ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.

Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

A.
SOC Type 2, one year
A.
SOC Type 2, one year
Answers
B.
SOC Type 1, one year
B.
SOC Type 1, one year
Answers
C.
SOC Type 2, one month
C.
SOC Type 2, one month
Answers
D.
SOC Type 2, six months
D.
SOC Type 2, six months
Answers
Suggested answer: D

Explanation:

SOC Type 2 audits are done over a period of time, with six months being the minimum duration. SOC Type 1 audits are designed with a scope that's a static point in time, and the other times provided for SOC Type 2 are incorrect.

With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?

A.
Filtering and forwarding
A.
Filtering and forwarding
Answers
B.
Filtering and firewalling
B.
Filtering and firewalling
Answers
C.
Firewalling and forwarding
C.
Firewalling and forwarding
Answers
D.
Forwarding and protocol
D.
Forwarding and protocol
Answers
Suggested answer: A

Explanation:

With SDN, the filtering and forwarding capabilities and administration are separated. This allows the cloud provider to build interfaces and management tools for administrative delegation of filtering configuration, without having to allow direct access to underlying network equipment. Firewalling and protocols are both terms related to networks, but they are not components SDN is concerned with.

Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.

Which of the following is the optimal temperature range as set by ASHRAE?

A.
69.8 to 86.0 degrees Fahrenheit (21 to 30 degrees Celsius)
A.
69.8 to 86.0 degrees Fahrenheit (21 to 30 degrees Celsius)
Answers
B.
51.8 to 66.2 degrees Fahrenheit (11 to 19 degrees Celsius)
B.
51.8 to 66.2 degrees Fahrenheit (11 to 19 degrees Celsius)
Answers
C.
64.4 to 80.6 degrees Fahrenheit (18 to 27 degrees Celsius)
C.
64.4 to 80.6 degrees Fahrenheit (18 to 27 degrees Celsius)
Answers
D.
44.6 to 60.8 degrees Fahrenheit (7 to 16 degrees Celsius)
D.
44.6 to 60.8 degrees Fahrenheit (7 to 16 degrees Celsius)
Answers
Suggested answer: C

Explanation:

The American Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE) recommends 64.4 to 80.6 degrees Fahrenheit (or 18 to 27 degrees Celsius) as the optimal temperature range for data centers. None of these options is the recommendation from ASHRAE.

Which of the following statements best describes a Type 1 hypervisor?

A.
The hypervisor software runs within an operating system tied to the hardware.
A.
The hypervisor software runs within an operating system tied to the hardware.
Answers
B.
The hypervisor software runs as a client on a server and needs an external service to administer it.
B.
The hypervisor software runs as a client on a server and needs an external service to administer it.
Answers
C.
The hypervisor software runs on top of an application layer.
C.
The hypervisor software runs on top of an application layer.
Answers
D.
The hypervisor software runs directly on "bare metal" without an intermediary.
D.
The hypervisor software runs directly on "bare metal" without an intermediary.
Answers
Suggested answer: D

Explanation:

With a Type 1 hypervisor, the hypervisor software runs directly on top of the bare-metal system, without any intermediary layer or hosting system. None of these statements describes a Type 1 hypervisor.

Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?

A.
Volume
A.
Volume
Answers
B.
Unstructured
B.
Unstructured
Answers
C.
Structured
C.
Structured
Answers
D.
Object
D.
Object
Answers
Suggested answer: A

Explanation:

Volume storage is allocated and mounted as a virtual hard drive within IaaS implementations, and it can be maintained and used the same way a traditional file system can. Object storage uses a flat structure on remote services that is accessed via opaque descriptors, structured storage resembles database storage, and unstructured storage is used to hold auxiliary files in conjunction with applications hosted within a PaaS implementation.

Which aspect of SaaS will alleviate much of the time and energy organizations spend on compliance (specifically baselines)?

A.
Maintenance
A.
Maintenance
Answers
B.
Licensing
B.
Licensing
Answers
C.
Standardization
C.
Standardization
Answers
D.
Development
D.
Development
Answers
Suggested answer: C

Explanation:

With the entire software platform being controlled by the cloud provider, the standardization of configurations and versioning is done automatically for the cloud customer. This alleviates the customer's need to track upgrades and releases for its own systems and development; instead, the onus is on the cloud provider.

Although licensing is the responsibility of the cloud customer within SaaS, it does not have an impact on compliance requirements. Within SaaS, development and maintenance of the system are solely the responsibility of the cloud provider.

Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.

Which of the following is NOT a technology for securing data in transit?

A.
VPN
A.
VPN
Answers
B.
TLS
B.
TLS
Answers
C.
DNSSEC
C.
DNSSEC
Answers
D.
HTTPS
D.
HTTPS
Answers
Suggested answer: C

Explanation:

DNSSEC is an extension of the normal DNS protocol that enables a system to verify the integrity of a DNS query resolution by signing it from the authoritative source and verifying the signing chain. It is not used for securing data transmissions or exchanges. HTTPS is the most common method for securing web service and data calls within a cloud, and TLS is the current standard for encrypting HTTPS traffic. VPNs are widely used for securing data transmissions and service access.

With a federated identity system, where would a user perform their authentication when requesting services or application access?

A.
Cloud provider
A.
Cloud provider
Answers
B.
The application
B.
The application
Answers
C.
Their home organization
C.
Their home organization
Answers
D.
Third-party authentication system
D.
Third-party authentication system
Answers
Suggested answer: C

Explanation:

With a federated identity system, a user will perform authentication with their home organization, and the application will accept the authentication tokens and user information from the identity provider in order to grant access. The purpose of a federated system is to allow users to authenticate from their home organization. Therefore, using the application or a third-party authentication system would be contrary to the purpose of a federated system because it necessitates the creation of additional accounts. The use of a cloud provider would not be relevant to the operations of a federated system.

Where is an XML firewall most commonly and effectively deployed in the environment?

A.
Between the application and data layers
A.
Between the application and data layers
Answers
B.
Between the presentation and application layers
B.
Between the presentation and application layers
Answers
C.
Between the IPS and firewall
C.
Between the IPS and firewall
Answers
D.
Between the firewall and application server
D.
Between the firewall and application server
Answers
Suggested answer: D

Explanation:

An XML firewall is most commonly deployed in line between the firewall and application server to validate XML code before it reaches the application. An XML firewall is intended to validate XML before it reaches the application. Placing the XML firewall between the presentation and application layers, between the firewall and IPS, or between the application and data layers would not serve the intended purpose.

Modern web service systems are designed for high availability and resiliency. Which concept pertains to the ability to detect problems within a system, environment, or application and programmatically invoke redundant systems or processes for mitigation?

A.
Elasticity
A.
Elasticity
Answers
B.
Redundancy
B.
Redundancy
Answers
C.
Fault tolerance
C.
Fault tolerance
Answers
D.
Automation
D.
Automation
Answers
Suggested answer: C

Explanation:

Fault tolerance allows a system to continue functioning, even with degraded performance, if portions of it fail or degrade, without the entire system or service being taken down. It can detect problems within a service and invoke compensating systems or functions to keep functionality going. Although redundancy is similar to fault tolerance, it is more focused on having additional copies of systems available, either active or passive, that can take up services if one system goes down. Elasticity pertains to the ability of a system to resize to meet demands, but it is not focused on system failures. Automation, and its role in maintaining large systems with minimal intervention, is not directly related to fault tolerance.

Total 512 questions
Go to page: of 52