ISC CCSP Practice Test - Questions Answers, Page 28

List of questions
Question 271

DNSSEC was designed to add a layer of security to the DNS protocol.
Which type of attack was the DNSSEC extension designed to mitigate?
Question 272

Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?
Question 273

Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.
Which of the following compromise the two facets of computing?
Question 274

With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?
Question 275

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.
Which of the following is NOT something that firewalls are concerned with?
Question 276

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
Question 277

Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.
What type of attack is this?
Question 278

For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?
Question 279

What does a cloud customer purchase or obtain from a cloud provider?
Question 280

Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
Question