ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 35

Add to Whishlist

List of questions

Question 341

Report Export Collapse

Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?

Become a Premium Member for full access
  Unlock Premium Member

Question 342

Report Export Collapse

IRM solutions allow an organization to place different restrictions on data usage than would otherwise be possible through traditional security controls.

Which of the following controls would be possible with IRM that would not with traditional security controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 343

Report Export Collapse

Which data protection strategy would be useful for a situation where the ability to remove sensitive data from a set is needed, but a requirement to retain the ability to map back to the original values is also present?

Become a Premium Member for full access
  Unlock Premium Member

Question 344

Report Export Collapse

A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.

However, what is one consideration that is often overlooked with the formulation of a BCDR plan?

Become a Premium Member for full access
  Unlock Premium Member

Question 345

Report Export Collapse

Which of the following is NOT one of the components of multifactor authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 346

Report Export Collapse

Above and beyond general regulations for data privacy and protection, certain types of data are subjected to more rigorous regulations and oversight.

Which of the following is not a regulatory framework for more sensitive or specialized data?

Become a Premium Member for full access
  Unlock Premium Member

Question 347

Report Export Collapse

Which data sanitation method is also commonly referred to as "zeroing"?

Become a Premium Member for full access
  Unlock Premium Member

Question 348

Report Export Collapse

What is the concept of isolating an application from the underlying operating system for testing purposes?

Become a Premium Member for full access
  Unlock Premium Member

Question 349

Report Export Collapse

Which of the following could be used as a second component of multifactor authentication if a user has an RSA token?

Become a Premium Member for full access
  Unlock Premium Member

Question 350

Report Export Collapse

Which of the following is NOT one of the official risk rating categories?

Become a Premium Member for full access
  Unlock Premium Member
Total 512 questions
Go to page: of 52
Search