ISC CCSP Exam Practice Questions (P. 2)
- Full Access (512 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
- ACryptographic erasure
- BZeroing
- COverwriting
- DDeletionMost Voted
Correct Answer:
D
Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.
D
Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.
send
light_mode
delete
Question #12
Which of the following cloud aspects complicates eDiscovery?
- AResource pooling
- BOn-demand self-service
- CMultitenancyMost Voted
- DMeasured service
Correct Answer:
C
With multitenancy, eDiscovery becomes more complicated because the data collection involves extra steps to ensure that only those customers or systems that are within scope are turned over to the requesting authority.
C
With multitenancy, eDiscovery becomes more complicated because the data collection involves extra steps to ensure that only those customers or systems that are within scope are turned over to the requesting authority.
send
light_mode
delete
Question #13
What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?
- AScripts
- BRDP
- CAPIsMost Voted
- DXML
Correct Answer:
C
The functions of the management plane are typically exposed as a series of remote calls and function executions and as a set of APIs. These APIs are typically leveraged through either a client or a web portal, with the latter being the most common.
C
The functions of the management plane are typically exposed as a series of remote calls and function executions and as a set of APIs. These APIs are typically leveraged through either a client or a web portal, with the latter being the most common.
send
light_mode
delete
Question #14
What is a serious complication an organization faces from the perspective of compliance with international operations?
- ADifferent certifications
- BMultiple jurisdictionsMost Voted
- CDifferent capabilities
- DDifferent operational procedures
Correct Answer:
B
When operating within a global framework, a security professional runs into a multitude of jurisdictions and requirements, and many times they might be in contention with one other or not clearly applicable. These requirements can include the location of the users and the type of data they enter into systems, the laws governing the organization that owns the application and any regulatory requirements they may have, as well as the appropriate laws and regulations for the jurisdiction housing the IT resources and where the data is actually stored, which might be multiple jurisdictions as well.
B
When operating within a global framework, a security professional runs into a multitude of jurisdictions and requirements, and many times they might be in contention with one other or not clearly applicable. These requirements can include the location of the users and the type of data they enter into systems, the laws governing the organization that owns the application and any regulatory requirements they may have, as well as the appropriate laws and regulations for the jurisdiction housing the IT resources and where the data is actually stored, which might be multiple jurisdictions as well.
send
light_mode
delete
Question #15
Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?
- APLAN
- BWAN
- CLAN
- DVLANMost Voted
Correct Answer:
D
A virtual area network (VLAN) allows the logical separation and isolation of networks and IP spaces to provide enhanced security and controls.
D
A virtual area network (VLAN) allows the logical separation and isolation of networks and IP spaces to provide enhanced security and controls.
send
light_mode
delete
Question #16
Which of the following standards primarily pertains to cabling designs and setups in a data center?
- AIDCA
- BBICSI
- CNFPA
- DUptime Institute
Correct Answer:
B
The standards put out by Building Industry Consulting Service International (BICSI) primarily cover complex cabling designs and setups for data centers, but also include specifications on power, energy efficiency, and hot/cold aisle setups.
B
The standards put out by Building Industry Consulting Service International (BICSI) primarily cover complex cabling designs and setups for data centers, but also include specifications on power, energy efficiency, and hot/cold aisle setups.
send
light_mode
delete
Question #17
Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?
- AIDCA
- BUptime InstituteMost Voted
- CNFPA
- DBICSI
Correct Answer:
B
The Uptime Institute publishes the most commonly used and widely known standard on data center tiers and topologies. It is based on a series of four tiers, with each progressive increase in number representing more stringent, reliable, and redundant systems for security, connectivity, fault tolerance, redundancy, and cooling.
B
The Uptime Institute publishes the most commonly used and widely known standard on data center tiers and topologies. It is based on a series of four tiers, with each progressive increase in number representing more stringent, reliable, and redundant systems for security, connectivity, fault tolerance, redundancy, and cooling.
send
light_mode
delete
Question #18
What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?
- AVirtual
- BSecurity
- CPhysical
- DLogicalMost Voted
Correct Answer:
D
Cloud environments lack the ability to physically separate resources like a traditional data center can. To compensate, cloud computing logical segregation concepts are employed. These include VLANs, sandboxing, and the use of virtual network devices such as firewalls.
D
Cloud environments lack the ability to physically separate resources like a traditional data center can. To compensate, cloud computing logical segregation concepts are employed. These include VLANs, sandboxing, and the use of virtual network devices such as firewalls.
send
light_mode
delete
Question #19
Which United States law is focused on data related to health records and privacy?
- ASafe Harbor
- BSOX
- CGLBA
- DHIPAAMost Voted
Correct Answer:
D
The Health Insurance Portability and Accountability Act (HIPAA) requires the U.S. Federal Department of Health and Human Services to publish and enforce regulations pertaining to electronic health records and identifiers between patients, providers, and insurance companies. It is focused on the security controls and confidentiality of medical records, rather than the specific technologies used, so long as they meet the requirements of the regulations.
D
The Health Insurance Portability and Accountability Act (HIPAA) requires the U.S. Federal Department of Health and Human Services to publish and enforce regulations pertaining to electronic health records and identifiers between patients, providers, and insurance companies. It is focused on the security controls and confidentiality of medical records, rather than the specific technologies used, so long as they meet the requirements of the regulations.
send
light_mode
delete
Question #20
What is used for local, physical access to hardware within a data center?
- ASSH
- BKVM
- CVPN
- DRDP
Correct Answer:
B
Local, physical access in a data center is done via KVM (keyboard, video, mouse) switches.
B
Local, physical access in a data center is done via KVM (keyboard, video, mouse) switches.
send
light_mode
delete
All Pages