ISC CCSP Practice Test - Questions Answers, Page 12
Question 111
Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?
Explanation:
An SLA requires performance monitoring of CPU, memory, storage, and networking. The number of users active on a system would not be part of an SLA specifically, other than in regard to the impact on the other four variables.
Question 112
Which of the following is the MOST important requirement and guidance for testing during an audit?
Explanation:
During any audit, regulations are the most important factor and guidelines for what must be tested. Although the requirements from management, stakeholders, and shareholders are also important, regulations are not negotiable and pose the biggest risk to any organization for compliance failure.
Question 113
Which value refers to the amount of data an organization would need to recover in the event of a BCDR situation in order to reach an acceptable level of operations?
Explanation:
The recovery point objective (RPO) is defined as the amount of data a company would need to maintain and recover in order to function at a level acceptable to management. This may or may not be a restoration to full operating capacity, depending on what management deems as crucial and essential.
Question 114
What must SOAP rely on for security?
Explanation:
Simple Object Access Protocol (SOAP) uses Extensible Markup Language (XML) for passing data, and it must rely on the encryption of those data packages for security.
Question 115
Which of the following is a commonly used tool for maintaining system configurations?
Explanation:
Puppet is a commonly used tool for maintaining system configurations based on policies, and done so from a centralized authority.
Question 116
What type of data does data rights management (DRM) protect?
Explanation:
DRM applies to the protection of consumer media, such as music, publications, video, movies, and soon.
Question 117
Which type of testing uses the same strategies and toolsets that hackers would use?
Explanation:
Penetration testing involves using the same strategies and toolsets that hackers would use against a system to discovery potential vulnerabilities.
Question 118
From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions?
Explanation:
When a security professional is considering cloud solutions for BCDR, a top concern is the jurisdiction where the cloud systems are hosted. If the jurisdiction is different from where the production systems are hosted, they may be subjected to different regulations and controls, which would make a seamless BCDR solution far more difficult.
Question 119
Which of the following is NOT a focus or consideration of an internal audit?
Explanation:
In order to obtain and comply with certifications, independent external audits must be performed and satisfied. Although some testing of certification controls can be part of an internal audit, they will not satisfy requirements.
Question 120
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
Explanation:
Regardless of which cloud-hosting model is used, the cloud customer always has sole responsibility for the data and its security.
Question