Free Certification Practice Questions

ISC-CCSP

Loading…
CCSP Which of the following would NOT be a reason to activate a BCDR strategy?
#151
CCSP Which of the cloud cross-cutting aspects relates to the oversight of processes and systems, as well as to ensuring their compliance with specific policies and regulations?
#152
CCSP Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?
#153
CCSP Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?
#154
CCSP What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?
#155
CCSP What type of security threat is DNSSEC designed to prevent?
#156
CCSP Which European Union directive pertains to personal data privacy and an individual's control over their personal data?
#157
CCSP Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?
#158
CCSP Which data point that auditors always desire is very difficult to provide within a cloud environment?
#159
CCSP What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?
#160
CCSP Which security concept is focused on the trustworthiness of data?
#161
CCSP Which OSI layer does IPsec operate at?
#162
CCSP Which of the cloud cross-cutting aspects relates to the requirements placed on the cloud provider by the cloud customer for minimum performance standards and requirements that must be met?
#163
CCSP Which of the following service capabilities gives the cloud customer the most control over resources and configurations?
#164
CCSP What concept does the "I" represent with the STRIDE threat model?
#165
CCSP At which stage of the BCDR plan creation phase should security be included in discussions?
#166
CCSP Which approach is typically the most efficient method to use for data discovery?
#167
CCSP Which of the following features is a main benefit of PaaS over IaaS?
#168
CCSP Which audit type has been largely replaced by newer approaches since 2011?
#169
CCSP Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?
#170
CCSP Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
#171
CCSP What does the "SOC" acronym refer to with audit reports?
#172
CCSP What does the REST API use to protect data transmissions?
#173
CCSP What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?
#174
CCSP With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?
#175
CCSP Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?
#176
CCSP What does dynamic application security testing (DAST) NOT entail?
#177
CCSP Where is an XML firewall most commonly deployed in the environment?
#178
CCSP What type of masking strategy involves replacing data on a system while it passes between the data and application layers?
#179
CCSP Which of the following is a widely used tool for code development, branching, and collaboration?
#180