Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
CCSP
Free trial
Verified
Question 76
Which approach is typically the most efficient method to use for data discovery?
- A: Metadata
- B: Content analysis
- C: Labels
- D: ACLs
Question 77
Which of the following features is a main benefit of PaaS over IaaS?
- A: Location independence
- B: High-availability
- C: Physical security requirements
- D: Auto-scaling
Question 78
Which audit type has been largely replaced by newer approaches since 2011?
- A: SOC Type 1
- B: SSAE-16
- C: SAS-70
- D: SOC Type 2
Question 79
Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?
- A: IDCA
- B: Uptime Institute
- C: NFPA
- D: BICSI
Question 80
Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?
- A: Reservations
- B: Measured service
- C: Limits
- D: Shares
Question 81
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
- A: Platform
- B: Infrastructure
- C: Software
- D: Desktop
Question 82
What does the "SOC" acronym refer to with audit reports?
- A: Service Origin Confidentiality
- B: System Organization Confidentiality
- C: Service Organizational Control
- D: System Organization Control
Question 83
What does the REST API use to protect data transmissions?
- A: NetBIOS
- B: VPN
- C: Encapsulation
- D: TLS
Question 84
What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?
- A: Masking
- B: Anonymization
- C: Tokenization
- D: Obfuscation
Question 85
With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?
- A: Routing
- B: Session
- C: Filtering
- D: Firewalling
Question 86
Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?
- A: Applications
- B: Key performance indicators (KPIs)
- C: Services
- D: Security
Question 87
What does dynamic application security testing (DAST) NOT entail?
- A: Scanning
- B: Probing
- C: Discovery
- D: Knowledge of the system
Question 88
Where is an XML firewall most commonly deployed in the environment?
- A: Between the application and data layers
- B: Between the IPS and firewall
- C: Between the presentation and application layers
- D: Between the firewall and application server
Question 89
What type of masking strategy involves replacing data on a system while it passes between the data and application layers?
- A: Dynamic
- B: Static
- C: Replication
- D: Duplication
Question 90
What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?
- A: Virtual
- B: Security
- C: Physical
- D: Logical
Question 91
Which of the following is a widely used tool for code development, branching, and collaboration?
- A: GitHub
- B: Maestro
- C: Orchestrator
- D: Conductor
Question 92
Which aspect of security is DNSSEC designed to ensure?
- A: Integrity
- B: Authentication
- C: Availability
- D: Confidentiality
Question 93
Which process serves to prove the identity and credentials of a user requesting access to an application or data?
- A: Repudiation
- B: Authentication
- C: Identification
- D: Authorization
Question 94
Who would be responsible for implementing IPsec to secure communications for an application?
- A: Developers
- B: Systems staff
- C: Auditors
- D: Cloud customer
Question 95
What is the minimum regularity for testing a BCDR plan to meet best practices?
- A: Once year
- B: Once a month
- C: Every six months
- D: When the budget allows it
Question 96
Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?
- A: Broad network access
- B: Interoperability
- C: Resource pooling
- D: Portability
Question 97
Which of the following is NOT part of a retention policy?
- A: Format
- B: Costs
- C: Accessibility
- D: Duration
Question 98
Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?
- A: Interoperability
- B: Resource pooling
- C: Portability
- D: Measured service
Question 99
Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?
- A: Hybrid
- B: Community
- C: Private
- D: Public
Question 100
Which of the following is NOT something that an HIDS will monitor?
- A: Configurations
- B: User logins
- C: Critical system files
- D: Network traffic
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!