ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 40

Question list
Search
Search

What type of solution is at the core of virtually all directory services?

A.
WS
A.
WS
Answers
B.
LDAP
B.
LDAP
Answers
C.
ADFS
C.
ADFS
Answers
D.
PKI
D.
PKI
Answers
Suggested answer: B

Explanation:

The Lightweight Directory Access Protocol (LDAP) forms the basis of virtually all directory services, regardless of the specific vendor or software package.WS is a protocol for information exchange between two systems and does not actually store the data. ADFS is a Windows component for enabling single sign-on for the operating system and applications, but it relies on data from an LDAP server. PKI is used for managing and issuing security certificates.

The different cloud service models have varying levels of responsibilities for functions and operations depending with the model's level of service.

In which of the following models would the responsibility for patching lie predominantly with the cloud customer?

A.
DaaS
A.
DaaS
Answers
B.
SaaS
B.
SaaS
Answers
C.
PaaS
C.
PaaS
Answers
D.
IaaS
D.
IaaS
Answers
Suggested answer: D

Explanation:

With Infrastructure as a Service (IaaS), the cloud customer is responsible for deploying and maintaining its own systems and virtual machines. Therefore, the customer is solely responsible for patching and any other security updates it finds necessary. With Software as a Service (SaaS), Platform as a Service (PaaS), and Desktop as a Service (DaaS), the cloud provider maintains the infrastructure components and is responsible for maintaining and patching them.

Which component of ITIL involves the creation of an RFC ticket and obtaining official approvals for it?

A.
Problem management
A.
Problem management
Answers
B.
Release management
B.
Release management
Answers
C.
Deployment management
C.
Deployment management
Answers
D.
Change management
D.
Change management
Answers
Suggested answer: D

Explanation:

The change management process involves the creation of the official Request for Change (RFC) ticket, which is used to document the change, obtain the required approvals from management and stakeholders, and track the change to completion. Release management is a subcomponent of change management, where the actual code or configuration change is put into place. Deployment management is similar to release management, but it's where changes are actually implemented on systems. Problem management is focused on the identification and mitigation of known problems and deficiencies before they are able to occur.

Which of the following are attributes of cloud computing?

A.
Minimal management effort and shared resources
A.
Minimal management effort and shared resources
Answers
B.
High cost and unique resources
B.
High cost and unique resources
Answers
C.
Rapid provisioning and slow release of resources
C.
Rapid provisioning and slow release of resources
Answers
D.
Limited access and service provider interaction
D.
Limited access and service provider interaction
Answers
Suggested answer: A

Explanation:

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

In a cloud environment, encryption should be used for all the following, except:

A.
Secure sessions/VPN
A.
Secure sessions/VPN
Answers
B.
Long-term storage of data
B.
Long-term storage of data
Answers
C.
Near-term storage of virtualized images
C.
Near-term storage of virtualized images
Answers
D.
Profile formatting
D.
Profile formatting
Answers
Suggested answer: D

Explanation:

All of these activities should incorporate encryption, except for profile formatting, which is a made-up term.

Which of the following is considered a technological control?

A.
Firewall software
A.
Firewall software
Answers
B.
Firing personnel
B.
Firing personnel
Answers
C.
Fireproof safe
C.
Fireproof safe
Answers
D.
Fire extinguisher
D.
Fire extinguisher
Answers
Suggested answer: A

Explanation:

A firewall is a technological control. The safe and extinguisher are physical controls and firing someone is an administrative control.

When using an IaaS solution, what is the capability provided to the customer?

A.
To provision processing, storage, networks, and other fundamental computing resources when the consumer is able to deploy and run arbitrary software, which can include OSs and applications.
A.
To provision processing, storage, networks, and other fundamental computing resources when the consumer is able to deploy and run arbitrary software, which can include OSs and applications.
Answers
B.
To provision processing, storage, networks, and other fundamental computing resources when the auditor is able to deploy and run arbitrary software, which can include OSs and applications.
B.
To provision processing, storage, networks, and other fundamental computing resources when the auditor is able to deploy and run arbitrary software, which can include OSs and applications.
Answers
C.
To provision processing, storage, networks, and other fundamental computing resources when the provider is able to deploy and run arbitrary software, which can include OSs and applications.
C.
To provision processing, storage, networks, and other fundamental computing resources when the provider is able to deploy and run arbitrary software, which can include OSs and applications.
Answers
D.
To provision processing, storage, networks, and other fundamental computing resources when the consumer is not able to deploy and run arbitrary software, which can include OSs and applications.
D.
To provision processing, storage, networks, and other fundamental computing resources when the consumer is not able to deploy and run arbitrary software, which can include OSs and applications.
Answers
Suggested answer: A

Explanation:

According to "The NIST Definition of Cloud Computing," in IaaS, "the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).

