ISC CCSP Practice Test - Questions Answers, Page 28
List of questions
DNSSEC was designed to add a layer of security to the DNS protocol.
Which type of attack was the DNSSEC extension designed to mitigate?
Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?
Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.
Which of the following compromise the two facets of computing?
With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?
Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.
Which of the following is NOT something that firewalls are concerned with?
Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.
What type of attack is this?
For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?
What does a cloud customer purchase or obtain from a cloud provider?
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
Question