ExamGecko
Home / ISC / CCSP / List of questions
Ask Question

ISC CCSP Practice Test - Questions Answers, Page 24

List of questions

Question 231

Report
Export
Collapse

When dealing with PII, which category pertains to those requirements that can carry legal sanctions or penalties for failure to adequately safeguard the data and address compliance requirements?

Contractual
Contractual
Jurisdictional
Jurisdictional
Regulated
Regulated
Legal
Legal
Suggested answer: C

Explanation:

Regulated PII pertains to data that is outlined in law and regulations. Violations of the requirements for the protection of regulated PII can carry legal sanctions or penalties. Contractual PII involves required data protection that is determined by the actual service contract between the cloud provider and cloud customer, rather than outlined by law. Violations of the provisions of contractual PII carry potential financial or contractual implications, but not legal sanctions. Legal and jurisdictional are similar terms to regulated, but neither is the official term used.

asked 18/09/2024
Jimmy Wasson
37 questions

Question 232

Report
Export
Collapse

Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.

Which of the following is NOT a regulatory system from the United States federal government?

HIPAA
HIPAA
SOX
SOX
FISMA
FISMA
PCI DSS
PCI DSS
Suggested answer: D

Explanation:

The Payment Card Industry Data Security Standard (PCI DSS) pertains to organizations that handle credit card transactions and is an industry-regulatory standard, not a governmental one. The Sarbanes-Oxley Act (SOX) was passed in 2002 and pertains to financial records and reporting, as well as transparency requirements for shareholders and other stakeholders. The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 and pertains to data privacy and security for medical records. FISMA refers to the Federal Information Security Management Act of 2002 and pertains to the protection of all US federal government IT systems, with the exception of national security systems.

asked 18/09/2024
Marco Romani
37 questions

Question 233

Report
Export
Collapse

The president of your company has tasked you with implementing cloud services as the most efficient way of obtaining a robust disaster recovery configuration for your production services.

Which of the cloud deployment models would you MOST likely be exploring?

Hybrid
Hybrid
Private
Private
Community
Community
Public
Public
Suggested answer: A

Explanation:

A hybrid cloud model spans two more different hosting configurations or cloud providers. This would enable an organization to continue using its current hosting configuration, while adding additional cloud services to enable disaster recovery capabilities. The other cloud deployment models--public, private, and community--would not be applicable for seeking a disaster recovery configuration where cloud services are to be leveraged for that purpose rather than production service hosting.

asked 18/09/2024
Felix Bourdier
47 questions

Question 234

Report
Export
Collapse

If you are running an application that has strict legal requirements that the data cannot reside on systems that contain other applications or systems, which aspect of cloud computing would be prohibitive in this case?

Multitenancy
Multitenancy
Broad network access
Broad network access
Portability
Portability
Elasticity
Elasticity
Suggested answer: A

Explanation:

Multitenancy is the aspect of cloud computing that involves having multiple customers and applications running within the same system and sharing the same resources. Although considerable mechanisms are in place to ensure isolation and separation, the data and applications are ultimately using shared resources.

Broad network access refers to the ability to access cloud services from any location or client. Portability refers to the ability to easily move cloud services between different cloud providers, whereas elasticity refers to the capabilities of a cloud environment to add or remove services, as needed, to meet current demand.

asked 18/09/2024
Newton Vela
39 questions

Question 235

Report
Export
Collapse

The REST API is a widely used standard for communications of web-based services between clients and the servers hosting them.

Which protocol does the REST API depend on?

HTTP
HTTP
SSH
SSH
SAML
SAML
XML
XML
Suggested answer: A

Explanation:

Representational State Transfer (REST) is a software architectural scheme that applies the components, connectors, and data conduits for many web applications used on the Internet. It uses and relies on the HTTP protocol and supports a variety of data formats. Extensible Markup Language (XML) and Security Assertion Markup Language (SAML) are both standards for exchanging encoded data between two parties, with XML being for more general use and SAML focused on authentication and authorization data. Secure Shell client (SSH) is a secure method for allowing remote login to systems over a network.

asked 18/09/2024
tho nguyen
37 questions

Question 236

Report
Export
Collapse

Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?

Modify data
Modify data
Modify metadata
Modify metadata
New data
New data
Import data
Import data
Suggested answer: B

Explanation:

Modifying the metadata does not change the actual data. Although this initial phase is called "create," it can also refer to modification. In essence, any time data is considered "new," it is in the create phase. This can come from data that is newly created, data that is imported into a system and is new to that system, or data that is already present and is modified into a new form or value.

asked 18/09/2024
Matt Gifford
33 questions

Question 237

Report
Export
Collapse

Most APIs will support a variety of different data formats or structures.

However, the SOAP API will only support which one of the following data formats?

XML
XML
XSLT
XSLT
JSON
JSON
SAML
SAML
Suggested answer: A

Explanation:

The Simple Object Access Protocol (SOAP) protocol only supports the Extensible Markup Language (XML) data format. Although the other options are all data formats or data structures, they are not supported by SOAP.

asked 18/09/2024
Timo Fahlenbck
34 questions

Question 238

Report
Export
Collapse

Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?

Structured
Structured
Unstructured
Unstructured
Volume
Volume
Object
Object
Suggested answer: D

Explanation:

Object storage is typically used to house virtual machine images because it is independent from other systems and is focused solely on storage. It is also the most appropriate for handling large individual files. Volume storage, because it is allocated to a specific host, would not be appropriate for the storing of virtual images. Structured and unstructured are storage types specific to PaaS and would not be used for storing items used throughout a cloud environment.

asked 18/09/2024
Jaroslaw Mikolajczyk
36 questions

Question 239

Report
Export
Collapse

With an API, various features and optimizations are highly desirable to scalability, reliability, and security.

What does the REST API support that the SOAP API does NOT support?

Acceleration
Acceleration
Caching
Caching
Redundancy
Redundancy
Encryption
Encryption
Suggested answer: B

Explanation:

The Simple Object Access Protocol (SOAP) does not support caching, whereas the Representational State Transfer (REST) API does. The other options are all capabilities that are either not supported by SOAP or not supported by any API and must be provided by external features.

asked 18/09/2024
Evelina Turco
34 questions

Question 240

Report
Export
Collapse

Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.

Which concept encapsulates this?

Validity
Validity
Integrity
Integrity
Accessibility
Accessibility
Confidentiality
Confidentiality
Suggested answer: B

Explanation:

Integrity refers to the trustworthiness of data and whether its format and values are true and have not been corrupted or otherwise altered through unauthorized means. Confidentiality refers to keeping data from being access or viewed by unauthorized parties. Accessibility means that data is available and ready when needed by a user or service. Validity can mean a variety of things that are somewhat similar to integrity, but it's not the most appropriate answer in this case.

asked 18/09/2024
Paola Aguirre
39 questions
Total 512 questions
Go to page: of 52
Search