Free CCSP Exam Braindumps (page: 22)

Page 21 of 129

Which aspect of archiving must be tested regularly for the duration of retention requirements?

  1. Availability
  2. Recoverability
  3. Auditability
  4. Portability

Answer(s): B

Explanation:

In order for any archiving system to be deemed useful and compliant, regular tests must be performed to ensure the data can still be recovered and accessible, should it ever be needed, for the duration of the retention requirements.



Which of the following represents a minimum guaranteed resource within a cloud environment for the cloud customer?

  1. Reservation
  2. Share
  3. Limit
  4. Provision

Answer(s): A

Explanation:

A reservation is a minimum resource that is guaranteed to a customer within a cloud environment. Within a cloud, a reservation can pertain to the two main aspects of computing: memory and processor. With a reservation in place, the cloud provider guarantees that a cloud customer will always have at minimum the necessary resources available to power on and operate any of their services.



When is a virtual machine susceptible to attacks while a physical server in the same state would not be?

  1. When it is behind a WAF
  2. When it is behind an IPS
  3. When it is not patched
  4. When it is powered off

Answer(s): D

Explanation:

A virtual machine is ultimately an image file residing a file system. Because of this, even when a virtual machine is "powered off," it is still susceptible to attacks and modification. A physical server that is powered off would not be susceptible to attacks.



Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?

  1. Sensitive data exposure
  2. Security misconfiguration
  3. Insecure direct object references
  4. Unvalidated redirect and forwards

Answer(s): C

Explanation:

An insecure direct object reference occurs when a developer has in their code a reference to something on the application side, such as a database key, the directory structure of the application, configuration information about the hosting system, or any other information that pertains to the workings of the application that should not be exposed to users or the network. Unvalidated redirects and forwards occur when an application has functions to forward users to other sites, and these functions are not properly secured to validate the data and redirect requests, allowing spoofing for malware of phishing attacks. Sensitive data exposure occurs when an application does not use sufficient encryption and other security controls to protect sensitive application data. Security misconfigurations occur when applications and systems are not properly configured or maintained in a secure manner.






Post your Comments and Discuss ISC CCSP exam with other Community members:

CCSP Exam Discussions & Posts