ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 23

List of questions

Question 221

Report Export Collapse

Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?

Cross-site request forgery
Cross-site request forgery
Missing function-level access control
Missing function-level access control
Injection
Injection
Cross-site scripting
Cross-site scripting
Suggested answer: B
Explanation:

It is imperative that applications do checks when each function or portion of the application is accessed to ensure that the user is properly authorized. Without continual checks each time a function is accessed, an attacker could forge requests to access portions of the application where authorization has not been granted. An injection attack is where a malicious actor sends commands or other arbitrary data through input and data fields with the intent of having the application or system execute the code as part of its normal processing and queries. Cross-site scripting occurs when an attacker is able to send untrusted data to a user's browser without going through validation processes. Cross-site request forgery occurs when an attack forces an authenticated user to send forged requests to an application running under their own access and credentials.

asked 18/09/2024
Christian Andrew TANAP
50 questions

Question 222

Report Export Collapse

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

Distributed clustering
Distributed clustering
Distributed balancing
Distributed balancing
Distributed optimization
Distributed optimization
Distributed resource scheduling
Distributed resource scheduling
Suggested answer: D
Explanation:

Distributed resource scheduling (DRS) is used within all clustered systems as the method for providing high availability, scaling, management, workload distribution, and the balancing of jobs and processes. None of the other choices is the correct term in this case.

asked 18/09/2024
Jag Patel
34 questions

Question 223

Report Export Collapse

Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?

SAML and HTML
SAML and HTML
XML and SAML
XML and SAML
XML and JSON
XML and JSON
JSON and SAML
JSON and SAML
Suggested answer: C
Explanation:

JavaScript Object Notation (JSON) and Extensible Markup Language (XML) are the most commonly used data formats for the Representational State Transfer (REST) API and are typically implemented with caching for increased scalability and performance. Extensible Markup Language (XML) and Security Assertion

Markup Language (SAML) are both standards for exchanging encoded data between two parties, with XML being for more general use and SAML focused on authentication and authorization data. HTML is used for authoring web pages for consumption by web browsers

asked 18/09/2024
Karl Ranson
47 questions

Question 224

Report Export Collapse

The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/ contractors.

What technology would be useful for protecting data at this point?

IDS
IDS
DLP
DLP
IPS
IPS
WAF
WAF
Suggested answer: B
Explanation:

Data loss prevention (DLP) solutions allow for control of data outside of the application or original system. They can enforce granular control such as printing, copying, and being read by others, as well as forcing expiration of access. Intrusion detection system (IDS) and intrusion prevention system (IPS) solutions are used for detecting and blocking suspicious and malicious traffic, respectively, whereas a web application firewall (WAF) is used for enforcing security or other controls on web-based applications.

asked 18/09/2024
Alex Amponsah
44 questions

Question 225

Report Export Collapse

When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.

What is the data encapsulation used with the SOAP protocol referred to as?

Packet
Packet
Payload
Payload
Object
Object
Envelope
Envelope
Suggested answer: D
Explanation:

Simple Object Access Protocol (SOAP) encapsulates its information in what is known as a SOAP envelope. It then leverages common communications protocols for transmission. Object is a type of cloud storage, but also a commonly used term with certain types of programming languages. Packet and payload are terms that sound similar to envelope but are not correct in this case.

asked 18/09/2024
Haitham Hanash
33 questions

Question 226

Report Export Collapse

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

Hypervisor
Hypervisor
Management plane
Management plane
Object storage
Object storage
Encryption
Encryption
Suggested answer: B
Explanation:

The management plane will have broad administrative access to all host systems throughout an environment; as such, it represents the most pressing security concerns. A compromise of the management plane can directly lead to compromises of any other systems within the environment. Although hypervisors represent a significant security concern to an environment because their compromise would expose any virtual systems hosted within them, the management plane is a better choice in this case because it controls multiple hypervisors. Encryption and object storage both represent lower-level security concerns.

asked 18/09/2024
AN KANGWOOK
51 questions

Question 227

Report Export Collapse

Which of the following is NOT one of the main intended goals of a DLP solution?

Showing due diligence
Showing due diligence
Preventing malicious insiders
Preventing malicious insiders
Regulatory compliance
Regulatory compliance
Managing and minimizing risk
Managing and minimizing risk
Suggested answer: B
Explanation:

Data loss prevention (DLP) extends the capabilities for data protection beyond the standard and traditional security controls that are offered by operating systems, application containers, and network devices. DLP is not specifically implemented to counter malicious insiders, and would not be particularly effective in doing so, because a malicious insider with legitimate access would have other ways to obtain data. DLP is a set of practices and controls to manage and minimize risk, comply with regulatory requirements, and show due diligence with the protection of data.

asked 18/09/2024
James Scott
46 questions

Question 228

Report Export Collapse

Data center and operations design traditionally takes a tiered, topological approach.

Which of the following standards is focused on that approach and is prevalently used throughout the industry?

IDCA
IDCA
NFPA
NFPA
BICSI
BICSI
Uptime Institute
Uptime Institute
Suggested answer: D
Explanation:

The Uptime Institute publishes the most widely known and used standard for data center topologies and tiers. The National Fire Protection Association (NFPA) publishes a broad range of fire safety and design standards for many different types of facilities. Building Industry Consulting Services International (BICSI) issues certifications for data center cabling. The International Data Center Authority (IDCA) offers the Infinity Paradigm, which takes a macro-level approach to data center design.

asked 18/09/2024
Zakarya Doqa
26 questions

Question 229

Report Export Collapse

Jurisdictions have a broad range of privacy requirements pertaining to the handling of personal data and information.

Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?

Japan
Japan
United States
United States
European Union
European Union
Russia
Russia
Suggested answer: D
Explanation:

The Russian government requires all data and processing of information about its citizens to be done solely on systems and applications that reside within the physical borders of the country. The United States, European Union, and Japan focus their data privacy laws on requirements and methods for the protection of data, rather than where the data physically resides.

asked 18/09/2024
Opeyemi Oguntodu
41 questions

Question 230

Report Export Collapse

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

APIs
APIs
Scripts
Scripts
TLS
TLS
XML
XML
Suggested answer: A
Explanation:

The management plane uses APIs to execute remote calls across the cloud environment to various management systems, especially hypervisors. This allows a centralized administrative interface, often a web portal, to orchestrate tasks throughout an enterprise. Scripts may be utilized to execute API calls, but they are not used directly to interact with systems. XML is used for data encoding and transmission, but not for executing remote calls. TLS is used to encrypt communications and may be used with API calls, but it is not the actual process for executing commands.

asked 18/09/2024
Amir Trujillo
41 questions
Total 512 questions
Go to page: of 52
Search