Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC Cloud Security CCSP Questions and answers with ValidTests

Exam CCSP All Questions
Exam CCSP Premium Access

View all detail and faqs for the CCSP exam

Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions
Questions # 106:

Which of the following is considered an external redundancy for a data center?

Options:

A.

Power feeds to rack

B.

Generators

C.

Power distribution units

D.

Storage systems

Expert Solution
Questions # 107:

What controls the formatting and security settings of a volume storage system within a cloud environment?

Options:

A.

Management plane

B.

SAN host controller

C.

Hypervisor

D.

Operating system of the host

Expert Solution
Questions # 108:

What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?

Options:

A.

Remove

B.

Monitor

C.

Disable

D.

Stop

Expert Solution
Questions # 109:

Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?

Options:

A.

Injection

B.

Missing function-level access control

C.

Cross-site request forgery

D.

Cross-site scripting

Expert Solution
Questions # 110:

What must be secured on physical hardware to prevent unauthorized access to systems?

Options:

A.

BIOS

B.

SSH

C.

RDP

D.

ALOM

Expert Solution
Questions # 111:

Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?

Options:

A.

Cloud service business manager

B.

Cloud service user

C.

Cloud service administrator

D.

Cloud service integrator

Expert Solution
Questions # 112:

Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

Options:

A.

Resource pooling

B.

Virtualization

C.

Multitenancy

D.

Regulation

Expert Solution
Questions # 113:

Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?

Options:

A.

Create

B.

Use

C.

Share

D.

Store

Expert Solution
Questions # 114:

Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?

Options:

A.

IPS

B.

WAF

C.

DLP

D.

IDS

Expert Solution
Questions # 115:

Which of the following are the storage types associated with PaaS?

Options:

A.

Structured and freeform

B.

Volume and object

C.

Structured and unstructured

D.

Database and file system

Expert Solution
Questions # 116:

Which of the following standards primarily pertains to cabling designs and setups in a data center?

Options:

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

Expert Solution
Questions # 117:

Which United States law is focused on accounting and financial practices of organizations?

Options:

A.

Safe Harbor

B.

GLBA

C.

SOX

D.

HIPAA

Expert Solution
Questions # 118:

Which of the following storage types is most closely associated with a traditional file system and tree structure?

Options:

A.

Volume

B.

Unstructured

C.

Object

D.

Structured

Expert Solution
Questions # 119:

Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?

Options:

A.

NFPA

B.

BICSI

C.

IDCA

D.

Uptime Institute

Expert Solution
Questions # 120:

Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?

Options:

A.

Missing function level access control

B.

Cross-site scripting

C.

Cross-site request forgery

D.

Injection

Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions