ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Cloud auditor
Cloud auditor
Inter-cloud provider
Inter-cloud provider
Cloud service broker
Cloud service broker
Cloud service developer
Cloud service developer
Suggested answer: D
Explanation:

The cloud service developer is responsible for developing and creating cloud components and services, as well as for testing and validating services.

asked 18/09/2024
Manuel Jong
44 questions

Question 2

Report Export Collapse

What is the best source for information about securing a physical asset's BIOS?

Security policies
Security policies
Manual pages
Manual pages
Vendor documentation
Vendor documentation
Regulations
Regulations
Suggested answer: C
Explanation:

Vendor documentation from the manufacturer of the physical hardware is the best source of best practices for securing the BIOS.

asked 18/09/2024
Hoang Son
48 questions

Question 3

Report Export Collapse

Which of the following is not a component of contractual PII?

Scope of processing
Scope of processing
Value of data
Value of data
Location of data
Location of data
Use of subcontractors
Use of subcontractors
Suggested answer: C
Explanation:

The value of data itself has nothing to do with it being considered a part of contractual

asked 18/09/2024
Michael Encarnado
38 questions

Question 4

Report Export Collapse

Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?

Consumable service
Consumable service
Measured service
Measured service
Billable service
Billable service
Metered service
Metered service
Suggested answer: B
Explanation:

Measured service is where cloud services are delivered and billed in a metered way, where the cloud customer only pays for those that they actually use, and for the duration of time that they use them.

asked 18/09/2024
Swen Leuning
55 questions

Question 5

Report Export Collapse

Which of the following roles involves testing, monitoring, and securing cloud services for an organization?

Cloud service integrator
Cloud service integrator
Cloud service business manager
Cloud service business manager
Cloud service user
Cloud service user
Cloud service administrator
Cloud service administrator
Suggested answer: D
Explanation:

The cloud service administrator is responsible for testing cloud services, monitoring services, administering security for services, providing usage reports on cloud services, and addressing problem reports

asked 18/09/2024
Fatawu Musah
37 questions

Question 6

Report Export Collapse

What is the only data format permitted with the SOAP API?

HTML
HTML
SAML
SAML
XSML
XSML
XML
XML
Suggested answer: D
Explanation:

The SOAP protocol only supports the XML data format.

asked 18/09/2024
Ana Roque
38 questions

Question 7

Report Export Collapse

Which data formats are most commonly used with the REST API?

JSON and SAML
JSON and SAML
XML and SAML
XML and SAML
XML and JSON
XML and JSON
SAML and HTML
SAML and HTML
Suggested answer: C
Explanation:

JavaScript Object Notation (JSON) and Extensible Markup Language (XML) are the most commonly used data formats for the Representational State Transfer (REST) API, and are typically implemented with caching for increased scalability and performance.

asked 18/09/2024
ALOUAT EKRAM
48 questions

Question 8

Report Export Collapse

Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?

Injection
Injection
Missing function-level access control
Missing function-level access control
Cross-site request forgery
Cross-site request forgery
Cross-site scripting
Cross-site scripting
Suggested answer: B
Explanation:

It is imperative that an application perform checks when each function or portion of the application is accessed, to ensure that the user is properly authorized to access it. Without continual checks each time a function is accessed, an attacker could forge requests to access portions of the application where authorization has not been granted.

asked 18/09/2024
Sascha Mintenbeck
33 questions

Question 9

Report Export Collapse

Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?

Cloud service user
Cloud service user
Cloud service business manager
Cloud service business manager
Cloud service administrator
Cloud service administrator
Cloud service integrator
Cloud service integrator
Suggested answer: B
Explanation:

The cloud service business manager is responsible for overseeing business and billing administration, purchasing cloud services, and requesting audit reports when necessary

asked 18/09/2024
Dawit Abegaz
29 questions

Question 10

Report Export Collapse

What is the biggest concern with hosting a key management system outside of the cloud environment?

Confidentiality
Confidentiality
Portability
Portability
Availability
Availability
Integrity
Integrity
Suggested answer: C
Explanation:

When a key management system is outside of the cloud environment hosting the application, availability is a primary concern because any access issues with the encryption keys will render the entire application unusable.

asked 18/09/2024
Ezrah James panuelos
39 questions
Total 512 questions
Go to page: of 52