Pass the ISC Cloud Security CCSP Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which type of testing uses the same strategies and toolsets that hackers would use?

Options:

A.

Penetration


B.

Dynamic


C.

Static


D.

Malicious


Expert Solution
Questions # 32:

What does the "SOC" acronym refer to with audit reports?

Options:

A.

Service Origin Confidentiality


B.

System Organization Confidentiality


C.

Service Organizational Control


D.

System Organization Control


Expert Solution
Questions # 33:

Which security concept would business continuity and disaster recovery fall under?

Options:

A.

Confidentiality


B.

Availability


C.

Fault tolerance


D.

Integrity


Expert Solution
Questions # 34:

At which stage of the BCDR plan creation phase should security be included in discussions?

Options:

A.

Define scope


B.

Analyze


C.

Assess risk


D.

Gather requirements


Expert Solution
Questions # 35:

Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?

Options:

A.

Six months


B.

One month


C.

One year


D.

One week


Expert Solution
Questions # 36:

What type of security threat is DNSSEC designed to prevent?

Options:

A.

Account hijacking


B.

Snooping


C.

Spoofing


D.

Injection


Expert Solution
Questions # 37:

Which of the following is the MOST important requirement and guidance for testing during an audit?

Options:

A.

Stakeholders


B.

Shareholders


C.

Management


D.

Regulations


Expert Solution
Questions # 38:

Which aspect of cloud computing makes data classification even more vital than in a traditional data center?

Options:

A.

Interoperability


B.

Virtualization


C.

Multitenancy


D.

Portability


Expert Solution
Questions # 39:

What changes are necessary to application code in order to implement DNSSEC?

Options:

A.

Adding encryption modules


B.

Implementing certificate validations


C.

Additional DNS lookups


D.

No changes are needed.


Expert Solution
Questions # 40:

What must be secured on physical hardware to prevent unauthorized access to systems?

Options:

A.

BIOS


B.

SSH


C.

RDP


D.

ALOM


Expert Solution
Questions # 41:

Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?

Options:

A.

European Union


B.

Germany


C.

Russia


D.

United States


Expert Solution
Questions # 42:

Which of the following is NOT a criterion for data within the scope of eDiscovery?

Options:

A.

Possession


B.

Custody


C.

Control


D.

Archive


Expert Solution
Questions # 43:

Which aspect of cloud computing will be most negatively impacted by vendor lock-in?

Options:

A.

Elasticity


B.

Reversibility


C.

Interoperability


D.

Portability


Expert Solution
Questions # 44:

Which United States law is focused on accounting and financial practices of organizations?

Options:

A.

Safe Harbor


B.

GLBA


C.

SOX


D.

HIPAA


Expert Solution
Questions # 45:

What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?

Options:

A.

Virtual


B.

Security


C.

Physical


D.

Logical


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions