ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 3

Question list
Search
Search

Within an Infrastructure as a Service model, which of the following would NOT be a measured service?

A.
CPU
A.
CPU
Answers
B.
Storage
B.
Storage
Answers
C.
Number of users
C.
Number of users
Answers
D.
Memory
D.
Memory
Answers
Suggested answer: C

Explanation:

Within IaaS, the number of users on a system is not relevant to the particular hosting model in regard to cloud resources. IaaS is focused on infrastructure needs of a system or application. Therefore, a factor such as the number of users that could affect licensing requirements, for example, would apply to the SaaS model, or in some instances to PaaS.

Which of the following is NOT a criterion for data within the scope of eDiscovery?

A.
Possession
A.
Possession
Answers
B.
Custody
B.
Custody
Answers
C.
Control
C.
Control
Answers
D.
Archive
D.
Archive
Answers
Suggested answer: D

Explanation:

eDiscovery pertains to information and data that is in the possession, control, and custody of an organization.

Which United States law is focused on accounting and financial practices of organizations?

A.
Safe Harbor
A.
Safe Harbor
Answers
B.
GLBA
B.
GLBA
Answers
C.
SOX
C.
SOX
Answers
D.
HIPAA
D.
HIPAA
Answers
Suggested answer: C

Explanation:

The Sarbanes-Oxley (SOX) Act is not an act that pertains to privacy or IT security directly, but rather regulates accounting and financial practices used by organizations. It was passed to protect stakeholders and shareholders from improper practices and errors, and it sets forth rules for compliance, regulated and enforced by the Securities and Exchange Commission (SEC). The main influence on IT systems and operations is the requirements it sets for data retention, specifically in regard to what types of records must be preserved and for how long.

What type of masking strategy involves making a separate and distinct copy of data with masking in place?

A.
Dynamic
A.
Dynamic
Answers
B.
Replication
B.
Replication
Answers
C.
Static
C.
Static
Answers
D.
Duplication
D.
Duplication
Answers
Suggested answer: C

Explanation:

With static masking, a separate and distinct copy of the data set is created with masking in place. This is typically done through a script or other process that takes a standard data set, processes it to mask the appropriate and predefined fields, and then outputs the data set as a new one with the completed masking done.

Which of the following storage types is most closely associated with a database-type storage implementation?

A.
Object
A.
Object
Answers
B.
Unstructured
B.
Unstructured
Answers
C.
Volume
C.
Volume
Answers
D.
Structured
D.
Structured
Answers
Suggested answer: D

Explanation:

Structured storage involves organized and categorized data, which most closely resembles and operates like a database system would.

Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?

A.
Cloud service manager
A.
Cloud service manager
Answers
B.
Cloud service deployment
B.
Cloud service deployment
Answers
C.
Cloud service business manager
C.
Cloud service business manager
Answers
D.
Cloud service operations manager
D.
Cloud service operations manager
Answers
Suggested answer: C

Explanation:

The cloud service business manager is responsible for overseeing business plans and customer relationships as well as processing financial transactions.

Which protocol does the REST API depend on?

A.
HTTP
A.
HTTP
Answers
B.
XML
B.
XML
Answers
C.
SAML
C.
SAML
Answers
D.
SSH
D.
SSH
Answers
Suggested answer: A

Explanation:

Representational State Transfer (REST) is a software architectural scheme that applies the components, connectors, and data conduits for many web applications used on the Internet. It uses and relies on the HTTP protocol and supports a variety of data formats.

Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the

European Union?

A.
GLBA
A.
GLBA
Answers
B.
HIPAA
B.
HIPAA
Answers
C.
Safe Harbor
C.
Safe Harbor
Answers
D.
SOX
D.
SOX
Answers
Suggested answer: C

Explanation:

Due to the lack of an adequate privacy law or protection at the federal level in the United States, European privacy regulations generally prohibit the exporting or sharing of PII from Europe with the United States. Participation in the Safe Harbor program is voluntary on behalf of an organization, but it does require them to conform to specific requirements and policies that mirror those from the EU. Thus, organizations can fulfill requirements for data sharing and export and possibly serve customers in the EU.

What is the biggest benefit to leasing space in a data center versus building or maintain your own?

A.
Certification
A.
Certification
Answers
B.
Costs
B.
Costs
Answers
C.
Regulation
C.
Regulation
Answers
D.
Control
D.
Control
Answers
Suggested answer: B

Explanation:

When leasing space in a data center, an organization can avoid the enormous startup and building costs associated with a data center, and can instead leverage economies of scale by grouping with other organizations and sharing costs.

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

A.
Dedicated switches
A.
Dedicated switches
Answers
B.
Trust zones
B.
Trust zones
Answers
C.
Redundant network circuits
C.
Redundant network circuits
Answers
D.
Direct connections
D.
Direct connections
Answers
Suggested answer: B

Explanation:

Trust zones can be implemented to separate systems or tiers along logical lines for great security and access controls. Each zone can then have its own security controls and monitoring based on its particular needs.

Total 512 questions
Go to page: of 52