ISC CCSP Practice Test - Questions Answers, Page 38

List of questions
Question 371

Which of the following is NOT a component of access control?
Question 372

What concept does the A represent within the DREAD model?
Question 373

With an application hosted in a cloud environment, who could be the recipient of an eDiscovery order?
Question 374

Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?
Question 375

Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?
Question 376

When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.
Which of the following would NOT be something that is predefined as part of the audit agreement?
Question 377

What concept does the D represent within the STRIDE threat model?
Question 378

Which of the following is the concept of segregating information or processes, within the same system or application, for security reasons?
Question 379

Which cloud service category most commonly uses client-side key management systems?
Question 380

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?
Question