CCSP Exam Questions

Total 512 Questions

Last Updated Exam : 15-Apr-2025

Topic 2, Exam Pool B

Which of the following would NOT be included as input into the requirements gathering for
an application or system?
Response:


A.

Users


B.

Management


C.

Regulators


D.

Auditors





D.
  

Auditors



Which type of software is most likely to be reviewed by the most personnel, with the most
varied perspectives?
Response:


A.

Database management software


B.

Open source software


C.

Secure software


D.

Proprietary software





B.
  

Open source software



Which of the following BCDR testing methodologies is least intrusive?
Response:


A.

Walk-through


B.

Simulation


C.

Tabletop


D.

Full test





C.
  

Tabletop



Your organization has made it a top priority that any cloud environment being considered to
host production systems have guarantees that resources will always be available for
allocation when needed.
Which of the following concepts will you need to ensure is part of the contract and SLA?
Response:


A.

Limits


B.

Shares


C.

Resource pooling


D.

Reservations





D.
  

Reservations



Which of these characteristics of a virtualized network adds risks to the cloud environment?
Response:


A.

Redundancy


B.

Scalability


C.

Pay-per-use


D.

Self-service





A.
  

Redundancy



Which of the following characteristics is associated with digital rights management (DRM)
solutions (sometimes referred to as information rights management, or IRM)?
Response:


A.

Mapping to existing access control lists (ACLs)


B.

Delineating biometric catalogs


C.

Preventing multifactor authentication


D.

Prohibiting unauthorized transposition





A.
  

Mapping to existing access control lists (ACLs)



All of the following might be used as data discovery characteristics in a content-analysisbased
data discovery effort except ____________.
Response:


A.

Keywords


B.

Pattern-matching


C.

Frequency


D.

Inheritance





D.
  

Inheritance



Which of the following is a possible negative aspect of bit-splitting?
Response:


A.

It may require trust in additional third parties beyond the primary cloud service provider.


B.

There may be cause for management concern that the technology will violate internal
policy.


C.

Users will have far greater difficulty understanding the implementation.


D.

Limited vendors make acquisition and support challenging.





A.
  

It may require trust in additional third parties beyond the primary cloud service provider.



Which kind of SSAE audit report is a cloud customer most likely to receive from a cloud
provider?
Response:


A.

SOC 1 Type 1


B.

SOC 2 Type 2


C.

SOC 1 Type 2


D.

SOC 3





D.
  

SOC 3



Which of the following is the best example of a key component of regulated PII?
Response:


A.

Items that should be implemented


B.

Mandatory breach reporting


C.

Audit rights of subcontractors


D.

PCI DSS





B.
  

Mandatory breach reporting




Page 16 out of 52 Pages
Previous