Free Certification Practice Questions

ISC-CCSP

Loading…
CCSP On large distributed systems with pooled resources, cloud computing relies on extensive orchestration to maintain the environment and the constant provisioning of resources.Which of the following is crucial to the orchestration and automation of networking resources within a cloud?
#301
CCSP BCDR strategies do not typically involve the entire operations of an organization, but only those deemed critical to their business.Which concept pertains to the amount of services that need to be recovered to meet BCDR objectives?
#302
CCSP During the course of an audit, which of the following would NOT be an input into the control requirements used as part of a gap analysis.
#303
CCSP The GAPP framework was developed through a joint effort between the major Canadian and American professional accounting associations in order to assist their members with managing and preventing risks to the privacy of their data and customers.Which of the following is the meaning of GAPP?
#304
CCSP Which protocol operates at the network layer and provides for full point-to-point encryption of all communications and transmissions?
#305
CCSP When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.Which of the following is NOT one of the three main approaches to data discovery?
#306
CCSP There are many situations when testing a BCDR plan is appropriate or mandated.Which of the following would not be a necessary time to test a BCDR plan?
#307
CCSP Key maintenance and security are paramount within a cloud environment due to the widespread use of encryption for both data and transmissions.Which of the following key-management systems would provide the most robust control over and ownership of the key-management processes for the cloud customer?
#308
CCSP Security is a critical yet often overlooked consideration for BCDR planning.At which stage of the planning process should security be involved?
#309
CCSP Which type of testing uses the same strategies and toolsets that hackers would use?
#310
CCSP Which of the following statements about Type 1 hypervisors is true?
#311
CCSP Which format is the most commonly used standard for exchanging information within a federated identity system?
#312
CCSP Which ITIL component is focused on anticipating predictable problems and ensuring that configurations and operations are in place to prevent these problems from ever occurring?
#313
CCSP Which of the following areas of responsibility would be shared between the cloud customer and cloud provider within the Software as a Service (SaaS) category?
#314
CCSP When a system needs to be exposed to the public Internet, what type of secure system would be used to perform only the desired operations?
#315
CCSP With the rapid emergence of cloud computing, very few regulations were in place that pertained to it specifically, and organizations often had to resort to using a collection of regulations that were not specific to cloud in order to drive audits and policies.Which standard from the ISO/IEC was designed specifically for cloud computing?
#316
CCSP Which of the following is NOT considered a type of data loss?
#317
CCSP Which of the following jurisdictions lacks a comprehensive national policy on data privacy and the protection of personally identifiable information (PII)?
#318
CCSP Which component of ITIL involves planning for the restoration of services after an unexpected outage or incident?
#319
CCSP Which component of ITIL pertains to planning, coordinating, executing, and validating changes and rollouts to production environments?
#320
CCSP What process entails taking sensitive data and removing the indirect identifiers from each data object so that the identification of a single entity would not be possible?
#321
CCSP Because cloud providers will not give detailed information out about their infrastructures and practices to the general public, they will often use established auditing reports to ensure public trust, where the reputation of the auditors serves for assurance.Which type of audit reports can be used for general public trust assurances?
#322
CCSP Which of the following concepts is NOT one of the core components to an encryption system architecture?
#323
CCSP For optimal security, trust zones are used for network segmentation and isolation. They allow for the separation of various systems and tiers, each with its own security level.Which of the following is typically used to allow administrative personnel access to trust zones?
#324
CCSP Which of the following is NOT a major regulatory framework?
#325
CCSP As part of the auditing process, getting a report on the deviations between intended configurations and actual policy is often crucial for an organization.What term pertains to the process of generating such a report?
#326
CCSP An audit scope statement defines the limits and outcomes from an audit.Which of the following would NOT be included as part of an audit scope statement?
#327
CCSP What concept and operational process must be spelled out clearly, as far as roles and responsibilities go, between the cloud provider and cloud customer for the mitigation of any problems or security events?
#328
CCSP Your new CISO is placing increased importance and focus on regulatory compliance as your applications and systems move into cloud environments.Which of the following would NOT be a major focus of yours as you develop a project plan to focus on regulatory compliance?
#329
CCSP Cloud systems are increasingly used for BCDR solutions for organizations.What aspect of cloud computing makes their use for BCDR the most attractive?
#330