CCSP Exam Questions

Total 512 Questions

Last Updated Exam : 30-Dec-2024

Topic 2, Exam Pool B

In a Lightweight Directory Access Protocol (LDAP) environment, each entry in a directory
server is identified by a ___________.
Response:


A.

Domain name (DN)


B.

Distinguished name (DN)


C.

Directory name (DN)


D.

Default name (DN)





B.
  

Distinguished name (DN)



Which type of report is considered for “general” use and does not contain any sensitive
information?
Response:


A.

SOC 1


B.

SAS-70


C.

SOC 3


D.

SOC 2





C.
  

SOC 3



What aspect of data center planning occurs first?
Response:


A.

Logical design


B.

Physical design


C.

Audit


D.

Policy revision





B.
  

Physical design



From a security perspective, automation of configuration aids in ____________.
Response:


A.

From a security perspective, automation of configuration aids in ____________.
Response:


B.

Enhancing performance


C.

Reducing potential attack vectors


D.

Increasing ease of use of the systems


E.

Reducing need for administrative personnel





B.
  

Enhancing performance



What type of software is often considered secured and validated via community
knowledge? 
Response:


A.

Proprietary


B.

Object-oriented


C.

Open source


D.

Scripting





C.
  

Open source



What could be the result of failure of the cloud provider to secure the hypervisor in such a
way that one user on a virtual machine can see the resource calls of another user’s virtual
machine?
Response:


A.

Unauthorized data disclosure


B.

Inference attacks


C.

Social engineering


D.

Physical intrusion





B.
  

Inference attacks



Your organization is developing software for wide use by the public. You have decided to
test it in a cloud environment, in a PaaS model. Which of the following should be of
particular concern to your organization for this situation?
Response:


A.

Vendor lock-in


B.

Backdoors


C.

Regulatory compliance


D.

High-speed network connectivity





B.
  

Backdoors



Tokenization requires at least ____ database(s).
Response:


A.

One


B.

Two


C.

Three


D.

Four





B.
  

Two



Which of the following is the correct name for Tier II of the Uptime Institute Data Center
Site Infrastructure Tier Standard Topology?
Response:


A.

Concurrently Maintainable Site Infrastructure


B.

Fault-Tolerant Site Infrastructure


C.

Basic Site Infrastructure


D.

Redundant Site Infrastructure Capacity Components





D.
  

Redundant Site Infrastructure Capacity Components



You are the security manager of a small firm that has just purchased a DLP solution to
implement in your cloud-based production environment.
Which of these activities should you perform before deploying the tool?
Response:


A.

Survey your company’s departments about the data under their control


B.

Reconstruct your firewalls


C.

Harden all your routers


D.

Adjust the hypervisors





A.
  

Survey your company’s departments about the data under their control




Page 15 out of 52 Pages
Previous