Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC Cloud Security CCSP Questions and answers with ValidTests

Exam CCSP All Questions
Exam CCSP Premium Access

View all detail and faqs for the CCSP exam

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.

What term pertains to the application of scientific norms and protocols to digital investigations?

Options:

A.

Scientific

B.

Investigative

C.

Methodological

D.

Forensics

Expert Solution
Questions # 122:

Which aspect of SaaS will alleviate much of the time and energy organizations spend on compliance (specifically baselines)?

Options:

A.

Maintenance

B.

Licensing

C.

Standardization

D.

Development

Expert Solution
Questions # 123:

With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?

Options:

A.

Structured and unstructured

B.

Structured and hierarchical

C.

Volume and database

D.

Volume and object

Expert Solution
Questions # 124:

Which of the following is NOT one of the main intended goals of a DLP solution?

Options:

A.

Showing due diligence

B.

Preventing malicious insiders

C.

Regulatory compliance

D.

Managing and minimizing risk

Expert Solution
Questions # 125:

Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?

Options:

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

Expert Solution
Questions # 126:

With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.

What is the term associated with this determination?

Options:

A.

Weighting

B.

Prioritization

C.

Shares

D.

Scoring

Expert Solution
Questions # 127:

Jurisdictions have a broad range of privacy requirements pertaining to the handling of personal data and information.

Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?

Options:

A.

Japan

B.

United States

C.

European Union

D.

Russia

Expert Solution
Questions # 128:

Which data state would be most likely to use digital signatures as a security protection mechanism?

Options:

A.

Data in use

B.

Data in transit

C.

Archived

D.

Data at rest

Expert Solution
Questions # 129:

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

Options:

A.

APIs

B.

Scripts

C.

TLS

D.

XML

Expert Solution
Questions # 130:

When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.

What is the data encapsulation used with the SOAP protocol referred to as?

Options:

A.

Packet

B.

Payload

C.

Object

D.

Envelope

Expert Solution
Questions # 131:

Within a federated identity system, which entity accepts tokens from the identity provider?

Options:

A.

Assertion manager

B.

Servicing party

C.

Proxy party

D.

Relying party

Expert Solution
Questions # 132:

In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?

Options:

A.

GLBA

B.

Safe Harbor

C.

HIPAA

D.

SOX

Expert Solution
Questions # 133:

Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?

Options:

A.

Injection

B.

Cross-site request forgery

C.

Missing function-level access control

D.

Cross-site scripting

Expert Solution
Questions # 134:

With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?

Options:

A.

Structured and hierarchical

B.

Volume and object

C.

Volume and database

D.

Structured and unstructured

Expert Solution
Questions # 135:

Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?

Options:

A.

Cross-site request forgery

B.

Missing function-level access control

C.

Injection

D.

Cross-site scripting

Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions