Free Certification Practice Questions

ISC-CCSP

Loading…
The different cloud service models have varying levels of responsibilities for functions and operations depending with the model's level of service.In which of the following models would the responsibility for patching lie predominantly with the cloud customer?
#391
Which component of ITIL involves the creation of an RFC ticket and obtaining official approvals for it?
#392
Which of the following are attributes of cloud computing?
#393
In a cloud environment, encryption should be used for all the following, except:
#394
Which of the following is considered a technological control?
#395
When using an IaaS solution, what is the capability provided to the customer?
#396
When using an IaaS solution, what is a key benefit provided to the customer?
#397
Which of the following is considered an administrative control?
#398
What is a key capability or characteristic of PaaS?
#399
In which cloud service model is the customer required to maintain the OS?
#400
When using a PaaS solution, what is the capability provided to the customer?
#401
What are SOC 1/SOC 2/SOC 3?
#402
Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:
#403
In attempting to provide a layered defense, the security practitioner should convince senior management to include security controls of which type?
#404
The BIA can be used to provide information about all the following, except:
#405
Which of the following are cloud computing roles?
#406
Which of the following are considered to be the building blocks of cloud computing?
#407
Which of the following is considered a physical control?
#408
What is an experimental technology that is intended to create the possibility of processing encrypted data without having to decrypt it first?
#409
Which of the following are distinguishing characteristics of a managed service provider?
#410
To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:
#411
Tokenization requires two distinct _________________ .
#412
DLP can be combined with what other security technology to enhance data controls?
#413
What is the intellectual property protection for a confidential recipe for muffins?
#414
Every security program and process should have which of the following?
#415
DLP solutions can aid in deterring loss due to which of the following?
#416
All policies within the organization should include a section that includes all of the following, except:
#417
Proper implementation of DLP solutions for successful function requires which of the following?
#418
What is the experimental technology that might lead to the possibility of processing encrypted data without having to decrypt it first?
#419
Data labels could include all the following, except:
#420