ExamGecko
Home Home / ISC / CCSP

ISC CCSP Practice Test - Questions Answers, Page 45

Question list
Search
Search

Best practices for key management include all of the following, except:

A.
Ensure multifactor authentication
A.
Ensure multifactor authentication
Answers
B.
Pass keys out of band
B.
Pass keys out of band
Answers
C.
Have key recovery processes
C.
Have key recovery processes
Answers
D.
Maintain key security
D.
Maintain key security
Answers
Suggested answer: A

Explanation:

We should do all of these except for requiring multifactor authentication, which is pointless in key management.

Data labels could include all the following, except:

A.
Distribution limitations
A.
Distribution limitations
Answers
B.
Multifactor authentication
B.
Multifactor authentication
Answers
C.
Confidentiality level
C.
Confidentiality level
Answers
D.
Access restrictions
D.
Access restrictions
Answers
Suggested answer: B

Explanation:

All the others might be included in data labels, but multifactor authentication is a procedure used for access control, not a label.

What is the correct order of the phases of the data life cycle?

A.
Create, Use, Store, Share, Archive, Destroy
A.
Create, Use, Store, Share, Archive, Destroy
Answers
B.
Create, Archive, Store, Share, Use, Destroy
B.
Create, Archive, Store, Share, Use, Destroy
Answers
C.
Create, Store, Use, Archive, Share, Destroy
C.
Create, Store, Use, Archive, Share, Destroy
Answers
D.
Create, Store, Use, Share, Archive, Destroy
D.
Create, Store, Use, Share, Archive, Destroy
Answers
Suggested answer: D

Explanation:

The other options are the names of the phases, but out of proper order.

Cryptographic keys should be secured ________________ .

A.
To a level at least as high as the data they can decrypt
A.
To a level at least as high as the data they can decrypt
Answers
B.
In vaults
B.
In vaults
Answers
C.
With two-person integrity
C.
With two-person integrity
Answers
D.
By armed guards
D.
By armed guards
Answers
Suggested answer: A

Explanation:

The physical security of crypto keys is of some concern, but guards or vaults are not always necessary. Two-person integrity might be a good practice for protecting keys. The best answer to this question-is option A, because it is always true, whereas the remaining options depend on circumstances.

What is the experimental technology that might lead to the possibility of processing encrypted data without having to decrypt it first?

A.
One-time pads
A.
One-time pads
Answers
B.
Link encryption
B.
Link encryption
Answers
C.
Homomorphic encryption
C.
Homomorphic encryption
Answers
D.
AES
D.
AES
Answers
Suggested answer: C

Explanation:

AES is an encryption standard. Link encryption is a method for protecting communications traffic. One-time pads are an encryption method.

What are third-party providers of IAM functions for the cloud environment?

A.
AESs
A.
AESs
Answers
B.
SIEMs
B.
SIEMs
Answers
C.
DLPs
C.
DLPs
Answers
D.
CASBs
D.
CASBs
Answers
Suggested answer: D

Explanation:

Data loss, leak prevention, and protection is a family of tools used to reduce the possibility of unauthorized disclosure of sensitive information. SIEMs are tools used to collate and manage log data. AES is an encryption standard.

Data labels could include all the following, except:

A.
Data value
A.
Data value
Answers
B.
Data of scheduled destruction
B.
Data of scheduled destruction
Answers
C.
Date data was created
C.
Date data was created
Answers
D.
Data owner
D.
Data owner
Answers
Suggested answer: A

Explanation:

All the others might be included in data labels, but we don't usually include data value, since it is prone to change frequently, and because it might not be information we want to disclose to anyone who does not have need to know.

What are the U.S. Commerce Department controls on technology exports known as?

A.
ITAR
A.
ITAR
Answers
B.
DRM
B.
DRM
Answers
C.
EAR
C.
EAR
Answers
D.
EAL
D.
EAL
Answers
Suggested answer: A

Explanation:

EAR is a Commerce Department program. Evaluation assurance levels are part of the Common Criteria standard from ISO. Digital rights management tools are used for protecting electronic processing of intellectual property.

All of these are methods of data discovery, except:

A.
Label-based
A.
Label-based
Answers
B.
User-based
B.
User-based
Answers
C.
Content-based
C.
Content-based
Answers
D.
Metadata-based
D.
Metadata-based
Answers
Suggested answer: B

Explanation:

All the others are valid methods of data discovery; user-based is a red herring with no meaning.

The various models generally available for cloud BC/DR activities include all of the following except:

A.
Private architecture, cloud backup
A.
Private architecture, cloud backup
Answers
B.
Cloud provider, backup from another cloud provider
B.
Cloud provider, backup from another cloud provider
Answers
C.
Cloud provider, backup from same provider
C.
Cloud provider, backup from same provider
Answers
D.
Cloud provider, backup from private provider
D.
Cloud provider, backup from private provider
Answers
Suggested answer: D

Explanation:

This is not a normal configuration and would not likely provide genuine benefit.

Total 512 questions
Go to page: of 52