ExamGecko

ISC CCSP Practice Test - Questions Answers, Page 7

Question list
Search
Search

Question 61

Report
Export
Collapse

Which of the following are the storage types associated with IaaS?

A.
Volume and object
A.
Volume and object
Answers
B.
Volume and label
B.
Volume and label
Answers
C.
Volume and container
C.
Volume and container
Answers
D.
Object and target
D.
Object and target
Answers
Suggested answer: A
asked 18/09/2024
hamza reza
49 questions

Question 62

Report
Export
Collapse

Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?

A.
IPS
A.
IPS
Answers
B.
WAF
B.
WAF
Answers
C.
DLP
C.
DLP
Answers
D.
IDS
D.
IDS
Answers
Suggested answer: C

Explanation:

Data loss prevention (DLP) can be applied to data that is leaving the security enclave to continue to enforce access restrictions and policies on other clients and systems.

asked 18/09/2024
Rajiv Ranjan
52 questions

Question 63

Report
Export
Collapse

Which of the following storage types is most closely associated with a traditional file system and tree structure?

A.
Volume
A.
Volume
Answers
B.
Unstructured
B.
Unstructured
Answers
C.
Object
C.
Object
Answers
D.
Structured
D.
Structured
Answers
Suggested answer: A

Explanation:

Volume storage works as a virtual hard drive that is attached to a virtual machine. The operating system sees the volume the same as how a traditional drive on a physical server would be seen.

asked 18/09/2024
mahdis khaledi
46 questions

Question 64

Report
Export
Collapse

Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?

A.
Provision
A.
Provision
Answers
B.
Limit
B.
Limit
Answers
C.
Reservation
C.
Reservation
Answers
D.
Share
D.
Share
Answers
Suggested answer: D

Explanation:

The concept of shares within a cloud environment is used to mitigate and control the request for resource allocations from customers that the environment may not have the current capability to allow. Shares work by prioritizing hosts within a cloud environment through a weighting system that is defined by the cloud provider. When periods of high utilization and allocation are reached, the system automatically uses scoring of each host based on its share value to determine which hosts get access to the limited resources still available. The higher the value a particular host has, the more resources it will be allowed to utilize.

asked 18/09/2024
Alejandro Yepez
47 questions

Question 65

Report
Export
Collapse

Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?

A.
SAS-70
A.
SAS-70
Answers
B.
SOC 2
B.
SOC 2
Answers
C.
SOC 1
C.
SOC 1
Answers
D.
SOX
D.
SOX
Answers
Suggested answer: B

Explanation:

One approach that many cloud providers opt to take is to undergo a SOC 2 audit and make the report available to cloud customers and potential cloud customers as a way of providing security confidence without having to open their systems or sensitive information to the masses.

asked 18/09/2024
Gufran Dalwai
46 questions

Question 66

Report
Export
Collapse

Which of the following statements accurately describes VLANs?

A.
They are not restricted to the same data center or the same racks.
A.
They are not restricted to the same data center or the same racks.
Answers
B.
They are not restricted to the name rack but restricted to the same data center.
B.
They are not restricted to the name rack but restricted to the same data center.
Answers
C.
They are restricted to the same racks and data centers.
C.
They are restricted to the same racks and data centers.
Answers
D.
They are not restricted to the same rack but restricted to same switches.
D.
They are not restricted to the same rack but restricted to same switches.
Answers
Suggested answer: A

Explanation:

A virtual area network (VLAN) can span any networks within a data center, or it can span across different physical locations and data centers.

asked 18/09/2024
Quintin van Rooyen
44 questions

Question 67

Report
Export
Collapse

What must be secured on physical hardware to prevent unauthorized access to systems?

A.
BIOS
A.
BIOS
Answers
B.
SSH
B.
SSH
Answers
C.
RDP
C.
RDP
Answers
D.
ALOM
D.
ALOM
Answers
Suggested answer: A

Explanation:

BIOS is the firmware that governs the physical initiation and boot up of a piece of hardware. If it is compromised, an attacker could have access to hosted systems and make configurations changes to expose or disable some security elements on the system.

asked 18/09/2024
Paolo D Amelio
36 questions

Question 68

Report
Export
Collapse

What type of PII is regulated based on the type of application or per the conditions of the specific hosting agreement?

A.
Specific
A.
Specific
Answers
B.
Contractual
B.
Contractual
Answers
C.
regulated
C.
regulated
Answers
D.
Jurisdictional
D.
Jurisdictional
Answers
Suggested answer: B

Explanation:

Contractual PII has specific requirements for the handling of sensitive and personal information, as defined at a contractual level. These specific requirements will typically document the required handling procedures and policies to deal with PII. They may be in specific security controls and configurations, required policies or procedures, or limitations on who may gain authorized access to data and systems.

asked 18/09/2024
asia Mattaccini
37 questions

Question 69

Report
Export
Collapse

Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?

A.
VPN
A.
VPN
Answers
B.
WAF
B.
WAF
Answers
C.
IPSec
C.
IPSec
Answers
D.
HTTPS
D.
HTTPS
Answers
Suggested answer: A

Explanation:

Virtual private networks (VPNs) are commonly used to allow access into trust zones. Via a VPN, access can be controlled and logged and only allowed through secure channels by authorized users. It also adds an additional layer of encryption and protection to communications.

asked 18/09/2024
CHEUNG KA FAI
41 questions

Question 70

Report
Export
Collapse

Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?

A.
On-demand self-service
A.
On-demand self-service
Answers
B.
Resource pooling
B.
Resource pooling
Answers
C.
Measured service
C.
Measured service
Answers
D.
Rapid elasticity
D.
Rapid elasticity
Answers
Suggested answer: D

Explanation:

Rapid elasticity allows a cloud environment to automatically add or remove resources to or from a system or application based on its current demands. Whereas a traditional data center model would require standby hardware and substantial effort to add resources in response to load increases, a cloud environment can easily and rapidly expand to meet resources demands, so long as the application is properly implemented for it.

asked 18/09/2024
Farah Fauzi
41 questions
Total 512 questions
Go to page: of 52