ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 14

List of questions

Question 131

Report Export Collapse

Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?

Community
Community
Public
Public
Hybrid
Hybrid
Private
Private
Suggested answer: C
Explanation:

A hybrid cloud model involves the use of more than one type of cloud hosting models, typically the mix of private and public cloud hosting models.

asked 18/09/2024
Robert Thompson
35 questions

Question 132

Report Export Collapse

Which of the following is NOT one of five principles of SOC Type 2 audits?

Privacy
Privacy
Processing integrity
Processing integrity
Financial
Financial
Security
Security
Suggested answer: C
Explanation:

The SOC Type 2 audits include five principles: security, privacy, processing integrity, availability, and confidentiality.

asked 18/09/2024
Yohane Phompho
35 questions

Question 133

Report Export Collapse

Which aspect of cloud computing makes data classification even more vital than in a traditional data center?

Interoperability
Interoperability
Virtualization
Virtualization
Multitenancy
Multitenancy
Portability
Portability
Suggested answer: C
Explanation:

With multiple tenants within the same hosting environment, any failure to properly classify data may lead to potential exposure to other customers and applications within the same environment.

asked 18/09/2024
Paul Tierney
44 questions

Question 134

Report Export Collapse

What concept does the "T" represent in the STRIDE threat model?

TLS
TLS
Testing
Testing
Tampering with data
Tampering with data
Transport
Transport
Suggested answer: C
Explanation:

Any application that sends data to the user will face the potential that the user could manipulate or alter the data, whether it resides in cookies, GET or POST commands, or headers, or manipulates client-side validations. If the user receives data from the application, it is crucial that the application validate and verify any data that is received back from the user.

asked 18/09/2024
Dina Elizabeth Perez de Paz
44 questions

Question 135

Report Export Collapse

Which of the following would be a reason to undertake a BCDR test?

Functional change of the application
Functional change of the application
Change in staff
Change in staff
User interface overhaul of the application
User interface overhaul of the application
Change in regulations
Change in regulations
Suggested answer: A
Explanation:

Any time a major functional change of an application occurs, a new BCDR test should be done to ensure the overall strategy and process are still applicable and appropriate.

asked 18/09/2024
Ed Robbins
33 questions

Question 136

Report Export Collapse

What is the biggest challenge to data discovery in a cloud environment?

Format
Format
Ownership
Ownership
Location
Location
Multitenancy
Multitenancy
Suggested answer: C
Explanation:

With the distributed nature of cloud environments, the foremost challenge for data discovery is awareness of the location of data and keeping track of it during the constant motion of cloud storage systems.

asked 18/09/2024
Nichal Maharaj
49 questions

Question 137

Report Export Collapse

Which crucial aspect of cloud computing can be most threatened by insecure APIs?

Automation
Automation
Redundancy
Redundancy
Resource pooling
Resource pooling
Elasticity
Elasticity
Suggested answer: A
Explanation:

Cloud environments depend heavily on API calls for management and automation. Any vulnerability with the APIs can cause significant risk and exposure to all tenants of the cloud environment.

asked 18/09/2024
Cesar Augusto Veliz Reyes
52 questions

Question 138

Report Export Collapse

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?

Functionality
Functionality
Programming languages
Programming languages
Software platform
Software platform
Security requirements
Security requirements
Suggested answer: D
Explanation:

Security requirements should be incorporated into the software development lifecycle (SDLC) from the earliest requirement gathering stage and should be incorporated prior to the requirement analysis phase.

asked 18/09/2024
Tristan Zerner
50 questions

Question 139

Report Export Collapse

Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?

Service-level agreements
Service-level agreements
Governance
Governance
Regulatory requirements
Regulatory requirements
Auditability
Auditability
Suggested answer: B
Explanation:

Governance at its core is the idea of assigning jobs, takes, roles, and responsibilities and ensuring they are satisfactory performed.

asked 18/09/2024
Cesar Paredes
34 questions

Question 140

Report Export Collapse

Which regulatory system pertains to the protection of healthcare data?

HIPAA
HIPAA
HAS
HAS
HITECH
HITECH
HFCA
HFCA
Suggested answer: A
Explanation:

The Health Insurance Portability and Accountability Act (HIPAA) sets stringent requirements in the United States for the protection of healthcare records.

asked 18/09/2024
martijn Spelt
46 questions
Total 512 questions
Go to page: of 52