ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 27

Add to Whishlist

List of questions

Question 261

Report Export Collapse

Many aspects and features of cloud computing can make eDiscovery compliance more difficult or costly.

Which aspect of cloud computing would be the MOST complicating factor?

Become a Premium Member for full access
  Unlock Premium Member

Question 262

Report Export Collapse

A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it's best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within a cloud.

What is the biggest advantage to leasing space in a data center versus procuring cloud services?

Become a Premium Member for full access
  Unlock Premium Member

Question 263

Report Export Collapse

Which of the following systems is used to employ a variety of different techniques to discover and alert on threats and potential threats to systems and networks?

Become a Premium Member for full access
  Unlock Premium Member

Question 264

Report Export Collapse

Which of the following is not a risk management framework?

Become a Premium Member for full access
  Unlock Premium Member

Question 265

Report Export Collapse

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

Become a Premium Member for full access
  Unlock Premium Member

Question 266

Report Export Collapse

Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user's valid credentials?

Become a Premium Member for full access
  Unlock Premium Member

Question 267

Report Export Collapse

Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.

What term pertains to the application of scientific norms and protocols to digital investigations?

Become a Premium Member for full access
  Unlock Premium Member

Question 268

Report Export Collapse

Within a federated identity system, which entity accepts tokens from the identity provider?

Become a Premium Member for full access
  Unlock Premium Member

Question 269

Report Export Collapse

Different types of audits are intended for different audiences, such as internal, external, regulatory, and so on.

Which of the following audits are considered "restricted use" versus being for a more broad audience?

Become a Premium Member for full access
  Unlock Premium Member

Question 270

Report Export Collapse

Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?

Become a Premium Member for full access
  Unlock Premium Member
Total 512 questions
Go to page: of 52
Search