Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Effective Study Techniques for the ISC CCSP Exam

Questions 91

Which type of testing uses the same strategies and toolsets that hackers would use?

Options:

A.

Penetration

B.

Dynamic

C.

Static

D.

Malicious

Buy Now
Questions 92

Which European Union directive pertains to personal data privacy and an individual's control over their personal data?

Options:

A.

99/9/EC

B.

95/46/EC

C.

2000/1/EC

D.

2013/27001/EC

Buy Now
Questions 93

What type of masking strategy involves replacing data on a system while it passes between the data and application layers?

Options:

A.

Dynamic

B.

Static

C.

Replication

D.

Duplication

Buy Now
Questions 94

What concept does the "T" represent in the STRIDE threat model?

Options:

A.

TLS

B.

Testing

C.

Tampering with data

D.

Transport

Buy Now
Questions 95

What type of data does data rights management (DRM) protect?

Options:

A.

Consumer

B.

PII

C.

Financial

D.

Healthcare

Buy Now
Questions 96

Who would be responsible for implementing IPsec to secure communications for an application?

Options:

A.

Developers

B.

Systems staff

C.

Auditors

D.

Cloud customer

Buy Now
Questions 97

Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?

Options:

A.

CPU

B.

Users

C.

Memory

D.

Network

Buy Now
Questions 98

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

Options:

A.

Community

B.

Hybrid

C.

Private

D.

Public

Buy Now
Questions 99

Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?

Options:

A.

Delete

B.

Modify

C.

Read

D.

Print

Buy Now
Questions 100

Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?

Options:

A.

Reservations

B.

Measured service

C.

Limits

D.

Shares

Buy Now
Questions 101

What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?

Options:

A.

Dynamic clustering

B.

Dynamic balancing

C.

Dynamic resource scheduling

D.

Dynamic optimization

Buy Now
Questions 102

Which OSI layer does IPsec operate at?

Options:

A.

Network

B.

transport

C.

Application

D.

Presentation

Buy Now
Questions 103

Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?

Options:

A.

Availability

B.

Interoperability

C.

Reversibility

D.

Portability

Buy Now
Questions 104

What concept does the "R" represent with the DREAD model?

Options:

A.

Reproducibility

B.

Repudiation

C.

Risk

D.

Residual

Buy Now
Questions 105

What must SOAP rely on for security?

Options:

A.

Encryption

B.

Tokenization

C.

TLS

D.

SSL

Buy Now