ISC CCSP Practice Test - Questions Answers, Page 8
List of questions
If you're using iSCSI in a cloud environment, what must come from an external protocol or application?
Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?
What does the REST API support that SOAP does NOT support?
Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?
Which of the following are the storage types associated with PaaS?
Which of the following threat types can occur when baselines are not appropriately applied or unauthorized changes are made?
What is the data encapsulation used with the SOAP protocol referred to?
Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
What is the biggest negative to leasing space in a data center versus building or maintain your own?
Question