New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC CCSP Practice Exam with Questions & Answers | Set: 6

Questions 76

Which of the following are the storage types associated with PaaS?

Options:
A.

Structured and freeform

B.

Volume and object

C.

Structured and unstructured

D.

Database and file system

ISC CCSP Premium Access
Questions 77

What type of PII is regulated based on the type of application or per the conditions of the specific hosting agreement?

Options:
A.

Specific

B.

Contractual

C.

regulated

D.

Jurisdictional

Questions 78

Which of the following is not a risk management framework?

Options:
A.

COBIT

B.

Hex GBL

C.

ISO 31000:2009

D.

NIST SP 800-37

Questions 79

Which of the following is not a component of contractual PII?

Options:
A.

Scope of processing

B.

Value of data

C.

Location of data

D.

Use of subcontractors

Questions 80

Which of the following is the biggest concern or challenge with using encryption?

Options:
A.

Dependence on keys

B.

Cipher strength

C.

Efficiency

D.

Protocol standards

Questions 81

Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?

Options:
A.

Consumable service

B.

Measured service

C.

Billable service

D.

Metered service

Questions 82

Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?

Options:
A.

European Union

B.

Germany

C.

Russia

D.

United States

Questions 83

Which of the following statements accurately describes VLANs?

Options:
A.

They are not restricted to the same data center or the same racks.

B.

They are not restricted to the name rack but restricted to the same data center.

C.

They are restricted to the same racks and data centers.

D.

They are not restricted to the same rack but restricted to same switches.

Questions 84

Which audit type has been largely replaced by newer approaches since 2011?

Options:
A.

SOC Type 1

B.

SSAE-16

C.

SAS-70

D.

SOC Type 2

Questions 85

What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?

Options:
A.

Anonymization

B.

Tokenization

C.

Masking

D.

Obfuscation

Questions 86

Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?

Options:
A.

Service-level agreements

B.

Governance

C.

Regulatory requirements

D.

Auditability

Questions 87

What concept does the "A" represent in the DREAD model?

Options:
A.

Affected users

B.

Authentication

C.

Affinity

D.

Authorization

Questions 88

Which if the following is NOT one of the three components of a federated identity system transaction?

Options:
A.

Relying party

B.

Identity provider

C.

User

D.

Proxy relay

Questions 89

Which of the following is NOT one of five principles of SOC Type 2 audits?

Options:
A.

Privacy

B.

Processing integrity

C.

Financial

D.

Security

Questions 90

Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?

Options:
A.

Interoperability

B.

Resource pooling

C.

Portability

D.

Measured service