Free Certification Practice Questions

ISC-CCSP

Loading…
Which of the following are the storage types associated with IaaS?
#61
Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?
#62
Which of the following storage types is most closely associated with a traditional file system and tree structure?
#63
Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?
#64
Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?
#65
Which of the following statements accurately describes VLANs?
#66
What must be secured on physical hardware to prevent unauthorized access to systems?
#67
What type of PII is regulated based on the type of application or per the conditions of the specific hosting agreement?
#68
Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?
#69
Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?
#70
If you're using iSCSI in a cloud environment, what must come from an external protocol or application?
#71
Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?
#72
What does the REST API support that SOAP does NOT support?
#73
Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?
#74
Which of the following are the storage types associated with PaaS?
#75
Which of the following threat types can occur when baselines are not appropriately applied or unauthorized changes are made?
#76
What is the data encapsulation used with the SOAP protocol referred to?
#77
Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
#78
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
#79
What is the biggest negative to leasing space in a data center versus building or maintain your own?
#80
Which aspect of archiving must be tested regularly for the duration of retention requirements?
#81
Which of the following represents a minimum guaranteed resource within a cloud environment for the cloud customer?
#82
When is a virtual machine susceptible to attacks while a physical server in the same state would not be?
#83
Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?
#84
Which of the following is the biggest concern or challenge with using encryption?
#85
Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?
#86
Which technology is NOT commonly used for security with data in transit?
#87
Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?
#88
Which of the following is considered an external redundancy for a data center?
#89
Which of the following is the optimal humidity level for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and AirConditioning Engineers (ASHRAE)?
#90