ISC CCSP Practice Test - Questions Answers, Page 38
Which of the following is NOT a component of access control?
What concept does the A represent within the DREAD model?
With an application hosted in a cloud environment, who could be the recipient of an eDiscovery order?
Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?
Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?
When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.
Which of the following would NOT be something that is predefined as part of the audit agreement?
What concept does the D represent within the STRIDE threat model?
Which of the following is the concept of segregating information or processes, within the same system or application, for security reasons?
Which cloud service category most commonly uses client-side key management systems?
Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?
Question