ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 11

List of questions

Question 101

Report Export Collapse

Which if the following is NOT one of the three components of a federated identity system transaction?

Relying party
Relying party
Identity provider
Identity provider
User
User
Proxy relay
Proxy relay
Suggested answer: D
asked 18/09/2024
massamba gaye
26 questions

Question 102

Report Export Collapse

Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?

RSL
RSL
RPO
RPO
SRE
SRE
RTO
RTO
Suggested answer: D
Explanation:

The recovery time objective (RTO) is a measure of the amount of time it would take to recover operations in the event of a disaster to the point where management's objectives are met for BCDR.

asked 18/09/2024
Charles Marlin
43 questions

Question 103

Report Export Collapse

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

Community
Community
Hybrid
Hybrid
Private
Private
Public
Public
Suggested answer: A
Explanation:

A community cloud model is where customers that share a certain common bond or group membership come together to offer cloud services to their members, focused on common goals and interests.

asked 18/09/2024
Andreas Krieger
37 questions

Question 104

Report Export Collapse

What provides the information to an application to make decisions about the authorization level appropriate when granting access?

User
User
Relying party
Relying party
Federation
Federation
Identity Provider
Identity Provider
Suggested answer: D
Explanation:

Upon successful user authentication, the identity provider gives information about the user to the relying party that it needs to make authorization decisions for granting access as well as the level of access needed.

asked 18/09/2024
Ben Johnson
41 questions

Question 105

Report Export Collapse

What is a standard configuration and policy set that is applied to systems and virtual machines called?

Standardization
Standardization
Baseline
Baseline
Hardening
Hardening
Redline
Redline
Suggested answer: B
Explanation:

The most common and efficient manner of securing operating systems is through the use of baselines. A baseline is a standardized and understood set of base configurations and settings. When a new system is built or a new virtual machine is established, baselines will be applied to a new image to ensure the base configuration meets organizational policy and regulatory requirements.

asked 18/09/2024
Fermin Paneque Cabrera
44 questions

Question 106

Report Export Collapse

Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?

Russia
Russia
France
France
Germany
Germany
United States
United States
Suggested answer: A
Explanation:

Signed into law and effective starting on September 1, 2015, Russian Law 526-FZ establishes that any collecting, storing, or processing of personal information or data on Russian citizens must be done from systems and databases that are physically located with the Russian Federation.

asked 18/09/2024
Waleed Bahadaq
42 questions

Question 107

Report Export Collapse

Which of the cloud cross-cutting aspects relates to the ability to easily move services and applications between different cloud providers?

Reversibility
Reversibility
Availability
Availability
Portability
Portability
Interoperability
Interoperability
Suggested answer: C
Explanation:

Portability is the ease with which a service or application can be moved between different cloud providers. Maintaining portability gives an organization great flexibility between cloud providers and the ability to shop for better deals or offerings.

asked 18/09/2024
Manuel Ortega
48 questions

Question 108

Report Export Collapse

Which type of audit report is considered a "restricted use" report for its intended audience?

SAS-70
SAS-70
SSAE-16
SSAE-16
SOC Type 1
SOC Type 1
SOC Type 2
SOC Type 2
Suggested answer: C
Explanation:

SOC Type 1 reports are considered "restricted use" reports. They are intended for management and stakeholders of an organization, clients of the service organization, and auditors of the organization. They are not intended for release beyond those audiences.

asked 18/09/2024
Alexandru Ouatu
51 questions

Question 109

Report Export Collapse

What is the concept of segregating information or processes, within the same system or application, for security reasons?

fencing
fencing
Sandboxing
Sandboxing
Cellblocking
Cellblocking
Pooling
Pooling
Suggested answer: B
Explanation:

Sandboxing involves segregating and isolating information or processes from others within the same system or application, typically for security concerns. This is generally used for data isolation (for example, keeping different communities and populations of users isolated from other similar data).

asked 18/09/2024
Peter Lilley
56 questions

Question 110

Report Export Collapse

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?

2010
2010
2000
2000
1995
1995
1990
1990
Suggested answer: C
Explanation:

Adopted in 1995, Directive 95/46 EC establishes strong data protection and policy requirements, including the declaring of data privacy to be a human right. It establishes that an individual has the right to be notified when their personal data is being access or processed, that it only will ever be accessed for legitimate purposes, and that data will only be accessed to the exact extent it needs to be for the particular process or request.

asked 18/09/2024
Henry R L Thom
37 questions
Total 512 questions
Go to page: of 52