ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

What process is used within a clustered system to provide high availability and load balancing?

Dynamic balancing
Dynamic balancing
Dynamic clustering
Dynamic clustering
Dynamic optimization
Dynamic optimization
Dynamic resource scheduling
Dynamic resource scheduling
Suggested answer: D
Explanation:

Dynamic resource scheduling (DRS) is used within all clustering systems as the method for clusters to provide high availability, scaling, management, and workload distribution and balancing of jobs and processes. From a physical infrastructure perspective, DRS is used to balance compute loads between physical hosts in a cloud to maintain the desired thresholds and limits on the physical hosts.

asked 18/09/2024
EduBP srl De Sanctis
37 questions

Question 122

Report Export Collapse

Which of the following is NOT a function performed by the handshake protocol of TLS?

Key exchange
Key exchange
Encryption
Encryption
Negotiation of connection
Negotiation of connection
Establish session ID
Establish session ID
Suggested answer: B
Explanation:

The handshake protocol negotiates and establishes the connection as well as handles the key exchange and establishes the session ID. It does not perform the actual encryption of data packets.

asked 18/09/2024
Marie Joyce Candice Dancel
44 questions

Question 123

Report Export Collapse

Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?

Six months
Six months
One month
One month
One year
One year
One week
One week
Suggested answer: A
Explanation:

SOC Type 2 reports are focused on the same policies and procedures, as well as their effectiveness, as SOC Type 1 reports, but are evaluated over a period of at least six consecutive months, rather than a finite point in time.

asked 18/09/2024
gregory damon
46 questions

Question 124

Report Export Collapse

What changes are necessary to application code in order to implement DNSSEC?

Adding encryption modules
Adding encryption modules
Implementing certificate validations
Implementing certificate validations
Additional DNS lookups
Additional DNS lookups
No changes are needed.
No changes are needed.
Suggested answer: D
Explanation:

To implement DNSSEC, no additional changes are needed to applications or their code because the integrity checks are all performed at the system level.

asked 18/09/2024
Dave Breath
54 questions

Question 125

Report Export Collapse

Which type of controls are the SOC Type 1 reports specifically focused on?

Integrity
Integrity
PII
PII
Financial
Financial
Privacy
Privacy
Suggested answer: C
Explanation:

SOC Type 1 reports are focused specifically on internal controls as they relate to financial reporting.

asked 18/09/2024
andrea rosi
49 questions

Question 126

Report Export Collapse

Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?

Integrity
Integrity
Availability
Availability
Confidentiality
Confidentiality
Nonrepudiation
Nonrepudiation
Suggested answer: C
Explanation:

The main goal of confidentiality is to ensure that sensitive information is not made available or leaked to parties that should not have access to it, while at the same time ensuring that those with appropriate need and authorization to access it can do so in a manner commensurate with their needs and confidentiality requirements.

asked 18/09/2024
Rodolfo Ponce
41 questions

Question 127

Report Export Collapse

Which of the following is NOT a domain of the Cloud Controls Matrix (CCM)?

Data center security
Data center security
Human resources
Human resources
Mobile security
Mobile security
Budgetary and cost controls
Budgetary and cost controls
Suggested answer: D
Explanation:

Budgetary and cost controls is not one of the domains outlined in the CCM.

asked 18/09/2024
Keletso Rafedile
38 questions

Question 128

Report Export Collapse

Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?

Sandboxing
Sandboxing
Encryption
Encryption
Firewalls
Firewalls
Access control
Access control
Suggested answer: B
Explanation:

In any environment, data encryption is incredibly important to prevent unauthorized exposure of data either internally or externally. If a system is compromised by an attack, having the data encrypted on the system will prevent its unauthorized exposure or export, even with the system itself being exposed.

asked 18/09/2024
samuel crook
50 questions

Question 129

Report Export Collapse

Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?

Platform
Platform
Data
Data
Physical environment
Physical environment
Infrastructure
Infrastructure
Suggested answer: C
Explanation:

Regardless of which cloud-hosting model is used, the cloud provider always has sole responsibility for the physical environment.

asked 18/09/2024
Ada Galilea
52 questions

Question 130

Report Export Collapse

Which of the following is NOT a factor that is part of a firewall configuration?

Encryption
Encryption
Port
Port
Protocol
Protocol
Source IP
Source IP
Suggested answer: A
Explanation:

Firewalls take into account source IP, destination IP, the port the traffic is using, as well as the network protocol (UDP/TCP). Whether or not the traffic is encrypted is not something a firewall is concerned with.

asked 18/09/2024
Vipul Ishan
43 questions
Total 512 questions
Go to page: of 52