ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 43

Question list
Search
Search

Data labels could include all the following, except:

A.
Multifactor authentication
A.
Multifactor authentication
Answers
B.
Access restrictions
B.
Access restrictions
Answers
C.
Confidentiality level
C.
Confidentiality level
Answers
D.
Distribution limitations
D.
Distribution limitations
Answers
Suggested answer: A

Explanation:

All the others might be included in data labels, but multifactor authentication is a procedure used for access control, not a label.

In the cloud motif, the data owner is usually:

A.
The cloud provider
A.
The cloud provider
Answers
B.
In another jurisdiction
B.
In another jurisdiction
Answers
C.
The cloud customer
C.
The cloud customer
Answers
D.
The cloud access security broker
D.
The cloud access security broker
Answers
Suggested answer: C

Explanation:

The data owner is usually considered the cloud customer in a cloud configuration; the data in question-is the customer's information, being processed in the cloud. The cloud provider is only leasing services and hardware to the customer. The cloud access security broker (CASB) only handles access control on behalf of the cloud customer, and is not in direct contact with the production data.

The goals of DLP solution implementation include all of the following, except:

A.
Elasticity
A.
Elasticity
Answers
B.
Policy enforcement
B.
Policy enforcement
Answers
C.
Data discovery
C.
Data discovery
Answers
D.
Loss of mitigation
D.
Loss of mitigation
Answers
Suggested answer: A

Explanation:

DLP does not have anything to do with elasticity, which is the capability of the environment to scale up or down according to demand. All the rest are goals of DLP implementations.

What is the intellectual property protection for a useful manufacturing innovation?

A.
Trademark
A.
Trademark
Answers
B.
Copyright
B.
Copyright
Answers
C.
patent
C.
patent
Answers
D.
Trade secret
D.
Trade secret
Answers
Suggested answer: C

Explanation:

Patents protect processes (as well as inventions, new plantlife, and decorative patterns). The other answers listed are answers to other questions.

The most pragmatic option for data disposal in the cloud is which of the following?

A.
Cryptoshredding
A.
Cryptoshredding
Answers
B.
Overwriting
B.
Overwriting
Answers
C.
Cold fusion
C.
Cold fusion
Answers
D.
Melting
D.
Melting
Answers
Suggested answer: A

Explanation:

We don't have physical ownership, control, or even access to the devices holding the data, so physical destruction, including melting, is not an option.

Overwriting is a possibility, but it is complicated by the difficulty of locating all the sectors and storage areas that might have contained our data, and by the likelihood that constant backups in the cloud increase the chance we'll miss something as it's being overwritten. Cryptoshredding is the only reasonable alternative. Cold fusion is a red herring.

In the cloud motif, the data processor is usually:

A.
The cloud customer
A.
The cloud customer
Answers
B.
The cloud provider
B.
The cloud provider
Answers
C.
The cloud access security broker
C.
The cloud access security broker
Answers
D.
The party that assigns access rights
D.
The party that assigns access rights
Answers
Suggested answer: B

Explanation:

In legal terms, when "data processor" is defined, it refers to anyone who stores, handles, moves, or manipulates data on behalf of the data owner or controller. In the cloud computing realm, this is the cloud provider.

What is the intellectual property protection for the tangible expression of a creative idea?

A.
Trade secret
A.
Trade secret
Answers
B.
Copyright
B.
Copyright
Answers
C.
Trademark
C.
Trademark
Answers
D.
Patent
D.
Patent
Answers
Suggested answer: B

Explanation:

Copyrights are protected tangible expressions of creative works. The other answers listed are answers to subsequent questions.

The goals of SIEM solution implementation include all of the following, except:

A.
Dashboarding
A.
Dashboarding
Answers
B.
Performance enhancement
B.
Performance enhancement
Answers
C.
Trend analysis
C.
Trend analysis
Answers
D.
Centralization of log streams
D.
Centralization of log streams
Answers
Suggested answer: B

Explanation:

SIEM does not intend to provide any enhancement of performance; in fact, a SIEM solution may decrease performance because of additional overhead. All the rest are goals of SIEM implementations.

Data masking can be used to provide all of the following functionality, except:

A.
Secure remote access
A.
Secure remote access
Answers
B.
test data in sandboxed environments
B.
test data in sandboxed environments
Answers
C.
Authentication of privileged users
C.
Authentication of privileged users
Answers
D.
Enforcing least privilege
D.
Enforcing least privilege
Answers
Suggested answer: C

Explanation:

Data masking does not support authentication in any way. All the others are excellent use cases for data masking.

All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except:

A.
Tokenization
A.
Tokenization
Answers
B.
Masking
B.
Masking
Answers
C.
Data discovery
C.
Data discovery
Answers
D.
Obfuscation
D.
Obfuscation
Answers
Suggested answer: C

Explanation:

Data discovery is a term used to describe the process of identifying information according to specific traits or categories. The rest are all methods for obscuring data.

Total 512 questions
Go to page: of 52