ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 19

List of questions

Question 181

Report Export Collapse

Which aspect of security is DNSSEC designed to ensure?

Integrity
Integrity
Authentication
Authentication
Availability
Availability
Confidentiality
Confidentiality
Suggested answer: A
Explanation:

DNSSEC is a security extension to the regular DNS protocol and services that allows for the validation of the integrity of DNS lookups. It does not address confidentiality or availability at all. It allows for a DNS client to perform DNS lookups and validate both their origin and authority via the cryptographic signature that accompanies the DNS response.

asked 18/09/2024
Andrew dela Cruz
36 questions

Question 182

Report Export Collapse

Which process serves to prove the identity and credentials of a user requesting access to an application or data?

Repudiation
Repudiation
Authentication
Authentication
Identification
Identification
Authorization
Authorization
Suggested answer: B
Explanation:

Authentication is the process of proving whether the identity presented by a user is true and valid. This can be done through common mechanisms such as user ID and password combinations or with more secure methods such as multifactor authentication.

asked 18/09/2024
xczzxc zzxczxxz
45 questions

Question 183

Report Export Collapse

Who would be responsible for implementing IPsec to secure communications for an application?

Developers
Developers
Systems staff
Systems staff
Auditors
Auditors
Cloud customer
Cloud customer
Suggested answer: B
Explanation:

Because IPsec is implemented at the system or network level, it is the responsibility of the systems staff. IPsec removes the responsibility from developers, whereas other technologies such as TLS would be implemented by developers.

asked 18/09/2024
MARTIN WEAVER
41 questions

Question 184

Report Export Collapse

What is the minimum regularity for testing a BCDR plan to meet best practices?

Once year
Once year
Once a month
Once a month
Every six months
Every six months
When the budget allows it
When the budget allows it
Suggested answer: A
Explanation:

Best practices and industry standards dictate that a BCDR solution should be tested at least once a year, though specific regulatory requirements may dictate more regular testing. The BCDR plan should also be tested whenever a major modification to a system occurs.

asked 18/09/2024
Piotr Szwajkowski
39 questions

Question 185

Report Export Collapse

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?

Broad network access
Broad network access
Interoperability
Interoperability
Resource pooling
Resource pooling
Portability
Portability
Suggested answer: A
Explanation:

With a typical BCDR solution, an organization would need some number of staff to quickly travel to the location of the BCDR site to configure systems and applications for recovery. With a cloud environment, everything is done over broad network access, with no need (or even possibility) to travel to a remote site at any time.

asked 18/09/2024
Adetutu Ogunsowo
49 questions

Question 186

Report Export Collapse

Which of the following is NOT part of a retention policy?

Format
Format
Costs
Costs
Accessibility
Accessibility
Duration
Duration
Suggested answer: B
Explanation:

The data retention policy covers the duration, format, technologies, protection, and accessibility of archives, but does not address the specific costs of its implementation and maintenance.

asked 18/09/2024
Alexey Bokov
42 questions

Question 187

Report Export Collapse

Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?

Interoperability
Interoperability
Resource pooling
Resource pooling
Portability
Portability
Measured service
Measured service
Suggested answer: D
Explanation:

Measured service means that costs are only incurred when a cloud customer is actually using cloud services. This is ideal for a business continuity and disaster recovery (BCDR) solution because it negates the need to keep hardware or resources on standby in case of a disaster. Services can be initiated when needed and without costs unless needed.

asked 18/09/2024
Stefan Duerr
40 questions

Question 188

Report Export Collapse

Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?

Hybrid
Hybrid
Community
Community
Private
Private
Public
Public
Suggested answer: D
Explanation:

Because the public cloud model is available to everyone, in most instances all a customer will need to do to gain access is set up an account and provide a credit card number through the service's web portal. No additional contract negotiations, agreements, or specific group memberships are typically needed to get started.

asked 18/09/2024
Geetanjali Singh
40 questions

Question 189

Report Export Collapse

Which of the following is NOT something that an HIDS will monitor?

Configurations
Configurations
User logins
User logins
Critical system files
Critical system files
Network traffic
Network traffic
Suggested answer: B
Explanation:

A host intrusion detection system (HIDS) monitors network traffic as well as critical system files and configurations.

asked 18/09/2024
Tamas Szekely
38 questions

Question 190

Report Export Collapse

Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed?

IPS
IPS
WAF
WAF
Firewall
Firewall
IDS
IDS
Suggested answer: D
Explanation:

An intrusion detection system (IDS) is designed to analyze network packets, compare their contents or characteristics against a set of configurations or signatures, and alert personnel if anything is detected that could constitute a threat or is otherwise designated for alerting.

asked 18/09/2024
Brandon Walters
38 questions
Total 512 questions
Go to page: of 52