ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 23

Add to Whishlist

List of questions

Question 221

Report Export Collapse

Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?

Become a Premium Member for full access
  Unlock Premium Member

Question 222

Report Export Collapse

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

Become a Premium Member for full access
  Unlock Premium Member

Question 223

Report Export Collapse

Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?

Become a Premium Member for full access
  Unlock Premium Member

Question 224

Report Export Collapse

The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/ contractors.

What technology would be useful for protecting data at this point?

Become a Premium Member for full access
  Unlock Premium Member

Question 225

Report Export Collapse

When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.

What is the data encapsulation used with the SOAP protocol referred to as?

Become a Premium Member for full access
  Unlock Premium Member

Question 226

Report Export Collapse

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

Become a Premium Member for full access
  Unlock Premium Member

Question 227

Report Export Collapse

Which of the following is NOT one of the main intended goals of a DLP solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 228

Report Export Collapse

Data center and operations design traditionally takes a tiered, topological approach.

Which of the following standards is focused on that approach and is prevalently used throughout the industry?

Become a Premium Member for full access
  Unlock Premium Member

Question 229

Report Export Collapse

Jurisdictions have a broad range of privacy requirements pertaining to the handling of personal data and information.

Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?

Become a Premium Member for full access
  Unlock Premium Member

Question 230

Report Export Collapse

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

Become a Premium Member for full access
  Unlock Premium Member
Total 512 questions
Go to page: of 52
Search