ISC CCSP Practice Test - Questions Answers, Page 38
List of questions
Question 371
Which of the following is NOT a component of access control?
Question 372
What concept does the A represent within the DREAD model?
Question 373
With an application hosted in a cloud environment, who could be the recipient of an eDiscovery order?
Question 374
Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?
Question 375
Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?
Question 376
When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.
Which of the following would NOT be something that is predefined as part of the audit agreement?
Question 377
What concept does the D represent within the STRIDE threat model?
Question 378
Which of the following is the concept of segregating information or processes, within the same system or application, for security reasons?
Question 379
Which cloud service category most commonly uses client-side key management systems?
Question 380
Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?
Question