ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 11

Question list
Search
Search

Which if the following is NOT one of the three components of a federated identity system transaction?

A.
Relying party
A.
Relying party
Answers
B.
Identity provider
B.
Identity provider
Answers
C.
User
C.
User
Answers
D.
Proxy relay
D.
Proxy relay
Answers
Suggested answer: D

Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?

A.
RSL
A.
RSL
Answers
B.
RPO
B.
RPO
Answers
C.
SRE
C.
SRE
Answers
D.
RTO
D.
RTO
Answers
Suggested answer: D

Explanation:

The recovery time objective (RTO) is a measure of the amount of time it would take to recover operations in the event of a disaster to the point where management's objectives are met for BCDR.

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

A.
Community
A.
Community
Answers
B.
Hybrid
B.
Hybrid
Answers
C.
Private
C.
Private
Answers
D.
Public
D.
Public
Answers
Suggested answer: A

Explanation:

A community cloud model is where customers that share a certain common bond or group membership come together to offer cloud services to their members, focused on common goals and interests.

What provides the information to an application to make decisions about the authorization level appropriate when granting access?

A.
User
A.
User
Answers
B.
Relying party
B.
Relying party
Answers
C.
Federation
C.
Federation
Answers
D.
Identity Provider
D.
Identity Provider
Answers
Suggested answer: D

Explanation:

Upon successful user authentication, the identity provider gives information about the user to the relying party that it needs to make authorization decisions for granting access as well as the level of access needed.

What is a standard configuration and policy set that is applied to systems and virtual machines called?

A.
Standardization
A.
Standardization
Answers
B.
Baseline
B.
Baseline
Answers
C.
Hardening
C.
Hardening
Answers
D.
Redline
D.
Redline
Answers
Suggested answer: B

Explanation:

The most common and efficient manner of securing operating systems is through the use of baselines. A baseline is a standardized and understood set of base configurations and settings. When a new system is built or a new virtual machine is established, baselines will be applied to a new image to ensure the base configuration meets organizational policy and regulatory requirements.

Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?

A.
Russia
A.
Russia
Answers
B.
France
B.
France
Answers
C.
Germany
C.
Germany
Answers
D.
United States
D.
United States
Answers
Suggested answer: A

Explanation:

Signed into law and effective starting on September 1, 2015, Russian Law 526-FZ establishes that any collecting, storing, or processing of personal information or data on Russian citizens must be done from systems and databases that are physically located with the Russian Federation.

Which of the cloud cross-cutting aspects relates to the ability to easily move services and applications between different cloud providers?

A.
Reversibility
A.
Reversibility
Answers
B.
Availability
B.
Availability
Answers
C.
Portability
C.
Portability
Answers
D.
Interoperability
D.
Interoperability
Answers
Suggested answer: C

Explanation:

Portability is the ease with which a service or application can be moved between different cloud providers. Maintaining portability gives an organization great flexibility between cloud providers and the ability to shop for better deals or offerings.

Which type of audit report is considered a "restricted use" report for its intended audience?

A.
SAS-70
A.
SAS-70
Answers
B.
SSAE-16
B.
SSAE-16
Answers
C.
SOC Type 1
C.
SOC Type 1
Answers
D.
SOC Type 2
D.
SOC Type 2
Answers
Suggested answer: C

Explanation:

SOC Type 1 reports are considered "restricted use" reports. They are intended for management and stakeholders of an organization, clients of the service organization, and auditors of the organization. They are not intended for release beyond those audiences.

What is the concept of segregating information or processes, within the same system or application, for security reasons?

A.
fencing
A.
fencing
Answers
B.
Sandboxing
B.
Sandboxing
Answers
C.
Cellblocking
C.
Cellblocking
Answers
D.
Pooling
D.
Pooling
Answers
Suggested answer: B

Explanation:

Sandboxing involves segregating and isolating information or processes from others within the same system or application, typically for security concerns. This is generally used for data isolation (for example, keeping different communities and populations of users isolated from other similar data).

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?

A.
2010
A.
2010
Answers
B.
2000
B.
2000
Answers
C.
1995
C.
1995
Answers
D.
1990
D.
1990
Answers
Suggested answer: C

Explanation:

Adopted in 1995, Directive 95/46 EC establishes strong data protection and policy requirements, including the declaring of data privacy to be a human right. It establishes that an individual has the right to be notified when their personal data is being access or processed, that it only will ever be accessed for legitimate purposes, and that data will only be accessed to the exact extent it needs to be for the particular process or request.

Total 512 questions
Go to page: of 52