Go Back on CCSP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CCSP Practice Test


Page 4 out of 103 Pages

Topic 1: Exam Pool A

You are the security manager for a software development firm. Your company is interested
in using a managed cloud service provider for hosting its testing environment. Management
is interested in adopting an Agile development style.
This will be typified by which of the following traits?
Response:


A.

Reliance on a concrete plan formulated during the Define phase


B.

Rigorous, repeated security testing


C.

Isolated programming experts for specific functional elements


D.

Short, iterative work periods





D.
  

Short, iterative work periods



You are the security manager of a small firm that has just purchased a DLP solution to
implement in your cloud-based production environment.
In order to get truly holistic coverage of your environment, you should be sure to include
__________ as a step in the deployment process.
Response:


A.

Getting signed user agreements from all users


B.

Installation of the solution on all assets in the cloud data center


C.

Adoption of the tool in all routers between your users and the cloud provider


D.

All of your customers to install the tool





A.
  

Getting signed user agreements from all users



The Open Web Application Security Project (OWASP) Top Ten is a list of web application
security threats that is composed by a member-driven OWASP committee of application
development experts and published approximately every 24 months. The 2013 OWASP
Top Ten list includes “sensitive data exposure.”
Which of these is a technique to reduce the potential for a sensitive data exposure?
Response:


A.

Extensive user training on proper data handling techniques


B.

Advanced firewalls inspecting all inbound traffic, to include content-based screening


C.

Ensuring the use of utility backup power supplies


D.

Roving security guards





A.
  

Extensive user training on proper data handling techniques



A virtual network interface card (NIC) exists at layer __________ of the OSI model.
Response:


A.

2


B.

4


C.

6


D.

8





A.
  

2



Which of the following is a file server that provides data access to multiple,
heterogeneous machines/users on the network?
Response:


A.

Storage area network (SAN)


B.

Network-attached storage (NAS)


C.

Hardware security module (HSM)


D.

Content delivery network (CDN)





B.
  

Network-attached storage (NAS)




Page 4 out of 103 Pages
Previous