ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 44

Question list
Search
Search

DLP solutions can aid in deterring loss due to which of the following?

A.
Power failure
A.
Power failure
Answers
B.
Performance
B.
Performance
Answers
C.
Bad policy
C.
Bad policy
Answers
D.
Malicious disclosure
D.
Malicious disclosure
Answers
Suggested answer: D

Explanation:

DLP tools can identify outbound traffic that violates the organization's policies. DLP will not protect against losses due to performance issues or power failures.

The DLP solution must be configured according to the organization's policies, so bad policies will attenuate the effectiveness of DLP tools, not the other way around.

All the following are data analytics modes, except:

A.
Datamining
A.
Datamining
Answers
B.
Agile business intelligence
B.
Agile business intelligence
Answers
C.
Refractory iterations
C.
Refractory iterations
Answers
D.
Real-time analytics
D.
Real-time analytics
Answers
Suggested answer: C

Explanation:

All the others are data analytics methods, but "refractory iterations" is a nonsense term thrown in as a red herring.

What are the U.S. State Department controls on technology exports known as?

A.
DRM
A.
DRM
Answers
B.
ITAR
B.
ITAR
Answers
C.
EAR
C.
EAR
Answers
D.
EAL
D.
EAL
Answers
Suggested answer: C

Explanation:

ITAR is a Department of State program. Evaluation assurance levels are part of the Common Criteria standard from ISO. Digital rights management tools are used for protecting electronic processing of intellectual property.

When crafting plans and policies for data archiving, we should consider all of the following, except:

A.
The backup process
A.
The backup process
Answers
B.
Immediacy of the technology
B.
Immediacy of the technology
Answers
C.
Archive location
C.
Archive location
Answers
D.
The format of the data
D.
The format of the data
Answers
Suggested answer: B

Explanation:

All of these things should be considered when creating data archival policies, except option D, which is a nonsense term.

DLP solutions can aid in deterring loss due to which of the following?

A.
Device failure
A.
Device failure
Answers
B.
Randomization
B.
Randomization
Answers
C.
Inadvertent disclosure
C.
Inadvertent disclosure
Answers
D.
Natural disaster
D.
Natural disaster
Answers
Suggested answer: C

Explanation:

DLP solutions may protect against inadvertent disclosure. Randomization is a technique for obscuring data, not a risk to data. DLP tools will not protect against risks from natural disasters, or against impacts due to device failure.

DLP can be combined with what other security technology to enhance data controls?

A.
SIEM
A.
SIEM
Answers
B.
Hypervisors
B.
Hypervisors
Answers
C.
DRM
C.
DRM
Answers
D.
Kerberos
D.
Kerberos
Answers
Suggested answer: C

Explanation:

DLP can be combined with DRM to protect intellectual property; both are designed to deal with data that falls into special categories. SIEMs are used for monitoring event logs, not live data movement. Kerberos is an authentication mechanism. Hypervisors are used for virtualization.

The goals of SIEM solution implementation include all of the following, except:

A.
Dashboarding
A.
Dashboarding
Answers
B.
Performance enhancement
B.
Performance enhancement
Answers
C.
Trend analysis
C.
Trend analysis
Answers
D.
Centralization of log streams
D.
Centralization of log streams
Answers
Suggested answer: B

Explanation:

SIEM does not intend to provide any enhancement of performance; in fact, a SIEM solution may decrease performance because of additional overhead. All the rest are goals of SIEM implementations.

Data masking can be used to provide all of the following functionality, except:

A.
Test data in sandboxed environments
A.
Test data in sandboxed environments
Answers
B.
Authentication of privileged users
B.
Authentication of privileged users
Answers
C.
Enforcing least privilege
C.
Enforcing least privilege
Answers
D.
Secure remote access
D.
Secure remote access
Answers
Suggested answer: B

Explanation:

Data masking does not support authentication in any way. All the others are excellent use cases for data masking.

Cryptographic keys for encrypted data stored in the cloud should be ________________ .

A.
Not stored with the cloud provider.
A.
Not stored with the cloud provider.
Answers
B.
Generated with redundancy
B.
Generated with redundancy
Answers
C.
At least 128 bits long
C.
At least 128 bits long
Answers
D.
Split into groups
D.
Split into groups
Answers
Suggested answer: A

Explanation:

Cryptographic keys should not be stored along with the data they secure, regardless of key length. We don't split crypto keys or generate redundant keys (doing so would violate the principle of secrecy necessary for keys to serve their purpose).

Tokenization requires two distinct _________________ .

A.
Personnel
A.
Personnel
Answers
B.
Authentication factors
B.
Authentication factors
Answers
C.
Encryption keys
C.
Encryption keys
Answers
D.
Databases
D.
Databases
Answers
Suggested answer: D

Explanation:

In order to implement tokenization, there will need to be two databases: the database containing the raw, original data, and the token database containing tokens that map to original data. Having two-factor authentication is nice, but certainly not required. Encryption keys are not necessary for tokenization. Two-person integrity does not have anything to do with tokenization.

Total 512 questions
Go to page: of 52