ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 28

Add to Whishlist

List of questions

Question 271

Report Export Collapse

DNSSEC was designed to add a layer of security to the DNS protocol.

Which type of attack was the DNSSEC extension designed to mitigate?

Become a Premium Member for full access
  Unlock Premium Member

Question 272

Report Export Collapse

Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?

Become a Premium Member for full access
  Unlock Premium Member

Question 273

Report Export Collapse

Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.

Which of the following compromise the two facets of computing?

Become a Premium Member for full access
  Unlock Premium Member

Question 274

Report Export Collapse

With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?

Become a Premium Member for full access
  Unlock Premium Member

Question 275

Report Export Collapse

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.

Which of the following is NOT something that firewalls are concerned with?

Become a Premium Member for full access
  Unlock Premium Member

Question 276

Report Export Collapse

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?

Become a Premium Member for full access
  Unlock Premium Member

Question 277

Report Export Collapse

Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.

What type of attack is this?

Become a Premium Member for full access
  Unlock Premium Member

Question 278

Report Export Collapse

For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?

Become a Premium Member for full access
  Unlock Premium Member

Question 279

Report Export Collapse

What does a cloud customer purchase or obtain from a cloud provider?

Become a Premium Member for full access
  Unlock Premium Member

Question 280

Report Export Collapse

Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?

Become a Premium Member for full access
  Unlock Premium Member
Total 512 questions
Go to page: of 52
Search