ISC CCSP Practice Test - Questions Answers, Page 25
List of questions
Three central concepts define what type of data and information an organization is responsible for pertaining to eDiscovery.
Which of the following are the three components that comprise required disclosure?
Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?
With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?
Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?
Which data state would be most likely to use TLS as a protection mechanism?
You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.
Which of the following would be the most appropriate action to take first?
If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?
Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?
Which of the following is considered an internal redundancy for a data center?
Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?
Question