ISC CCSP Practice Test - Questions Answers, Page 48
Deviations from the baseline should be investigated and __________________.
A.
Revealed
B.
Documented
C.
Encouraged
D.
Enforced
Which of the following best describes the Organizational Normative Framework (ONF)?
A.
A set of application security, and best practices, catalogued and leveraged by the organization
B.
A container for components of an application's security, best practices catalogued and leveraged by the organization
C.
A framework of containers for some of the components of application security, best practices, catalogued and leveraged by the organization
D.
A framework of containers for all components of application security, best practices, catalogued and leveraged by the organization.
A UPS should have enough power to last how long?
A.
One day
B.
12 hours
C.
Long enough for graceful shutdown
D.
10 minutes
Which of the following best describes the purpose and scope of ISO/IEC 27034-1?
A.
Describes international privacy standards for cloud computing
B.
Serves as a newer replacement for NIST 800-52 r4
C.
Provides on overview of network and infrastructure security designed to secure cloud applications.
D.
Provides an overview of application security that introduces definitive concepts, principles, and processes involved in application security.
Which of the following best describes SAML?
A.
A standard used for directory synchronization
B.
A standard for developing secure application management logistics
C.
A standard for exchanging usernames and passwords across devices.
D.
A standards for exchanging authentication and authorization data between security domains.
Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:
A.
Ransomware
B.
Syn floods
C.
XSS and SQL injection
D.
Password cracking
APIs are defined as which of the following?
A.
A set of protocols, and tools for building software applications to access a web-based software application or tool
B.
A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or tool
C.
A set of standards for building software applications to access a web-based software application or tool
D.
A set of routines and tools for building software applications to access web-based software applications
Which of the following best describes data masking?
A.
A method for creating similar but inauthentic datasets used for software testing and user training.
B.
A method used to protect prying eyes from data such as social security numbers and credit card data.
C.
A method where the last few numbers in a dataset are not obscured. These are often used for authentication.
D.
Data masking involves stripping out all digits in a string of numbers so as to obscure the original number.
Which of the following best describes a sandbox?
A.
An isolated space where untested code and experimentation can safely occur separate from the production environment.
B.
A space where you can safely execute malicious code to see what it does.
C.
An isolated space where transactions are protected from malicious software
D.
An isolated space where untested code and experimentation can safely occur within the production environment.
A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?
A.
UPS
B.
Generators
C.
Joint operating agreements
D.
Strict adherence to applicable regulations
Question