ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 9

List of questions

Question 81

Report Export Collapse

Which aspect of archiving must be tested regularly for the duration of retention requirements?

Availability
Availability
Recoverability
Recoverability
Auditability
Auditability
Portability
Portability
Suggested answer: B
Explanation:

In order for any archiving system to be deemed useful and compliant, regular tests must be performed to ensure the data can still be recovered and accessible, should it ever be needed, for the duration of the retention requirements.

asked 18/09/2024
Miles Greenyer
43 questions

Question 82

Report Export Collapse

Which of the following represents a minimum guaranteed resource within a cloud environment for the cloud customer?

Reservation
Reservation
Share
Share
Limit
Limit
Provision
Provision
Suggested answer: A
Explanation:

A reservation is a minimum resource that is guaranteed to a customer within a cloud environment. Within a cloud, a reservation can pertain to the two main aspects of computing: memory and processor. With a reservation in place, the cloud provider guarantees that a cloud customer will always have at minimum the necessary resources available to power on and operate any of their services.

asked 18/09/2024
Jarrad Payne
41 questions

Question 83

Report Export Collapse

When is a virtual machine susceptible to attacks while a physical server in the same state would not be?

When it is behind a WAF
When it is behind a WAF
When it is behind an IPS
When it is behind an IPS
When it is not patched
When it is not patched
When it is powered off
When it is powered off
Suggested answer: D
Explanation:

A virtual machine is ultimately an image file residing a file system. Because of this, even when a virtual machine is "powered off," it is still susceptible to attacks and modification. A physical server that is powered off would not be susceptible to attacks.

asked 18/09/2024
Bradley Flay
43 questions

Question 84

Report Export Collapse

Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?

Sensitive data exposure
Sensitive data exposure
Security misconfiguration
Security misconfiguration
Insecure direct object references
Insecure direct object references
Unvalidated redirect and forwards
Unvalidated redirect and forwards
Suggested answer: C
Explanation:

An insecure direct object reference occurs when a developer has in their code a reference to something on the application side, such as a database key, the directory structure of the application, configuration information about the hosting system, or any other information that pertains to the workings of the application that should not be exposed to users or the network. Unvalidated redirects and forwards occur when an application has functions to forward users to other sites, and these functions are not properly secured to validate the data and redirect requests, allowing spoofing for malware of phishing attacks. Sensitive data exposure occurs when an application does not use sufficient encryption and other security controls to protect sensitive application data. Security misconfigurations occur when applications and systems are not properly configured or maintained in a secure manner.

asked 18/09/2024
Lee Greenshields
41 questions

Question 85

Report Export Collapse

Which of the following is the biggest concern or challenge with using encryption?

Dependence on keys
Dependence on keys
Cipher strength
Cipher strength
Efficiency
Efficiency
Protocol standards
Protocol standards
Suggested answer: A
Explanation:

No matter what kind of application, system, or hosting model used, encryption is 100 percent dependent on encryption keys. Properly securing the keys and the exchange of them is the biggest and most important challenge of encryption systems.

asked 18/09/2024
Keenan Bragg
45 questions

Question 86

Report Export Collapse

Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?

Storage
Storage
Application
Application
Mamory
Mamory
CPU
CPU
Suggested answer: B
Explanation:

Infrastructure as a Service pools the compute resources for platforms and applications to build upon, including CPU, memory, and storage. Applications are not part of an IaaS offering from the cloud provider.

asked 18/09/2024
Romain Casagrande
38 questions

Question 87

Report Export Collapse

Which technology is NOT commonly used for security with data in transit?

DNSSEC
DNSSEC
IPsec
IPsec
VPN
VPN
HTTPS
HTTPS
Suggested answer: A
Explanation:

DNSSEC relates to the integrity of DNS resolutions and the prevention of spoofing or redirection, and does not pertain to the actual security of transmissions or the protection of data.

asked 18/09/2024
Lara Umemoto
53 questions

Question 88

Report Export Collapse

Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?

Cloud service business manager
Cloud service business manager
Cloud service operations manager
Cloud service operations manager
Cloud service manager
Cloud service manager
Cloud service deployment manager
Cloud service deployment manager
Suggested answer: D
Explanation:

The cloud service deployment manager is responsible for gathering metrics on cloud services, managing cloud deployments and the deployment process, and defining the environments and processes.

asked 18/09/2024
Saphronia Yancey
44 questions

Question 89

Report Export Collapse

Which of the following is considered an external redundancy for a data center?

Power feeds to rack
Power feeds to rack
Generators
Generators
Power distribution units
Power distribution units
Storage systems
Storage systems
Suggested answer: B
Explanation:

Generators are considered an external redundancy to a data center. Power distribution units (PDUs), storage systems, and power feeds to racks are all internal to a data center, and as such they are considered internal redundancies.

asked 18/09/2024
Mark Churly
36 questions

Question 90

Report Export Collapse

Which of the following is the optimal humidity level for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air

Conditioning Engineers (ASHRAE)?

30-50 percent relative humidity
30-50 percent relative humidity
50-75 percent relative humidity
50-75 percent relative humidity
20-40 percent relative humidity
20-40 percent relative humidity
40-60 percent relative humidity
40-60 percent relative humidity
Suggested answer: D
Explanation:

The guidelines from ASHRAE establish 40-60 percent relative humidity as optimal for a data center.

asked 18/09/2024
Charles Marlin
43 questions
Total 512 questions
Go to page: of 52