ISC CCSP Practice Test - Questions Answers, Page 35
List of questions
Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?
IRM solutions allow an organization to place different restrictions on data usage than would otherwise be possible through traditional security controls.
Which of the following controls would be possible with IRM that would not with traditional security controls?
Which data protection strategy would be useful for a situation where the ability to remove sensitive data from a set is needed, but a requirement to retain the ability to map back to the original values is also present?
A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.
However, what is one consideration that is often overlooked with the formulation of a BCDR plan?
Which of the following is NOT one of the components of multifactor authentication?
Above and beyond general regulations for data privacy and protection, certain types of data are subjected to more rigorous regulations and oversight.
Which of the following is not a regulatory framework for more sensitive or specialized data?
Which data sanitation method is also commonly referred to as "zeroing"?
What is the concept of isolating an application from the underlying operating system for testing purposes?
Which of the following could be used as a second component of multifactor authentication if a user has an RSA token?
Which of the following is NOT one of the official risk rating categories?
Question