Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Effective Study Techniques for the ISC CCSP Exam

Questions 61

Which of the following roles involves testing, monitoring, and securing cloud services for an organization?

Options:

A.

Cloud service integrator

B.

Cloud service business manager

C.

Cloud service user

D.

Cloud service administrator

Buy Now
Questions 62

Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?

Options:

A.

Hybrid

B.

Public

C.

Private

D.

Community

Buy Now
Questions 63

Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?

Options:

A.

Cloud service user

B.

Cloud service business manager

C.

Cloud service administrator

D.

Cloud service integrator

Buy Now
Questions 64

Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?

Options:

A.

Cloud service manager

B.

Cloud service deployment

C.

Cloud service business manager

D.

Cloud service operations manager

Buy Now
Questions 65

Which of the following is the optimal humidity level for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?

Options:

A.

30-50 percent relative humidity

B.

50-75 percent relative humidity

C.

20-40 percent relative humidity

D.

40-60 percent relative humidity

Buy Now
Questions 66

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

Options:

A.

Dedicated switches

B.

Trust zones

C.

Redundant network circuits

D.

Direct connections

Buy Now
Questions 67

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Options:

A.

Cloud auditor

B.

Inter-cloud provider

C.

Cloud service broker

D.

Cloud service developer

Buy Now
Questions 68

Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?

Options:

A.

IDCA

B.

Uptime Institute

C.

NFPA

D.

BICSI

Buy Now
Questions 69

Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?

Options:

A.

SATA

B.

iSCSI

C.

TLS

D.

SCSI

Buy Now
Questions 70

What is the only data format permitted with the SOAP API?

Options:

A.

HTML

B.

SAML

C.

XSML

D.

XML

Buy Now
Questions 71

What type of masking strategy involves making a separate and distinct copy of data with masking in place?

Options:

A.

Dynamic

B.

Replication

C.

Static

D.

Duplication

Buy Now
Questions 72

Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?

Options:

A.

A Type 2 hypervisor runs on top of another operating system and is dependent on the security of the OS for its own security.

B.

A Type 2 hypervisor allows users to directly perform some functions with their own access.

C.

A Type 2 hypervisor is open source, so attackers can more easily find exploitable vulnerabilities with that access.

D.

A Type 2 hypervisor is always exposed to the public Internet for federated identity access.

Buy Now
Questions 73

What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?

Options:

A.

Remove

B.

Monitor

C.

Disable

D.

Stop

Buy Now
Questions 74

Which technology is NOT commonly used for security with data in transit?

Options:

A.

DNSSEC

B.

IPsec

C.

VPN

D.

HTTPS

Buy Now
Questions 75

Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

Options:

A.

Resource pooling

B.

Virtualization

C.

Multitenancy

D.

Regulation

Buy Now