ISC CCSP Practice Test - Questions Answers, Page 6
List of questions
Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?
What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?
Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?
What are the two protocols that TLS uses?
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?
Which of the following is considered an internal redundancy for a data center?
Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?
Which of the following roles is responsible for peering with other cloud services and providers?
Which of the following does NOT relate to the hiding of sensitive data from data sets?
Question