ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 6

List of questions

Question 51

Report Export Collapse

Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?

Security misconfiguration
Security misconfiguration
Insecure direct object references
Insecure direct object references
Sensitive data exposure
Sensitive data exposure
Unvalidated redirects and forwards
Unvalidated redirects and forwards
Suggested answer: C
Explanation:

Sensitive data exposure occurs when information is not properly secured through encryption and secure transport mechanisms; it can quickly become an easy and broad method for attackers to compromise information. Web applications must enforce strong encryption and security controls on the application side, but secure methods of communications with browsers or other clients used to access the information are also required. Security misconfiguration occurs when applications and systems are not properly configured for security, often a result of misapplied or inadequate baselines. Insecure direct object references occur when code references aspects of the infrastructure, especially internal or private systems, and an attacker can use that knowledge to glean more information about the infrastructure. Unvalidated redirects and forwards occur when an application has functions to forward users to other sites, and these functions are not properly secured to validate the data and redirect requests, thus allowing spoofing for malware or phishing attacks.

asked 18/09/2024
Theodoros Flabouras
46 questions

Question 52

Report Export Collapse

What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?

Remove
Remove
Monitor
Monitor
Disable
Disable
Stop
Stop
Suggested answer: A
Explanation:

The best practice is to totally remove any unneeded services and utilities on a system to prevent any chance of compromise or use. If they are just disabled, it is possible for them to be inadvertently started again at any point, or another exploit could be used to start them again. Removing also negates the need to patch and maintain them going forward.

asked 18/09/2024
JAOID EL OUALITI
31 questions

Question 53

Report Export Collapse

Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?

Modifying metadata
Modifying metadata
Importing data
Importing data
Modifying data
Modifying data
Constructing new data
Constructing new data
Suggested answer: A
Explanation:

Although the initial phase is called "create," it can also refer to modification. In essence, any time data is considered "new," it is in the create phase. This can come from data that is newly created, data that is imported into a system and is new to that system, or data that is already present and modified into a new form or value. Modifying the metadata does not change the actual data.

asked 18/09/2024
leonie lira
43 questions

Question 54

Report Export Collapse

What are the two protocols that TLS uses?

Handshake and record
Handshake and record
Transport and initiate
Transport and initiate
Handshake and transport
Handshake and transport
Record and transmit
Record and transmit
Suggested answer: A
Explanation:

TLS uses the handshake protocol to establish and negotiate the TLS connection, and it uses the record protocol for the secure transmission of data.

asked 18/09/2024
ESSIS MAXIME-ALPHONSE SELLY
34 questions

Question 55

Report Export Collapse

Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?

IaaS
IaaS
DaaS
DaaS
SaaS
SaaS
PaaS
PaaS
Suggested answer: C
Explanation:

With many SaaS implementations, data is not isolated to a particular customer but rather is part of the overall application. When it comes to data destruction, a particular challenge is ensuring that all of a customer's data is completely destroyed while not impacting the data of other customers.

asked 18/09/2024
Maurizio Budicin
35 questions

Question 56

Report Export Collapse

Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?

Multitenancy
Multitenancy
Certification
Certification
Regulation
Regulation
Virtualization
Virtualization
Suggested answer: C
Explanation:

Some regulations may require specific security controls or certifications be used for hosting certain types of data or functions, and in some circumstances they may be requirements that are unable to be met by any cloud provider.

asked 18/09/2024
Rafael Pabon
53 questions

Question 57

Report Export Collapse

Which of the following is considered an internal redundancy for a data center?

Power distribution units
Power distribution units
Network circuits
Network circuits
Power substations
Power substations
Generators
Generators
Suggested answer: A
Explanation:

Power distribution units are internal to a data center and supply power to internal components such as racks, appliances, and cooling systems. As such, they are considered an internal redundancy.

asked 18/09/2024
Sjoerd Kruit
40 questions

Question 58

Report Export Collapse

Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?

Share
Share
Reservation
Reservation
Provision
Provision
Limit
Limit
Suggested answer: D
Explanation:

Limits are put in place to enforce a maximum on the amount of memory or processing a cloud customer can use. This can be done either on a virtual machine or as a comprehensive whole for a customer, and is meant to ensure that enormous cloud resources cannot be allocated or consumed by a single host or customer to the detriment of other hosts and customers.

asked 18/09/2024
Eduardo Rives
43 questions

Question 59

Report Export Collapse

Which of the following roles is responsible for peering with other cloud services and providers?

Cloud auditor
Cloud auditor
Inter-cloud provider
Inter-cloud provider
Cloud service broker
Cloud service broker
Cloud service developer
Cloud service developer
Suggested answer: B
Explanation:

The inter-cloud provider is responsible for peering with other cloud services and providers, as well as overseeing and managing federations and federated services.

asked 18/09/2024
Juy Juy
47 questions

Question 60

Report Export Collapse

Which of the following does NOT relate to the hiding of sensitive data from data sets?

Obfuscation
Obfuscation
Federation
Federation
Masking
Masking
Anonymization
Anonymization
Suggested answer: B
Explanation:

Federation pertains to authenticating systems between different organizations.

asked 18/09/2024
Eduardo Cunha
36 questions
Total 512 questions
Go to page: of 52