Free CCSP Exam Braindumps

Pass your Certified Cloud Security Professional exam with these free Questions and Answers

Page 25 of 103
QUESTION 116

- (Exam Topic 1)
Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?

  1. A. Injection
  2. B. Missing function-level access control
  3. C. Cross-site request forgery
  4. D. Cross-site scripting

Correct Answer: B
It is imperative that an application perform checks when each function or portion of the application is accessed, to ensure that the user is properly authorized to access it. Without continual checks each time a function is accessed, an attacker could forge requests to access portions of the application where authorization has not been granted.

QUESTION 117

- (Exam Topic 2)
Where is an XML firewall most commonly deployed in the environment?

  1. A. Between the application and data layers
  2. B. Between the IPS and firewall
  3. C. Between the presentation and application layers
  4. D. Between the firewall and application server

Correct Answer: D
XML firewalls are most commonly deployed in line between the firewall and application server to validate XML code before it reaches the application.

QUESTION 118

- (Exam Topic 4)
Which of the following is considered an administrative control?

  1. A. Keystroke logging
  2. B. Access control process
  3. C. Door locks
  4. D. Biometric authentication

Correct Answer: B
A process is an administrative control; sometimes, the process includes elements of other types of controls (in this case, the access control mechanism might be a technical control, or it might be a physical control), but the process itself is administrative. Keystroke logging is a technical control (or an attack, if done for malicious purposes, and not for auditing); door locks are a physical control; and biometric authentication is a technological control.

QUESTION 119

- (Exam Topic 2)
Which of the following is NOT a function performed by the handshake protocol of TLS?

  1. A. Key exchange
  2. B. Encryption
  3. C. Negotiation of connection
  4. D. Establish session ID

Correct Answer: B
The handshake protocol negotiates and establishes the connection as well as handles the key exchange and establishes the session ID. It does not perform the actual encryption of data packets.

QUESTION 120

- (Exam Topic 3)
Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.
Which of the following is the optimal temperature range as set by ASHRAE?

  1. A. 69.8 to 86.0 degrees Fahrenheit (21 to 30 degrees Celsius)
  2. B. 51.8 to 66.2 degrees Fahrenheit (11 to 19 degrees Celsius)
  3. C. 64.4 to 80.6 degrees Fahrenheit (18 to 27 degrees Celsius)
  4. D. 44.6 to 60.8 degrees Fahrenheit (7 to 16 degrees Celsius)

Correct Answer: C
The American Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE) recommends

Page 25 of 103

Post your Comments and Discuss ISC2 CCSP exam with other Community members: