ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 38

List of questions

Question 371

Report
Export
Collapse

Which of the following is NOT a component of access control?

Accounting
Accounting
Federation
Federation
Authorization
Authorization
Authentication
Authentication
Suggested answer: B

Explanation:

Federation is not a component of access control. Instead, it is used to allow users possessing credentials from other authorities and systems to access services outside of their domain. This allows for access and trust without the need to create additional, local credentials. Access control encompasses not only the key concepts of authorization and authentication, but also accounting. Accounting consists of collecting and maintaining logs for both authentication and authorization for operational and regulatory requirements.

asked 18/09/2024
Ricardo Tellez
25 questions

Question 372

Report
Export
Collapse

What concept does the A represent within the DREAD model?

Affected users
Affected users
Authorization
Authorization
Authentication
Authentication
Affinity
Affinity
Suggested answer: A

Explanation:

The concept of affected users measures the percentage of users who would be impacted by a successful exploit. Scoring ranges from 0, which would impact no users, to 10, which would impact all users. None of the other options provided is the correct term.

asked 18/09/2024
inigo abeledo
39 questions

Question 373

Report
Export
Collapse

With an application hosted in a cloud environment, who could be the recipient of an eDiscovery order?

Users
Users
Both the cloud provider and cloud customer
Both the cloud provider and cloud customer
The cloud customer
The cloud customer
The cloud provider
The cloud provider
Suggested answer: B

Explanation:

Either the cloud customer or the cloud provider could receive an eDiscovery order, and in almost all circumstances they would need to work together to ensure compliance.

asked 18/09/2024
Jess Kendrick Gamboa
35 questions

Question 374

Report
Export
Collapse

Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?

Continuity management
Continuity management
Availability management
Availability management
Configuration management
Configuration management
Problem management
Problem management
Suggested answer: B

Explanation:

Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Continuity management (or business continuity management) is focused on planning for the successful restoration of systems or services after an unexpected outage, incident, or disaster. Configuration management tracks and maintains detailed information about all IT components within an organization.

Problem management is focused on identifying and mitigating known problems and deficiencies before they occur.

asked 18/09/2024
Ravi Kundu
31 questions

Question 375

Report
Export
Collapse

Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?

Problem management
Problem management
Continuity management
Continuity management
Availability management
Availability management
Configuration management
Configuration management
Suggested answer: D

Explanation:

Configuration management tracks and maintains detailed information about all IT components within an organization. Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Continuity management (or business continuity management) is focused on planning for the successful restoration of systems or services after an unexpected outage, incident, or disaster.

Problem management is focused on identifying and mitigating known problems and deficiencies before they occur.

asked 18/09/2024
Francis Sailer
43 questions

Question 376

Report
Export
Collapse

When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.

Which of the following would NOT be something that is predefined as part of the audit agreement?

Size
Size
Format
Format
Structure
Structure
Audience
Audience
Suggested answer: A

Explanation:

The ultimate size of the audit report is not something that would ever be included in the audit scope or definition. Decisions about the content of the report should be the only factor that drives the ultimate size of the report. The structure, audience, and format of the audit report are all crucial elements that must be defined and agreed upon as part of the audit scope.

asked 18/09/2024
Muhammad Atif Tasneem
36 questions

Question 377

Report
Export
Collapse

What concept does the D represent within the STRIDE threat model?

Denial of service
Denial of service
Distributed
Distributed
Data breach
Data breach
Data loss
Data loss
Suggested answer: A

Explanation:

Any application can be a possible target of denial of service (DoS) attacks. From the application side, the developers should minimize how many operations are performed for unauthenticated users. This will keep the application running as quickly as possible and using the least amount of system resources to help minimize the impact of any such attacks. None of the other options provided is the correct term.

asked 18/09/2024
Brian Foy
40 questions

Question 378

Report
Export
Collapse

Which of the following is the concept of segregating information or processes, within the same system or application, for security reasons?

Cell blocking
Cell blocking
Sandboxing
Sandboxing
Pooling
Pooling
Fencing
Fencing
Suggested answer: B

Explanation:

Sandboxing involves the segregation and isolation of information or processes from other information or processes within the same system or application, typically for security concerns. Sandboxing is generally used for data isolation (for example, keeping different communities and populations of users isolated from others with similar data). In IT terminology, pooling typically means bringing together and consolidating resources or services, not segregating or separating them. Cell blocking and fencing are both erroneous terms.

asked 18/09/2024
Arvind Prasad S
41 questions

Question 379

Report
Export
Collapse

Which cloud service category most commonly uses client-side key management systems?

Software as a Service
Software as a Service
Infrastructure as a Service
Infrastructure as a Service
Platform as a Service
Platform as a Service
Desktop as a Service
Desktop as a Service
Suggested answer: A

Explanation:

SaaS most commonly uses client-side key management. With this type of implementation, the software for doing key management is supplied by the cloud provider, but is hosted and run by the cloud customer. This allows for full integration with the SaaS implementation, but also provides full control to the cloud customer. Although the cloud provider may offer software for performing key management to the cloud customers, with the Infrastructure, Platform, and Desktop as a Service categories, the customers would largely be responsible for their own options and implementations and would not be bound by the offerings from the cloud provider.

asked 18/09/2024
Matthew Farrington
35 questions

Question 380

Report
Export
Collapse

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

TLS
TLS
HTTPS
HTTPS
VPN
VPN
IRM
IRM
Suggested answer: D

Explanation:

Information rights management (IRM) technologies allow security controls and policies to be enforced on a data object regardless of where it resides. They also allow for extended controls such as expirations and copying restrictions, which are not available through traditional control mechanisms. Hypertext Transfer Protocol Secure (HTTPS), virtual private network (VPN), and Transport Layer Security (TLS) are all technologies and protocols that are widely used with cloud implementations for secure access to systems and services and likely will be used in conjunction with other object data protection strategies.

asked 18/09/2024
Nick Sheremet
24 questions
Total 512 questions
Go to page: of 52