ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 8

List of questions

Question 71

Report Export Collapse

If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

Kerberos support
Kerberos support
CHAP support
CHAP support
Authentication
Authentication
Encryption
Encryption
Suggested answer: D
Explanation:

iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt communications.

asked 18/09/2024
ENET SOLUTIONS LOGICOM
42 questions

Question 72

Report Export Collapse

Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?

IDCA
IDCA
NFPA
NFPA
BICSI
BICSI
Uptime Institute
Uptime Institute
Suggested answer: A
Explanation:

The standards put out by the International Data Center Authority (IDCA) have established the Infinity Paradigm, which is intended to be a comprehensive data center design and operations framework. The Infinity Paradigm shifts away from many models that rely on tiered architecture for data centers, where each successive tier increases redundancy. Instead, it emphasizes data centers being approached at a macro level, without a specific and isolated focus on certain aspects to achieve tier status.

asked 18/09/2024
Andy Hodges
44 questions

Question 73

Report Export Collapse

What does the REST API support that SOAP does NOT support?

Caching
Caching
Encryption
Encryption
Acceleration
Acceleration
Redundancy
Redundancy
Suggested answer: A
Explanation:

The SOAP protocol does not support caching, whereas the REST API does.

asked 18/09/2024
Jonathan Correa
48 questions

Question 74

Report Export Collapse

Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?

A Type 1 hypervisor also controls patching of its hosted virtual machines ensure they are always secure.
A Type 1 hypervisor also controls patching of its hosted virtual machines ensure they are always secure.
A Type 1 hypervisor is tied directly to the bare metal and only runs with code necessary to perform its specific mission.
A Type 1 hypervisor is tied directly to the bare metal and only runs with code necessary to perform its specific mission.
A Type 1 hypervisor performs hardware-level encryption for tighter security and efficiency.
A Type 1 hypervisor performs hardware-level encryption for tighter security and efficiency.
A Type 1 hypervisor only hosts virtual machines with the same operating systems as the hypervisor.
A Type 1 hypervisor only hosts virtual machines with the same operating systems as the hypervisor.
Suggested answer: B
Explanation:

Type 1 hypervisors run directly on top of the bare metal and only contain the code and functions required to perform their purpose. They do not rely on any other systems or contain extra features to secure.

asked 18/09/2024
Frederico Dionísio
46 questions

Question 75

Report Export Collapse

Which of the following are the storage types associated with PaaS?

Structured and freeform
Structured and freeform
Volume and object
Volume and object
Structured and unstructured
Structured and unstructured
Database and file system
Database and file system
Suggested answer: C
asked 18/09/2024
Michael Amann
42 questions

Question 76

Report Export Collapse

Which of the following threat types can occur when baselines are not appropriately applied or unauthorized changes are made?

Insecure direct object references
Insecure direct object references
Unvalidated redirects and forwards
Unvalidated redirects and forwards
Security misconfiguration
Security misconfiguration
Sensitive data exposure
Sensitive data exposure
Suggested answer: C
Explanation:

Security misconfigurations occur when applications and systems are not properly configured or maintained in a secure manner. This can be caused from a shortcoming in security baselines or configurations, unauthorized changes to system configurations, or a failure to patch and upgrade systems as the vendor releases security patches.

asked 18/09/2024
Karl Newick
34 questions

Question 77

Report Export Collapse

What is the data encapsulation used with the SOAP protocol referred to?

Packet
Packet
Envelope
Envelope
Payload
Payload
Object
Object
Suggested answer: B
Explanation:

Simple Object Access Protocol (SOAP) encapsulates its information in what is known as a SOAP envelope and then leverages common communications protocols for transmission.

asked 18/09/2024
Dang Xuan Bao
45 questions

Question 78

Report Export Collapse

Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?

Unvalidated redirects and forwards
Unvalidated redirects and forwards
Insecure direct object references
Insecure direct object references
Security miscomfiguration
Security miscomfiguration
Sensitive data exposure
Sensitive data exposure
Suggested answer: A
Explanation:

Many web applications offer redirect or forward pages that send users to different, external sites. If these pages are not properly secured and validated, attackers can use the application to forward users off to sites for phishing or malware attempts. These attempts can often be more successful than direct phishing attempts because users will trust the site or application that sent them there, and they will assume it has been properly validated and approved by the trusted application's owners or operators. Security misconfiguration occurs when applications and systems are not properly configured for security--often a result of misapplied or inadequate baselines. Insecure direct object references occur when code references aspects of the infrastructure, especially internal or private systems, and an attacker can use that knowledge to glean more information about the infrastructure. Sensitive data exposure occurs when an application does not use sufficient encryption and other security controls to protect sensitive application data.

asked 18/09/2024
Janina Loveria
47 questions

Question 79

Report Export Collapse

Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?

SP 800-153
SP 800-153
SP 800-145
SP 800-145
SP 800-53
SP 800-53
SP 800-40
SP 800-40
Suggested answer: B
Explanation:

NIST Special Publications 800-145 is titled "The NIST Definition of Cloud Computing" and contains definitions and explanations of core cloud concepts and components.

asked 18/09/2024
Jhon Doe
39 questions

Question 80

Report Export Collapse

What is the biggest negative to leasing space in a data center versus building or maintain your own?

Costs
Costs
Control
Control
Certification
Certification
Regulation
Regulation
Suggested answer: B
Explanation:

When leasing space in a data center, an organization will give up a large degree of control as to how it is built and maintained, and instead must conform to the policies and procedures of the owners and operators of the data center.

asked 18/09/2024
Ali Reza Azmi
51 questions
Total 512 questions
Go to page: of 52