ISC CCSP Practice Test - Questions Answers, Page 35

List of questions
Question 341

Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?
Question 342

IRM solutions allow an organization to place different restrictions on data usage than would otherwise be possible through traditional security controls.
Which of the following controls would be possible with IRM that would not with traditional security controls?
Question 343

Which data protection strategy would be useful for a situation where the ability to remove sensitive data from a set is needed, but a requirement to retain the ability to map back to the original values is also present?
Question 344

A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.
However, what is one consideration that is often overlooked with the formulation of a BCDR plan?
Question 345

Which of the following is NOT one of the components of multifactor authentication?
Question 346

Above and beyond general regulations for data privacy and protection, certain types of data are subjected to more rigorous regulations and oversight.
Which of the following is not a regulatory framework for more sensitive or specialized data?
Question 347

Which data sanitation method is also commonly referred to as "zeroing"?
Question 348

What is the concept of isolating an application from the underlying operating system for testing purposes?
Question 349

Which of the following could be used as a second component of multifactor authentication if a user has an RSA token?
Question 350

Which of the following is NOT one of the official risk rating categories?
Question