ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 13

Question list
Search
Search

What process is used within a clustered system to provide high availability and load balancing?

A.
Dynamic balancing
A.
Dynamic balancing
Answers
B.
Dynamic clustering
B.
Dynamic clustering
Answers
C.
Dynamic optimization
C.
Dynamic optimization
Answers
D.
Dynamic resource scheduling
D.
Dynamic resource scheduling
Answers
Suggested answer: D

Explanation:

Dynamic resource scheduling (DRS) is used within all clustering systems as the method for clusters to provide high availability, scaling, management, and workload distribution and balancing of jobs and processes. From a physical infrastructure perspective, DRS is used to balance compute loads between physical hosts in a cloud to maintain the desired thresholds and limits on the physical hosts.

Which of the following is NOT a function performed by the handshake protocol of TLS?

A.
Key exchange
A.
Key exchange
Answers
B.
Encryption
B.
Encryption
Answers
C.
Negotiation of connection
C.
Negotiation of connection
Answers
D.
Establish session ID
D.
Establish session ID
Answers
Suggested answer: B

Explanation:

The handshake protocol negotiates and establishes the connection as well as handles the key exchange and establishes the session ID. It does not perform the actual encryption of data packets.

Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?

A.
Six months
A.
Six months
Answers
B.
One month
B.
One month
Answers
C.
One year
C.
One year
Answers
D.
One week
D.
One week
Answers
Suggested answer: A

Explanation:

SOC Type 2 reports are focused on the same policies and procedures, as well as their effectiveness, as SOC Type 1 reports, but are evaluated over a period of at least six consecutive months, rather than a finite point in time.

What changes are necessary to application code in order to implement DNSSEC?

A.
Adding encryption modules
A.
Adding encryption modules
Answers
B.
Implementing certificate validations
B.
Implementing certificate validations
Answers
C.
Additional DNS lookups
C.
Additional DNS lookups
Answers
D.
No changes are needed.
D.
No changes are needed.
Answers
Suggested answer: D

Explanation:

To implement DNSSEC, no additional changes are needed to applications or their code because the integrity checks are all performed at the system level.

Which type of controls are the SOC Type 1 reports specifically focused on?

A.
Integrity
A.
Integrity
Answers
B.
PII
B.
PII
Answers
C.
Financial
C.
Financial
Answers
D.
Privacy
D.
Privacy
Answers
Suggested answer: C

Explanation:

SOC Type 1 reports are focused specifically on internal controls as they relate to financial reporting.

Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?

A.
Integrity
A.
Integrity
Answers
B.
Availability
B.
Availability
Answers
C.
Confidentiality
C.
Confidentiality
Answers
D.
Nonrepudiation
D.
Nonrepudiation
Answers
Suggested answer: C

Explanation:

The main goal of confidentiality is to ensure that sensitive information is not made available or leaked to parties that should not have access to it, while at the same time ensuring that those with appropriate need and authorization to access it can do so in a manner commensurate with their needs and confidentiality requirements.

Which of the following is NOT a domain of the Cloud Controls Matrix (CCM)?

A.
Data center security
A.
Data center security
Answers
B.
Human resources
B.
Human resources
Answers
C.
Mobile security
C.
Mobile security
Answers
D.
Budgetary and cost controls
D.
Budgetary and cost controls
Answers
Suggested answer: D

Explanation:

Budgetary and cost controls is not one of the domains outlined in the CCM.

Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?

A.
Sandboxing
A.
Sandboxing
Answers
B.
Encryption
B.
Encryption
Answers
C.
Firewalls
C.
Firewalls
Answers
D.
Access control
D.
Access control
Answers
Suggested answer: B

Explanation:

In any environment, data encryption is incredibly important to prevent unauthorized exposure of data either internally or externally. If a system is compromised by an attack, having the data encrypted on the system will prevent its unauthorized exposure or export, even with the system itself being exposed.

Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?

A.
Platform
A.
Platform
Answers
B.
Data
B.
Data
Answers
C.
Physical environment
C.
Physical environment
Answers
D.
Infrastructure
D.
Infrastructure
Answers
Suggested answer: C

Explanation:

Regardless of which cloud-hosting model is used, the cloud provider always has sole responsibility for the physical environment.

Which of the following is NOT a factor that is part of a firewall configuration?

A.
Encryption
A.
Encryption
Answers
B.
Port
B.
Port
Answers
C.
Protocol
C.
Protocol
Answers
D.
Source IP
D.
Source IP
Answers
Suggested answer: A

Explanation:

Firewalls take into account source IP, destination IP, the port the traffic is using, as well as the network protocol (UDP/TCP). Whether or not the traffic is encrypted is not something a firewall is concerned with.

Total 512 questions
Go to page: of 52