Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 11 out of 11 pages
Viewing questions 151-165 out of questions
Questions # 151:

A variety of security systems can be integrated within a network--some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.

Which of the following types of technologies is best described here?

Options:

A.

IDS


B.

IPS


C.

Proxy


D.

Firewall


Expert Solution
Questions # 152:

Which of the following are considered to be the building blocks of cloud computing?

Options:

A.

CPU, RAM, storage, and networking


B.

Data, CPU, RAM, and access control


C.

Data, access control, virtualization, and services


D.

Storage, networking, printing, and virtualization


Expert Solution
Questions # 153:

Which of the following best describes the purpose and scope of ISO/IEC 27034-1?

Options:

A.

Describes international privacy standards for cloud computing


B.

Serves as a newer replacement for NIST 800-52 r4


C.

Provides on overview of network and infrastructure security designed to secure cloud applications.


D.

Provides an overview of application security that introduces definitive concepts, principles, and processes involved in application security.


Expert Solution
Viewing page 11 out of 11 pages
Viewing questions 151-165 out of questions