ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 31

Question list
Search
Search

List of questions

Search

On large distributed systems with pooled resources, cloud computing relies on extensive orchestration to maintain the environment and the constant provisioning of resources.

Which of the following is crucial to the orchestration and automation of networking resources within a cloud?

A.
DNSSEC
A.
DNSSEC
Answers
B.
DNS
B.
DNS
Answers
C.
DCOM
C.
DCOM
Answers
D.
DHCP
D.
DHCP
Answers
Suggested answer: D

Explanation:

The Dynamic Host Configuration Protocol (DHCP) automatically configures network settings for a host so that these settings do not need to be configured on the host statically. Given the rapid and programmatic provisioning of resources within a cloud environment, this capability is crucial to cloud operations. Both DNS and its security-integrity extension DNSSEC provide name resolution to IP addresses, but neither is used for the configuration of network settings on a host. DCOM refers to the Distributed Component Object Model, which was developed by Microsoft as a means to request services across a network, and is not used for network configurations at all.

BCDR strategies do not typically involve the entire operations of an organization, but only those deemed critical to their business.

Which concept pertains to the amount of services that need to be recovered to meet BCDR objectives?

A.
RSL
A.
RSL
Answers
B.
RTO
B.
RTO
Answers
C.
RPO
C.
RPO
Answers
D.
SRE
D.
SRE
Answers
Suggested answer: A

Explanation:

The recovery service level (RSL) measures the percentage of operations that would be recovered during a BCDR situation. The recovery point objective (RPO) sets and defines the amount of data an organization must have available or accessible to reach the determined level of operations necessary during a BCDR situation. The recovery time objective (RTO) measures the amount of time necessary to recover operations to meet the BCDR plan. SRE is provided as an erroneous response.

During the course of an audit, which of the following would NOT be an input into the control requirements used as part of a gap analysis.

A.
Contractual requirements
A.
Contractual requirements
Answers
B.
Regulations
B.
Regulations
Answers
C.
Vendor recommendations
C.
Vendor recommendations
Answers
D.
Corporate policy
D.
Corporate policy
Answers
Suggested answer: C

Explanation:

Vendor recommendations would not be pertinent to the gap analysis after an audit. Although vendor recommendations will typically play a role in the development of corporate policies or contractual requirements, they are not required. Regulations, corporate policy, and contractual requirements all determine the expected or mandated controls in place on a system.

The GAPP framework was developed through a joint effort between the major Canadian and American professional accounting associations in order to assist their members with managing and preventing risks to the privacy of their data and customers.

Which of the following is the meaning of GAPP?

A.
General accounting personal privacy
A.
General accounting personal privacy
Answers
B.
Generally accepted privacy practices
B.
Generally accepted privacy practices
Answers
C.
Generally accepted privacy principles
C.
Generally accepted privacy principles
Answers
D.
General accounting privacy policies
D.
General accounting privacy policies
Answers
Suggested answer: C

Which protocol operates at the network layer and provides for full point-to-point encryption of all communications and transmissions?

A.
IPSec
A.
IPSec
Answers
B.
VPN
B.
VPN
Answers
C.
SSL
C.
SSL
Answers
D.
TLS
D.
TLS
Answers
Suggested answer: A

Explanation:

IPSec is a protocol for encrypting and authenticating packets during transmission between two parties and can involve any type of device, application, or service.

The protocol performs both the authentication and negotiation of security policies between the two parties at the start of the connection and then maintains these policies throughout the lifetime of the connection. TLS operates at the application layer, not the network layer, and is widely used to secure communications between two parties. SSL is similar to TLS but has been deprecated. Although a VPN allows a secure channel for communications into a private network from an outside location, it's not a protocol.

When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.

Which of the following is NOT one of the three main approaches to data discovery?

A.
Content analysis
A.
Content analysis
Answers
B.
Hashing
B.
Hashing
Answers
C.
Labels
C.
Labels
Answers
D.
Metadata
D.
Metadata
Answers
Suggested answer: B

Explanation:

Hashing involves taking a block of data and, through the use of a one-way operation, producing a fixed-size value that can be used for comparison with other data. It is used primarily for protecting data and allowing for rapid comparison when matching data values such as passwords. Labels involve looking for header information or other categorizations of data to determine its type and possible classifications. Metadata involves looking at information attributes of the data, such as creator, application, type, and so on, in determining classification. Content analysis involves examining the actual data itself for its composition and classification level.

There are many situations when testing a BCDR plan is appropriate or mandated.

Which of the following would not be a necessary time to test a BCDR plan?

A.
After software updates
A.
After software updates
Answers
B.
After regulatory changes
B.
After regulatory changes
Answers
C.
After major configuration changes
C.
After major configuration changes
Answers
D.
Annually
D.
Annually
Answers
Suggested answer: B

Explanation:

Regulatory changes by themselves would not trigger a need for new testing of a BCDR plan. Any changes necessary for regulatory compliance would be accomplished through configuration changes or software updates, which in turn would then trigger the necessary new testing. Annual testing is crucial to any BCDR plan. Also, any time major configuration changes or software updates are done, the plan should be evaluated and tested to ensure it is still valid and complete.

Key maintenance and security are paramount within a cloud environment due to the widespread use of encryption for both data and transmissions.

Which of the following key-management systems would provide the most robust control over and ownership of the key-management processes for the cloud customer?

A.
Remote key management service
A.
Remote key management service
Answers
B.
Local key management service
B.
Local key management service
Answers
C.
Client key management service
C.
Client key management service
Answers
D.
Internal key management service
D.
Internal key management service
Answers
Suggested answer: A

Explanation:

A remote key management system resides away from the cloud environment and is owned and controlled by the cloud customer. With the use of a remote service, the cloud customer can avoid being locked into a proprietary system from the cloud provider, but also must ensure that service is compatible with the services offered by the cloud provider. A local key management system resides on the actual servers using the keys, which does not provide optimal security or control over them. Both the terms internal key management service and client key management service are provided as distractors.

Security is a critical yet often overlooked consideration for BCDR planning.

At which stage of the planning process should security be involved?

A.
Scope definition
A.
Scope definition
Answers
B.
Requirements gathering
B.
Requirements gathering
Answers
C.
Analysis
C.
Analysis
Answers
D.
Risk assessment
D.
Risk assessment
Answers
Suggested answer: A

Explanation:

Defining the scope of the plan is the very first step in the overall process. Security should be included from the very earliest stages and throughout the entire process. Bringing in security at a later stage can lead to additional costs and time delays to compensate for gaps in planning. Risk assessment, requirements gathering, and analysis are all later steps in the process, and adding in security at any of those points can potentially cause increased costs and time delays.

Which type of testing uses the same strategies and toolsets that hackers would use?

A.
Static
A.
Static
Answers
B.
Malicious
B.
Malicious
Answers
C.
Penetration
C.
Penetration
Answers
D.
Dynamic
D.
Dynamic
Answers
Suggested answer: C

Explanation:

Penetration testing involves using the same strategies and toolsets that hackers would use against a system to discovery potential vulnerabilities. Although the term malicious captures much of the intent of penetration testing from the perspective of an attacker, it is not the best answer. Static and dynamic are two types of system testing--where static is done offline and with knowledge of the system, and dynamic is done on a live system without any previous knowledge is associated--but neither describes the type of testing being asked for in the question.

Total 512 questions
Go to page: of 52