Free Certification Practice Questions

ISC-CCSP

Loading…
CCSP The different cloud service models have varying levels of responsibilities for functions and operations depending with the model's level of service.In which of the following models would the responsibility for patching lie predominantly with the cloud customer?
#391
CCSP Which component of ITIL involves the creation of an RFC ticket and obtaining official approvals for it?
#392
CCSP Which of the following are attributes of cloud computing?
#393
CCSP In a cloud environment, encryption should be used for all the following, except:
#394
CCSP Which of the following is considered a technological control?
#395
CCSP When using an IaaS solution, what is the capability provided to the customer?
#396
CCSP When using an IaaS solution, what is a key benefit provided to the customer?
#397
CCSP Which of the following is considered an administrative control?
#398
CCSP What is a key capability or characteristic of PaaS?
#399
CCSP In which cloud service model is the customer required to maintain the OS?
#400
CCSP When using a PaaS solution, what is the capability provided to the customer?
#401
CCSP What are SOC 1/SOC 2/SOC 3?
#402
CCSP Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:
#403
CCSP In attempting to provide a layered defense, the security practitioner should convince senior management to include security controls of which type?
#404
CCSP The BIA can be used to provide information about all the following, except:
#405
CCSP Which of the following are cloud computing roles?
#406
CCSP Which of the following are considered to be the building blocks of cloud computing?
#407
CCSP Which of the following is considered a physical control?
#408
CCSP What is an experimental technology that is intended to create the possibility of processing encrypted data without having to decrypt it first?
#409
CCSP Which of the following are distinguishing characteristics of a managed service provider?
#410
CCSP To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:
#411
CCSP Tokenization requires two distinct _________________ .
#412
CCSP DLP can be combined with what other security technology to enhance data controls?
#413
CCSP What is the intellectual property protection for a confidential recipe for muffins?
#414
CCSP Every security program and process should have which of the following?
#415
CCSP DLP solutions can aid in deterring loss due to which of the following?
#416
CCSP All policies within the organization should include a section that includes all of the following, except:
#417
CCSP Proper implementation of DLP solutions for successful function requires which of the following?
#418
CCSP What is the experimental technology that might lead to the possibility of processing encrypted data without having to decrypt it first?
#419
CCSP Data labels could include all the following, except:
#420