ISC CCSP Practice Test - Questions Answers, Page 28
List of questions
Question 271
DNSSEC was designed to add a layer of security to the DNS protocol.
Which type of attack was the DNSSEC extension designed to mitigate?
Question 272
Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?
Question 273
Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.
Which of the following compromise the two facets of computing?
Question 274
With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?
Question 275
Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.
Which of the following is NOT something that firewalls are concerned with?
Question 276
Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
Question 277
Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.
What type of attack is this?
Question 278
For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?
Question 279
What does a cloud customer purchase or obtain from a cloud provider?
Question 280
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
Question