ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 18

List of questions

Question 171

Report Export Collapse

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

Platform
Platform
Infrastructure
Infrastructure
Software
Software
Desktop
Desktop
Suggested answer: C
Explanation:

The software service capability gives the cloud customer a fully established application, where only minimal user configuration options are allowed.

asked 18/09/2024
Petros Kapouleas
50 questions

Question 172

Report Export Collapse

What does the "SOC" acronym refer to with audit reports?

Service Origin Confidentiality
Service Origin Confidentiality
System Organization Confidentiality
System Organization Confidentiality
Service Organizational Control
Service Organizational Control
System Organization Control
System Organization Control
Suggested answer: C
asked 18/09/2024
John Bascara
39 questions

Question 173

Report Export Collapse

What does the REST API use to protect data transmissions?

NetBIOS
NetBIOS
VPN
VPN
Encapsulation
Encapsulation
TLS
TLS
Suggested answer: D
Explanation:

Representational State Transfer (REST) uses TLS for communication over secured channels. Although REST also supports SSL, at this point SSL has been phased out due to vulnerabilities and has been replaced by TLS.

asked 18/09/2024
James Williams
38 questions

Question 174

Report Export Collapse

What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?

Masking
Masking
Anonymization
Anonymization
Tokenization
Tokenization
Obfuscation
Obfuscation
Suggested answer: C
Explanation:

Tokenization is the practice of utilizing a random and opaque "token" value in data to replace what otherwise would be a sensitive or protected data object. The token value is usually generated by the application with a means to map it back to the actual real value, and then the token value is placed in the data set with the same formatting and requirements of the actual real value so that the application can continue to function without different modifications or code changes.

asked 18/09/2024
ahmad hafiz
37 questions

Question 175

Report Export Collapse

With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?

Routing
Routing
Session
Session
Filtering
Filtering
Firewalling
Firewalling
Suggested answer: C
Explanation:

With software-defined networking (SDN), the filtering of network traffic is separated from the forwarding of network traffic so that it can be independently administered.

asked 18/09/2024
Dennis Bruyn
41 questions

Question 176

Report Export Collapse

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?

Applications
Applications
Key performance indicators (KPIs)
Key performance indicators (KPIs)
Services
Services
Security
Security
Suggested answer: B
Explanation:

KPIs fall under the "business" aspect of QoS, along with monitoring and measuring of events and business processes. Services, security, and applications are all core components and concepts of the "IT" aspect of QoS.

asked 18/09/2024
Jermaine Wells
43 questions

Question 177

Report Export Collapse

What does dynamic application security testing (DAST) NOT entail?

Scanning
Scanning
Probing
Probing
Discovery
Discovery
Knowledge of the system
Knowledge of the system
Suggested answer: D
Explanation:

Dynamic application security testing (DAST) is considered "black box" testing and begins with no inside knowledge of the application or its configurations.

Everything about the application must be discovered during the testing.

asked 18/09/2024
Heritier kandolo
49 questions

Question 178

Report Export Collapse

Where is an XML firewall most commonly deployed in the environment?

Between the application and data layers
Between the application and data layers
Between the IPS and firewall
Between the IPS and firewall
Between the presentation and application layers
Between the presentation and application layers
Between the firewall and application server
Between the firewall and application server
Suggested answer: D
Explanation:

XML firewalls are most commonly deployed in line between the firewall and application server to validate XML code before it reaches the application.

asked 18/09/2024
Islam Fadel
39 questions

Question 179

Report Export Collapse

What type of masking strategy involves replacing data on a system while it passes between the data and application layers?

Dynamic
Dynamic
Static
Static
Replication
Replication
Duplication
Duplication
Suggested answer: A
Explanation:

With dynamic masking, production environments are protected with the masking process being implemented between the application and data layers of the application. This allows for a masking translation to take place live in the system and during normal application processing of data.

asked 18/09/2024
Prakhar Sengar
35 questions

Question 180

Report Export Collapse

Which of the following is a widely used tool for code development, branching, and collaboration?

GitHub
GitHub
Maestro
Maestro
Orchestrator
Orchestrator
Conductor
Conductor
Suggested answer: A
Explanation:

GitHub is an open source tool that developers leverage for code collaboration, branching, and versioning.

asked 18/09/2024
Michele Valvason
44 questions
Total 512 questions
Go to page: of 52