Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC Cloud Security CCSP Questions and answers with ValidTests

Exam CCSP All Questions
Exam CCSP Premium Access

View all detail and faqs for the CCSP exam

Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?

Options:

A.

Reservations

B.

Measured service

C.

Limits

D.

Shares

Expert Solution
Questions # 32:

With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?

Options:

A.

Routing

B.

Session

C.

Filtering

D.

Firewalling

Expert Solution
Questions # 33:

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

Options:

A.

Platform

B.

Infrastructure

C.

Software

D.

Desktop

Expert Solution
Questions # 34:

What concept does the "I" represent with the STRIDE threat model?

Options:

A.

Integrity

B.

Information disclosure

C.

IT security

D.

Insider threat

Expert Solution
Questions # 35:

What process is used within a clustered system to provide high availability and load balancing?

Options:

A.

Dynamic balancing

B.

Dynamic clustering

C.

Dynamic optimization

D.

Dynamic resource scheduling

Expert Solution
Questions # 36:

Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?

Options:

A.

Delete

B.

Modify

C.

Read

D.

Print

Expert Solution
Questions # 37:

What does the "SOC" acronym refer to with audit reports?

Options:

A.

Service Origin Confidentiality

B.

System Organization Confidentiality

C.

Service Organizational Control

D.

System Organization Control

Expert Solution
Questions # 38:

What concept does the "T" represent in the STRIDE threat model?

Options:

A.

TLS

B.

Testing

C.

Tampering with data

D.

Transport

Expert Solution
Questions # 39:

Which of the following features is a main benefit of PaaS over IaaS?

Options:

A.

Location independence

B.

High-availability

C.

Physical security requirements

D.

Auto-scaling

Expert Solution
Questions # 40:

What type of data does data rights management (DRM) protect?

Options:

A.

Consumer

B.

PII

C.

Financial

D.

Healthcare

Expert Solution
Questions # 41:

What is the minimum regularity for testing a BCDR plan to meet best practices?

Options:

A.

Once year

B.

Once a month

C.

Every six months

D.

When the budget allows it

Expert Solution
Questions # 42:

Which approach is typically the most efficient method to use for data discovery?

Options:

A.

Metadata

B.

Content analysis

C.

Labels

D.

ACLs

Expert Solution
Questions # 43:

Which if the following is NOT one of the three components of a federated identity system transaction?

Options:

A.

Relying party

B.

Identity provider

C.

User

D.

Proxy relay

Expert Solution
Questions # 44:

The SOC Type 2 reports are divided into five principles.

Which of the five principles must also be included when auditing any of the other four principles?

Options:

A.

Confidentiality

B.

Privacy

C.

Security

D.

Availability

Expert Solution
Questions # 45:

Which of the following is a widely used tool for code development, branching, and collaboration?

Options:

A.

GitHub

B.

Maestro

C.

Orchestrator

D.

Conductor

Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions