ISC CCSP Exam Practice Questions (P. 5)
- Full Access (512 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?
- AHybrid
- BPublic
- CPrivate
- DCommunity
Correct Answer:
B
Popular services such as iCloud, Dropbox, and OneDrive are all publicly available and are open to any user for free, with possible add-on services offered for a cost.
B
Popular services such as iCloud, Dropbox, and OneDrive are all publicly available and are open to any user for free, with possible add-on services offered for a cost.
send
light_mode
delete
Question #42
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
- AA Type 2 hypervisor runs on top of another operating system and is dependent on the security of the OS for its own security.
- BA Type 2 hypervisor allows users to directly perform some functions with their own access.
- CA Type 2 hypervisor is open source, so attackers can more easily find exploitable vulnerabilities with that access.
- DA Type 2 hypervisor is always exposed to the public Internet for federated identity access.
Correct Answer:
A
A Type 2 hypervisor differs from a Type 1 hypervisor in that it runs on top of another operating system rather than directly tied into the underlying hardware of the virtual host servers. With this type of implementation, additional security and architecture concerns come into play because the interaction between the operating system and the hypervisor becomes a critical link. The hypervisor no longer has direct interaction and control over the underlying hardware, which means that some performance will be lost due to the operating system in the middle needing its own resources, patching requirements, and operational oversight.
A
A Type 2 hypervisor differs from a Type 1 hypervisor in that it runs on top of another operating system rather than directly tied into the underlying hardware of the virtual host servers. With this type of implementation, additional security and architecture concerns come into play because the interaction between the operating system and the hypervisor becomes a critical link. The hypervisor no longer has direct interaction and control over the underlying hardware, which means that some performance will be lost due to the operating system in the middle needing its own resources, patching requirements, and operational oversight.
send
light_mode
delete
Question #43
Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
- ACreate
- BUse
- CShare
- DStore
Correct Answer:
A
Any time data is created, modified, or imported, the classification needs to be evaluated and set from the earliest phase to ensure security is always properly maintained for the duration of its lifecycle.
A
Any time data is created, modified, or imported, the classification needs to be evaluated and set from the earliest phase to ensure security is always properly maintained for the duration of its lifecycle.
send
light_mode
delete
Question #44
Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air
Conditioning Engineers (ASHRAE)?
Conditioning Engineers (ASHRAE)?
- A69.8-86.0degF (21-30degC)
- B64.4-80.6degF(18-27degC)
- C51.8-66.2degF(11-19degC)
- D44.6-60-8degF(7-16degC)
Correct Answer:
B
The guidelines from ASHRAE establish 64.4-80.6degF (18-27degC) as the optimal temperature for a data center.
B
The guidelines from ASHRAE establish 64.4-80.6degF (18-27degC) as the optimal temperature for a data center.
send
light_mode
delete
Question #45
Which of the following is not a risk management framework?
- ACOBIT
- BHex GBLMost Voted
- CISO 31000:2009
- DNIST SP 800-37
Correct Answer:
B
Hex GBL is a reference to a computer part in Terry Pratchett's fictional Discworld universe. The rest are not.
B
Hex GBL is a reference to a computer part in Terry Pratchett's fictional Discworld universe. The rest are not.
send
light_mode
delete
Question #46
Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?
- AMissing function level access control
- BCross-site scripting
- CCross-site request forgeryMost Voted
- DInjection
Correct Answer:
B
Cross-site scripting (XSS) is an attack where a malicious actor is able to send untrusted data to a user's browser without going through any validation or sanitization processes, or where the code is not properly escaped from processing by the browser. The code is then executed on the user's browser with the user's own access and permissions, allowing an attacker to redirect their web traffic, steal data from their session, or potentially access information on the user's own computer that their browser has the ability to access.
B
Cross-site scripting (XSS) is an attack where a malicious actor is able to send untrusted data to a user's browser without going through any validation or sanitization processes, or where the code is not properly escaped from processing by the browser. The code is then executed on the user's browser with the user's own access and permissions, allowing an attacker to redirect their web traffic, steal data from their session, or potentially access information on the user's own computer that their browser has the ability to access.
send
light_mode
delete
Question #47
How is an object stored within an object storage system?
- AKey valueMost Voted
- BDatabase
- CLDAP
- DTree structure
Correct Answer:
A
Object storage uses a flat structure with key values to store and access objects.
A
Object storage uses a flat structure with key values to store and access objects.
send
light_mode
delete
Question #48
Which of the following is NOT a regulatory system from the United States federal government?
- APCI DSS
- BFISMA
- CSOX
- DHIPAA
Correct Answer:
A
The payment card industry data security standard (PCI DSS) pertains to organizations that handle credit card transactions and is an industry regulatory standard, not a governmental one.
A
The payment card industry data security standard (PCI DSS) pertains to organizations that handle credit card transactions and is an industry regulatory standard, not a governmental one.
send
light_mode
delete
Question #49
Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?
- AEuropean Union
- BGermany
- CRussia
- DUnited States
Correct Answer:
D
The United States lacks a single comprehensive law at the federal level addressing data security and privacy, but there are multiple federal laws that deal with different industries.
D
The United States lacks a single comprehensive law at the federal level addressing data security and privacy, but there are multiple federal laws that deal with different industries.
send
light_mode
delete
Question #50
Which United States law is focused on PII as it relates to the financial industry?
- AHIPAA
- BSOX
- CSafe Harbor
- DGLBA
Correct Answer:
D
The GLBA, as it is commonly called based on the lead sponsors and authors of the act, is officially known as "The Financial Modernization Act of 1999." It is specifically focused on PII as it relates to financial institutions. There are three specific components of it, covering various areas and use, on top of a general requirement that all financial institutions must provide all users and customers with a written copy of their privacy policies and practices, including with whom and for what reasons their information may be shared with other entities.
D
The GLBA, as it is commonly called based on the lead sponsors and authors of the act, is officially known as "The Financial Modernization Act of 1999." It is specifically focused on PII as it relates to financial institutions. There are three specific components of it, covering various areas and use, on top of a general requirement that all financial institutions must provide all users and customers with a written copy of their privacy policies and practices, including with whom and for what reasons their information may be shared with other entities.
send
light_mode
delete
All Pages