Free Certification Practice Questions

ISC-CCSP

Loading…
Which aspect of security is DNSSEC designed to ensure?
#181
Which process serves to prove the identity and credentials of a user requesting access to an application or data?
#182
Who would be responsible for implementing IPsec to secure communications for an application?
#183
What is the minimum regularity for testing a BCDR plan to meet best practices?
#184
Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?
#185
Which of the following is NOT part of a retention policy?
#186
Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?
#187
Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?
#188
Which of the following is NOT something that an HIDS will monitor?
#189
Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed?
#190
What concept does the "A" represent in the DREAD model?
#191
Which attribute of data poses the biggest challenge for data discovery?
#192
What does static application security testing (SAST) offer as a tool to the testers?
#193
Which of the following service capabilities gives the cloud customer an established and maintained framework to deploy code and applications?
#194
What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?
#195
Which value refers to the percentage of production level restoration needed to meet BCDR objectives?
#196
Over time, what is a primary concern for data archiving?
#197
What is an often overlooked concept that is essential to protecting the confidentiality of data?
#198
Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?
#199
What concept does the "D" represent with the STRIDE threat model?
#200
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.Which role would you be assuming under this directive?
#201
One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.Which aspect of cloud computing makes this particular component more challenging than in a traditional data center?
#202
In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?
#203
Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?
#204
Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?
#205
You just hired an outside developer to modernize some applications with new web services and functionality. In order to implement a comprehensive test platform for validation, the developer needs a data set that resembles a production data set in both size and composition.In order to accomplish this, what type of masking would you use?
#206
In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?
#207
Where is a DLP solution generally installed when utilized for monitoring data at rest?
#208
Which of the following aspects of security is solely the responsibility of the cloud provider?
#209
Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.Which of the following is the optimal humidity level, as established by ASHRAE?
#210