounting practices are being used
  • C. To provide assurances to cloud customers
  • D. To ensure all controls are in place and working properly
Answer:

A

Explanation:
The primary purpose of the gap analysis is to begin the benchmarking process against risk and
security standards and frameworks.

Discussions
0 / 1000

Question 8

Which of the following best describes a cloud carrier?

  • A. The intermediary who provides connectivity and transport of cloud providers and cloud consumers
  • B. A person or entity responsible for making a cloud service available to consumers
  • C. The person or entity responsible for transporting data across the Internet
  • D. The person or entity responsible for keeping cloud services running for customers
Answer:

A

Explanation:
A cloud carrier is the intermediary who provides connectivity and transport of cloud services
between cloud providers and cloud customers.

Discussions
0 / 1000

Question 9

Legal controls refer to which of the following?

  • A. ISO 27001
  • B. PCI DSS
  • C. NIST 800-53r4
  • D. Controls designed to comply with laws and regulations related to the cloud environment
Answer:

D

Explanation:
Legal controls are those controls that are designed to comply with laws and regulations whether they
be local or international.

Discussions
0 / 1000

Question 10

Which of the following methods of addressing risk is most associated with insurance?

  • A. Mitigation
  • B. Transference
  • C. Avoidance
  • D. Acceptance
Answer:

B

Explanation:
Avoidance halts the business process, mitigation entails using controls to reduce risk, acceptance
involves taking on the risk, and transference usually involves insurance.

Discussions
0 / 1000

Question 11

Which of the following is not an example of a highly regulated environment?

  • A. Financial services
  • B. Healthcare
  • C. Public companies
  • D. Wholesale or distribution
Answer:

D

Explanation:
Wholesalers or distributors are generally not regulated, although the products they sell may be.

Discussions
0 / 1000

Question 12

Which of the following is the primary purpose of an SOC 3 report?

  • A. HIPAA compliance
  • B. Absolute assurances
  • C. Seal of approval
  • D. Compliance with PCI/DSS
Answer:

C

Explanation:
The SOC 3 report is more of an attestation than a full evaluation of controls associated with a service
provider.

Discussions
0 / 1000

Question 13

Which is the lowest level of the CSA STAR program?

  • A. Attestation
  • B. Self-assessment
  • C. Hybridization
  • D. Continuous monitoring
Answer:

B

Explanation:
The lowest level is Level 1, which is self-assessment, Level 2 is an external third-party attestation,
and Level 3 is a continuous-monitoring program. Hybridization does not exist as part of the CSA STAR
program.

Discussions
0 / 1000

Question 14

Which of the following terms is not associated with cloud forensics?

  • A. eDiscovery
  • B. Chain of custody
  • C. Analysis
  • D. Plausibility
Answer:

D

Explanation:
Plausibility, here, is a distractor and not specifically relevant to cloud forensics.

Discussions
0 / 1000

Question 15

Which of the following is not a way to manage risk?

  • A. Transferring
  • B. Accepting
  • C. Mitigating
  • D. Enveloping
Answer:

D

Explanation:
Enveloping is a nonsense term, unrelated to risk management. The rest are not.

Discussions
0 / 1000
To page 2