Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions
Questions # 1:

What must SOAP rely on for security?

Options:

A.

Encryption


B.

Tokenization


C.

TLS


D.

SSL


Expert Solution
Questions # 2:

What type of masking strategy involves replacing data on a system while it passes between the data and application layers?

Options:

A.

Dynamic


B.

Static


C.

Replication


D.

Duplication


Expert Solution
Questions # 3:

Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?

Options:

A.

Hybrid


B.

Community


C.

Private


D.

Public


Expert Solution
Questions # 4:

What is the biggest challenge to data discovery in a cloud environment?

Options:

A.

Format


B.

Ownership


C.

Location


D.

Multitenancy


Expert Solution
Questions # 5:

What is the minimum regularity for testing a BCDR plan to meet best practices?

Options:

A.

Once year


B.

Once a month


C.

Every six months


D.

When the budget allows it


Expert Solution
Questions # 6:

Which of the following is NOT a focus or consideration of an internal audit?

Options:

A.

Certification


B.

Design


C.

Costs


D.

Operational efficiency


Expert Solution
Questions # 7:

What concept does the "T" represent in the STRIDE threat model?

Options:

A.

TLS


B.

Testing


C.

Tampering with data


D.

Transport


Expert Solution
Questions # 8:

Which aspect of security is DNSSEC designed to ensure?

Options:

A.

Integrity


B.

Authentication


C.

Availability


D.

Confidentiality


Expert Solution
Questions # 9:

What provides the information to an application to make decisions about the authorization level appropriate when granting access?

Options:

A.

User


B.

Relying party


C.

Federation


D.

Identity Provider


Expert Solution
Questions # 10:

What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?

Options:

A.

Proxy


B.

Bastion


C.

Honeypot


D.

WAF


Expert Solution
Questions # 11:

Which of the following is NOT something that an HIDS will monitor?

Options:

A.

Configurations


B.

User logins


C.

Critical system files


D.

Network traffic


Expert Solution
Questions # 12:

Which of the following is a widely used tool for code development, branching, and collaboration?

Options:

A.

GitHub


B.

Maestro


C.

Orchestrator


D.

Conductor


Expert Solution
Questions # 13:

What concept does the "A" represent in the DREAD model?

Options:

A.

Affected users


B.

Authentication


C.

Affinity


D.

Authorization


Expert Solution
Questions # 14:

Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?

Options:

A.

Platform


B.

Data


C.

Physical environment


D.

Infrastructure


Expert Solution
Questions # 15:

Which of the following is NOT a factor that is part of a firewall configuration?

Options:

A.

Encryption


B.

Port


C.

Protocol


D.

Source IP


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions