New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC CCSP Practice Exam with Questions & Answers | Set: 7

Questions 91

Which type of testing uses the same strategies and toolsets that hackers would use?

Options:
A.

Penetration

B.

Dynamic

C.

Static

D.

Malicious

ISC CCSP Premium Access
Questions 92

Which European Union directive pertains to personal data privacy and an individual's control over their personal data?

Options:
A.

99/9/EC

B.

95/46/EC

C.

2000/1/EC

D.

2013/27001/EC

Questions 93

What type of masking strategy involves replacing data on a system while it passes between the data and application layers?

Options:
A.

Dynamic

B.

Static

C.

Replication

D.

Duplication

Questions 94

What concept does the "T" represent in the STRIDE threat model?

Options:
A.

TLS

B.

Testing

C.

Tampering with data

D.

Transport

Questions 95

What type of data does data rights management (DRM) protect?

Options:
A.

Consumer

B.

PII

C.

Financial

D.

Healthcare

Questions 96

Who would be responsible for implementing IPsec to secure communications for an application?

Options:
A.

Developers

B.

Systems staff

C.

Auditors

D.

Cloud customer

Questions 97

Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?

Options:
A.

CPU

B.

Users

C.

Memory

D.

Network

Questions 98

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

Options:
A.

Community

B.

Hybrid

C.

Private

D.

Public

Questions 99

Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?

Options:
A.

Delete

B.

Modify

C.

Read

D.

Print

Questions 100

Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?

Options:
A.

Reservations

B.

Measured service

C.

Limits

D.

Shares

Questions 101

What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?

Options:
A.

Dynamic clustering

B.

Dynamic balancing

C.

Dynamic resource scheduling

D.

Dynamic optimization

Questions 102

Which OSI layer does IPsec operate at?

Options:
A.

Network

B.

transport

C.

Application

D.

Presentation

Questions 103

Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?

Options:
A.

Availability

B.

Interoperability

C.

Reversibility

D.

Portability

Questions 104

What concept does the "R" represent with the DREAD model?

Options:
A.

Reproducibility

B.

Repudiation

C.

Risk

D.

Residual

Questions 105

What must SOAP rely on for security?

Options:
A.

Encryption

B.

Tokenization

C.

TLS

D.

SSL