ISC CCSP Practice Test - Questions Answers, Page 9
List of questions
Question 81

Which aspect of archiving must be tested regularly for the duration of retention requirements?
In order for any archiving system to be deemed useful and compliant, regular tests must be performed to ensure the data can still be recovered and accessible, should it ever be needed, for the duration of the retention requirements.
Question 82

Which of the following represents a minimum guaranteed resource within a cloud environment for the cloud customer?
A reservation is a minimum resource that is guaranteed to a customer within a cloud environment. Within a cloud, a reservation can pertain to the two main aspects of computing: memory and processor. With a reservation in place, the cloud provider guarantees that a cloud customer will always have at minimum the necessary resources available to power on and operate any of their services.
Question 83

When is a virtual machine susceptible to attacks while a physical server in the same state would not be?
A virtual machine is ultimately an image file residing a file system. Because of this, even when a virtual machine is "powered off," it is still susceptible to attacks and modification. A physical server that is powered off would not be susceptible to attacks.
Question 84

Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?
An insecure direct object reference occurs when a developer has in their code a reference to something on the application side, such as a database key, the directory structure of the application, configuration information about the hosting system, or any other information that pertains to the workings of the application that should not be exposed to users or the network. Unvalidated redirects and forwards occur when an application has functions to forward users to other sites, and these functions are not properly secured to validate the data and redirect requests, allowing spoofing for malware of phishing attacks. Sensitive data exposure occurs when an application does not use sufficient encryption and other security controls to protect sensitive application data. Security misconfigurations occur when applications and systems are not properly configured or maintained in a secure manner.
Question 85

Which of the following is the biggest concern or challenge with using encryption?
No matter what kind of application, system, or hosting model used, encryption is 100 percent dependent on encryption keys. Properly securing the keys and the exchange of them is the biggest and most important challenge of encryption systems.
Question 86

Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?
Infrastructure as a Service pools the compute resources for platforms and applications to build upon, including CPU, memory, and storage. Applications are not part of an IaaS offering from the cloud provider.
Question 87

Which technology is NOT commonly used for security with data in transit?
DNSSEC relates to the integrity of DNS resolutions and the prevention of spoofing or redirection, and does not pertain to the actual security of transmissions or the protection of data.
Question 88

Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?
The cloud service deployment manager is responsible for gathering metrics on cloud services, managing cloud deployments and the deployment process, and defining the environments and processes.
Question 89

Which of the following is considered an external redundancy for a data center?
Generators are considered an external redundancy to a data center. Power distribution units (PDUs), storage systems, and power feeds to racks are all internal to a data center, and as such they are considered internal redundancies.
Question 90

Which of the following is the optimal humidity level for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air
Conditioning Engineers (ASHRAE)?
The guidelines from ASHRAE establish 40-60 percent relative humidity as optimal for a data center.
Question