ISC CCSP Practice Test - Questions Answers, Page 13
List of questions
What process is used within a clustered system to provide high availability and load balancing?
Which of the following is NOT a function performed by the handshake protocol of TLS?
Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?
What changes are necessary to application code in order to implement DNSSEC?
Which type of controls are the SOC Type 1 reports specifically focused on?
Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?
Which of the following is NOT a domain of the Cloud Controls Matrix (CCM)?
Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?
Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?
Which of the following is NOT a factor that is part of a firewall configuration?
Question