When using an IaaS solution, what is a key benefit provided to the customer?

A.
Metered and priced on the basis of units consumed
A.
Metered and priced on the basis of units consumed
Answers
B.
Increased energy and cooling system efficiencies
B.
Increased energy and cooling system efficiencies
Answers
C.
Transferred cost of ownership
C.
Transferred cost of ownership
Answers
D.
The ability to scale up infrastructure services based on projected usage
D.
The ability to scale up infrastructure services based on projected usage
Answers
Suggested answer: A

Explanation:

IaaS has a number of key benefits for organizations, which include but are not limited to these: -- - Usage is metered and priced on the basis of units (or instances) consumed. This can also be billed back to specific departments or functions. - It has an ability to scale up and down infrastructure services based on actual usage. This is particularly useful and beneficial where there are significant spikes and dips within the usage curve for infrastructure. - It has a reduced cost of ownership. There is no need to buy assets for everyday use, no loss of asset value over time, and reduced costs of maintenance and support. - It has a reduced energy and cooling costs along with "green IT" environment effect with optimum use of IT resources and systems.

Which of the following is considered an administrative control?

A.
Keystroke logging
A.
Keystroke logging
Answers
B.
Access control process
B.
Access control process
Answers
C.
Door locks
C.
Door locks
Answers
D.
Biometric authentication
D.
Biometric authentication
Answers
Suggested answer: B

Explanation:

A process is an administrative control; sometimes, the process includes elements of other types of controls (in this case, the access control mechanism might be a technical control, or it might be a physical control), but the process itself is administrative. Keystroke logging is a technical control (or an attack, if done for malicious purposes, and not for auditing); door locks are a physical control; and biometric authentication is a technological control.

What is a key capability or characteristic of PaaS?

A.
Support for a homogenous environment
A.
Support for a homogenous environment
Answers
B.
Support for a single programming language
B.
Support for a single programming language
Answers
C.
Ability to reduce lock-in
C.
Ability to reduce lock-in
Answers
D.
Ability to manually scale
D.
Ability to manually scale
Answers
Suggested answer: C

Explanation:

PaaS should have the following key capabilities and characteristics:

- Support multiple languages and frameworks: PaaS should support multiple programming languages and frameworks, thus enabling the developers to code in whichever language they prefer or the design requirements specify. In recenttimes, significant strides and efforts have been taken to ensure that open source stacks are both supported and utilized, thus reducing "lock-in" or issues with interoperability when changing CSPs.

- Multiple hosting environments: The ability to support a wide variety of underlying hosting environments for the platform is key to meeting customer requirements and demands. Whether public cloud, private cloud, local hypervisor, or baremetal, supporting multiple hosting environments allows the application developer or administrator to migrate the application when and as required. This can also be used as a form of contingency and continuity and to ensure the ongoing availability.

- Flexibility: Traditionally, platform providers provided features and requirements that they felt suited the client requirements, along with what suited their service offering and positioned them as the provider of choice, with limited options forthe customers to move easily. This has changed drastically, with extensibility and flexibility now afforded to meeting the needs and requirements of developer audiences. This has been heavily influenced by open source, which allows relevant plug-ins to be quickly and efficiently introduced into the platform.

- Allow choice and reduce lock-in: PaaS learns from previous horror stories and restrictions, proprietary meant red tape, barriers, and restrictions on what developers could do when it came to migration or adding features and components tothe platform. Although the requirement to code to specific APIs was made available by the providers, they could run their apps in various environments based on commonality and standard API structures, ensuring a level of consistency and quality for customers and users.

- Ability to auto-scale: This enables the application to seamlessly scale up and down as required to accommodate the cyclical demands of users. The platform will allocate resources and assign these to the application as required. Thisserves as a key driver for any seasonal organizations that experience spikes and drops in usage.

Total 512 questions
Go to page: of 52