Free Certification Practice Questions

ISC-CCSP

Loading…
Which aspect of cloud computing will be most negatively impacted by vendor lock-in?
#31
Which of the following APIs are most commonly used within a cloud environment?
#32
Which of the following attempts to establish an international standard for eDiscovery processes and best practices?
#33
Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?
#34
Which term relates to the application of scientific methods and practices to evidence?
#35
Which of the following roles involves the provisioning and delivery of cloud services?
#36
What is the primary reason that makes resolving jurisdictional conflicts complicated?
#37
GAAPs are created and maintained by which organization?
#38
Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?
#39
Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
#40
Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?
#41
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
#42
Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
#43
Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and AirConditioning Engineers (ASHRAE)?
#44
Which of the following is not a risk management framework?
#45
Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?
#46
How is an object stored within an object storage system?
#47
Which of the following is NOT a regulatory system from the United States federal government?
#48
Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?
#49
Which United States law is focused on PII as it relates to the financial industry?
#50
Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?
#51
What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?
#52
Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?
#53
What are the two protocols that TLS uses?
#54
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
#55
Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?
#56
Which of the following is considered an internal redundancy for a data center?
#57
Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?
#58
Which of the following roles is responsible for peering with other cloud services and providers?
#59
Which of the following does NOT relate to the hiding of sensitive data from data sets?
#60