Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC Cloud Security CCSP Questions and answers with ValidTests

Exam CCSP All Questions
Exam CCSP Premium Access

View all detail and faqs for the CCSP exam

Viewing page 10 out of 11 pages
Viewing questions 136-150 out of questions
Questions # 136:

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.

Which of the following is NOT something that firewalls are concerned with?

Options:

A.

IP address

B.

Encryption

C.

Port

D.

Protocol

Expert Solution
Questions # 137:

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.

Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

Options:

A.

SOC Type 2, one year

B.

SOC Type 1, one year

C.

SOC Type 2, one month

D.

SOC Type 2, six months

Expert Solution
Questions # 138:

If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?

Options:

A.

Limit

B.

Reservation

C.

Assurance

D.

Guarantee

Expert Solution
Questions # 139:

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

Options:

A.

Archive

B.

Share

C.

Store

D.

Destroy

Expert Solution
Questions # 140:

Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?

Options:

A.

Hardening

B.

Leveling

C.

Baselines

D.

Standards

Expert Solution
Questions # 141:

Which of the following is considered an internal redundancy for a data center?

Options:

A.

Power feeds

B.

Chillers

C.

Network circuits

D.

Generators

Expert Solution
Questions # 142:

Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.

Which of the following is NOT a technology for securing data in transit?

Options:

A.

VPN

B.

TLS

C.

DNSSEC

D.

HTTPS

Expert Solution
Questions # 143:

Which of the following aspects of security is solely the responsibility of the cloud provider?

Options:

A.

Regulatory compliance

B.

Physical security

C.

Operating system auditing

D.

Personal security of developers

Expert Solution
Questions # 144:

From the perspective of compliance, what is the most important consideration when it comes to data center location?

Options:

A.

Natural disasters

B.

Utility access

C.

Jurisdiction

D.

Personnel access

Expert Solution
Questions # 145:

What does a cloud customer purchase or obtain from a cloud provider?

Options:

A.

Services

B.

Hosting

C.

Servers

D.

Customers

Expert Solution
Questions # 146:

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

Options:

A.

Distributed clustering

B.

Distributed balancing

C.

Distributed optimization

D.

Distributed resource scheduling

Expert Solution
Questions # 147:

Which cloud deployment model is MOST likely to offer free or very cheap services to users?

Options:

A.

Hybrid

B.

Community

C.

Public

D.

Private

Expert Solution
Questions # 148:

Where is a DLP solution generally installed when utilized for monitoring data in use?

Options:

A.

Application server

B.

Database server

C.

Network perimeter

D.

User’s client

Expert Solution
Questions # 149:

Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?

Options:

A.

Segregated from host systems

B.

Network access

C.

Scalability

D.

External to system patching

Expert Solution
Questions # 150:

DNSSEC was designed to add a layer of security to the DNS protocol.

Which type of attack was the DNSSEC extension designed to mitigate?

Options:

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Data exposure

Expert Solution
Viewing page 10 out of 11 pages
Viewing questions 136-150 out of questions