ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 38

Question list
Search
Search

Which of the following is NOT a component of access control?

A.
Accounting
A.
Accounting
Answers
B.
Federation
B.
Federation
Answers
C.
Authorization
C.
Authorization
Answers
D.
Authentication
D.
Authentication
Answers
Suggested answer: B

Explanation:

Federation is not a component of access control. Instead, it is used to allow users possessing credentials from other authorities and systems to access services outside of their domain. This allows for access and trust without the need to create additional, local credentials. Access control encompasses not only the key concepts of authorization and authentication, but also accounting. Accounting consists of collecting and maintaining logs for both authentication and authorization for operational and regulatory requirements.

What concept does the A represent within the DREAD model?

A.
Affected users
A.
Affected users
Answers
B.
Authorization
B.
Authorization
Answers
C.
Authentication
C.
Authentication
Answers
D.
Affinity
D.
Affinity
Answers
Suggested answer: A

Explanation:

The concept of affected users measures the percentage of users who would be impacted by a successful exploit. Scoring ranges from 0, which would impact no users, to 10, which would impact all users. None of the other options provided is the correct term.

With an application hosted in a cloud environment, who could be the recipient of an eDiscovery order?

A.
Users
A.
Users
Answers
B.
Both the cloud provider and cloud customer
B.
Both the cloud provider and cloud customer
Answers
C.
The cloud customer
C.
The cloud customer
Answers
D.
The cloud provider
D.
The cloud provider
Answers
Suggested answer: B

Explanation:

Either the cloud customer or the cloud provider could receive an eDiscovery order, and in almost all circumstances they would need to work together to ensure compliance.

Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?

A.
Continuity management
A.
Continuity management
Answers
B.
Availability management
B.
Availability management
Answers
C.
Configuration management
C.
Configuration management
Answers
D.
Problem management
D.
Problem management
Answers
Suggested answer: B

Explanation:

Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Continuity management (or business continuity management) is focused on planning for the successful restoration of systems or services after an unexpected outage, incident, or disaster. Configuration management tracks and maintains detailed information about all IT components within an organization.

Problem management is focused on identifying and mitigating known problems and deficiencies before they occur.

Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?

A.
Problem management
A.
Problem management
Answers
B.
Continuity management
B.
Continuity management
Answers
C.
Availability management
C.
Availability management
Answers
D.
Configuration management
D.
Configuration management
Answers
Suggested answer: D

Explanation:

Configuration management tracks and maintains detailed information about all IT components within an organization. Availability management is focused on making sure system resources, processes, personnel, and toolsets are properly allocated and secured to meet SLA requirements. Continuity management (or business continuity management) is focused on planning for the successful restoration of systems or services after an unexpected outage, incident, or disaster.

Problem management is focused on identifying and mitigating known problems and deficiencies before they occur.

When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.

Which of the following would NOT be something that is predefined as part of the audit agreement?

A.
Size
A.
Size
Answers
B.
Format
B.
Format
Answers
C.
Structure
C.
Structure
Answers
D.
Audience
D.
Audience
Answers
Suggested answer: A

Explanation:

The ultimate size of the audit report is not something that would ever be included in the audit scope or definition. Decisions about the content of the report should be the only factor that drives the ultimate size of the report. The structure, audience, and format of the audit report are all crucial elements that must be defined and agreed upon as part of the audit scope.

What concept does the D represent within the STRIDE threat model?

A.
Denial of service
A.
Denial of service
Answers
B.
Distributed
B.
Distributed
Answers
C.
Data breach
C.
Data breach
Answers
D.
Data loss
D.
Data loss
Answers
Suggested answer: A

Explanation:

Any application can be a possible target of denial of service (DoS) attacks. From the application side, the developers should minimize how many operations are performed for unauthenticated users. This will keep the application running as quickly as possible and using the least amount of system resources to help minimize the impact of any such attacks. None of the other options provided is the correct term.

Which of the following is the concept of segregating information or processes, within the same system or application, for security reasons?

A.
Cell blocking
A.
Cell blocking
Answers
B.
Sandboxing
B.
Sandboxing
Answers
C.
Pooling
C.
Pooling
Answers
D.
Fencing
D.
Fencing
Answers
Suggested answer: B

Explanation:

Sandboxing involves the segregation and isolation of information or processes from other information or processes within the same system or application, typically for security concerns. Sandboxing is generally used for data isolation (for example, keeping different communities and populations of users isolated from others with similar data). In IT terminology, pooling typically means bringing together and consolidating resources or services, not segregating or separating them. Cell blocking and fencing are both erroneous terms.

Which cloud service category most commonly uses client-side key management systems?

A.
Software as a Service
A.
Software as a Service
Answers
B.
Infrastructure as a Service
B.
Infrastructure as a Service
Answers
C.
Platform as a Service
C.
Platform as a Service
Answers
D.
Desktop as a Service
D.
Desktop as a Service
Answers
Suggested answer: A

Explanation:

SaaS most commonly uses client-side key management. With this type of implementation, the software for doing key management is supplied by the cloud provider, but is hosted and run by the cloud customer. This allows for full integration with the SaaS implementation, but also provides full control to the cloud customer. Although the cloud provider may offer software for performing key management to the cloud customers, with the Infrastructure, Platform, and Desktop as a Service categories, the customers would largely be responsible for their own options and implementations and would not be bound by the offerings from the cloud provider.

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

A.
TLS
A.
TLS
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
VPN
C.
VPN
Answers
D.
IRM
D.
IRM
Answers
Suggested answer: D

Explanation:

Information rights management (IRM) technologies allow security controls and policies to be enforced on a data object regardless of where it resides. They also allow for extended controls such as expirations and copying restrictions, which are not available through traditional control mechanisms. Hypertext Transfer Protocol Secure (HTTPS), virtual private network (VPN), and Transport Layer Security (TLS) are all technologies and protocols that are widely used with cloud implementations for secure access to systems and services and likely will be used in conjunction with other object data protection strategies.

Total 512 questions
Go to page: of 52