Download ISC.CCSP.NewDumps.2019-10-21.307q.vcex

Download Exam

File Info

Exam Certified Cloud Security Professional (CCSP)
Number CCSP
File Name ISC.CCSP.NewDumps.2019-10-21.307q.vcex
Size 250 KB
Posted Oct 21, 2019
Download ISC.CCSP.NewDumps.2019-10-21.307q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What is the best source for information about securing a physical asset's BIOS?


  1. Security policies
  2. Manual pages
  3. Vendor documentation
  4. Regulations
Correct answer: C
Explanation:
Vendor documentation from the manufacturer of the physical hardware is the best source of best practices for securing the BIOS.
Vendor documentation from the manufacturer of the physical hardware is the best source of best practices for securing the BIOS.



Question 2

What is the only data format permitted with the SOAP API?


  1. HTML
  2. SAML
  3. XSML
  4. XML
Correct answer: D
Explanation:
The SOAP protocol only supports the XML data format.
The SOAP protocol only supports the XML data format.



Question 3

Which data formats are most commonly used with the REST API?


  1. JSON and SAML
  2. XML and SAML
  3. XML and JSON
  4. SAML and HTML
Correct answer: C
Explanation:
JavaScript Object Notation (JSON) and Extensible Markup Language (XML) are the most commonly used data formats for the Representational State Transfer (REST) API, and are typically implemented with caching for increased scalability and performance.
JavaScript Object Notation (JSON) and Extensible Markup Language (XML) are the most commonly used data formats for the Representational State Transfer (REST) API, and are typically implemented with caching for increased scalability and performance.



Question 4

Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?


  1. Cloud service user
  2. Cloud service business manager
  3. Cloud service administrator
  4. Cloud service integrator
Correct answer: B
Explanation:
The cloud service business manager is responsible for overseeing business and billing administration, purchasing cloud services, and requesting audit reports when necessary
The cloud service business manager is responsible for overseeing business and billing administration, purchasing cloud services, and requesting audit reports when necessary



Question 5

Which of the following cloud aspects complicates eDiscovery?


  1. Resource pooling
  2. On-demand self-service
  3. Multitenancy
  4. Measured service
Correct answer: C
Explanation:
With multitenancy, eDiscovery becomes more complicated because the data collection involves extra steps to ensure that only those customers or systems that are within scope are turned over to the requesting authority.
With multitenancy, eDiscovery becomes more complicated because the data collection involves extra steps to ensure that only those customers or systems that are within scope are turned over to the requesting authority.



Question 6

What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?


  1. Scripts
  2. RDP
  3. APIs
  4. XML
Correct answer: C
Explanation:
The functions of the management plane are typically exposed as a series of remote calls and function executions and as a set of APIs. These APIs are typically leveraged through either a client or a web portal, with the latter being the most common.
The functions of the management plane are typically exposed as a series of remote calls and function executions and as a set of APIs. These APIs are typically leveraged through either a client or a web portal, with the latter being the most common.



Question 7

Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?


  1. IDCA
  2. Uptime Institute
  3. NFPA
  4. BICSI
Correct answer: B
Explanation:
The Uptime Institute publishes the most commonly used and widely known standard on data center tiers and topologies. It is based on a series of four tiers, with each progressive increase in number representing more stringent, reliable, and redundant systems for security, connectivity, fault tolerance, redundancy, and cooling.
The Uptime Institute publishes the most commonly used and widely known standard on data center tiers and topologies. It is based on a series of four tiers, with each progressive increase in number representing more stringent, reliable, and redundant systems for security, connectivity, fault tolerance, redundancy, and cooling.



Question 8

What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?


  1. Virtual
  2. Security
  3. Physical
  4. Logical
Correct answer: D
Explanation:
Cloud environments lack the ability to physically separate resources like a traditional data center can. To compensate, cloud computing logical segregation concepts are employed. These include VLANs, sandboxing, and the use of virtual network devices such as firewalls.
Cloud environments lack the ability to physically separate resources like a traditional data center can. To compensate, cloud computing logical segregation concepts are employed. These include VLANs, sandboxing, and the use of virtual network devices such as firewalls.



Question 9

What is used for local, physical access to hardware within a data center?


  1. SSH
  2. KVM
  3. VPN
  4. RDP
Correct answer: B
Explanation:
Local, physical access in a data center is done via KVM (keyboard, video, mouse) switches.
Local, physical access in a data center is done via KVM (keyboard, video, mouse) switches.



Question 10

Which United States law is focused on accounting and financial practices of organizations?


  1. Safe Harbor
  2. GLBA
  3. SOX
  4. HIPAA
Correct answer: C
Explanation:
The Sarbanes-Oxley (SOX) Act is not an act that pertains to privacy or IT security directly, but rather regulates accounting and financial practices used by organizations. It was passed to protect stakeholders and shareholders from improper practices and errors, and it sets forth rules for compliance, regulated and enforced by the Securities and Exchange Commission (SEC). The main influence on IT systems and operations is the requirements it sets for data retention, specifically in regard to what types of records must be preserved and for how long.
The Sarbanes-Oxley (SOX) Act is not an act that pertains to privacy or IT security directly, but rather regulates accounting and financial practices used by organizations. It was passed to protect stakeholders and shareholders from improper practices and errors, and it sets forth rules for compliance, regulated and enforced by the Securities and Exchange Commission (SEC). The main influence on IT systems and operations is the requirements it sets for data retention, specifically in regard to what types of records must be preserved and for how long.









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files