Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

CCSPFree trialFree trial

By isc
Aug, 2025

Verified

25Q per page

Question 76

Which approach is typically the most efficient method to use for data discovery?

  • A: Metadata
  • B: Content analysis
  • C: Labels
  • D: ACLs

Question 77

Which of the following features is a main benefit of PaaS over IaaS?

  • A: Location independence
  • B: High-availability
  • C: Physical security requirements
  • D: Auto-scaling

Question 78

Which audit type has been largely replaced by newer approaches since 2011?

  • A: SOC Type 1
  • B: SSAE-16
  • C: SAS-70
  • D: SOC Type 2

Question 79

Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?

  • A: IDCA
  • B: Uptime Institute
  • C: NFPA
  • D: BICSI

Question 80

Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?

  • A: Reservations
  • B: Measured service
  • C: Limits
  • D: Shares

Question 81

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

  • A: Platform
  • B: Infrastructure
  • C: Software
  • D: Desktop

Question 82

What does the "SOC" acronym refer to with audit reports?

  • A: Service Origin Confidentiality
  • B: System Organization Confidentiality
  • C: Service Organizational Control
  • D: System Organization Control

Question 83

What does the REST API use to protect data transmissions?

  • A: NetBIOS
  • B: VPN
  • C: Encapsulation
  • D: TLS

Question 84

What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?

  • A: Masking
  • B: Anonymization
  • C: Tokenization
  • D: Obfuscation

Question 85

With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?

  • A: Routing
  • B: Session
  • C: Filtering
  • D: Firewalling

Question 86

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?

  • A: Applications
  • B: Key performance indicators (KPIs)
  • C: Services
  • D: Security

Question 87

What does dynamic application security testing (DAST) NOT entail?

  • A: Scanning
  • B: Probing
  • C: Discovery
  • D: Knowledge of the system

Question 88

Where is an XML firewall most commonly deployed in the environment?

  • A: Between the application and data layers
  • B: Between the IPS and firewall
  • C: Between the presentation and application layers
  • D: Between the firewall and application server

Question 89

What type of masking strategy involves replacing data on a system while it passes between the data and application layers?

  • A: Dynamic
  • B: Static
  • C: Replication
  • D: Duplication

Question 90

What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?

  • A: Virtual
  • B: Security
  • C: Physical
  • D: Logical

Question 91

Which of the following is a widely used tool for code development, branching, and collaboration?

  • A: GitHub
  • B: Maestro
  • C: Orchestrator
  • D: Conductor

Question 92

Which aspect of security is DNSSEC designed to ensure?

  • A: Integrity
  • B: Authentication
  • C: Availability
  • D: Confidentiality

Question 93

Which process serves to prove the identity and credentials of a user requesting access to an application or data?

  • A: Repudiation
  • B: Authentication
  • C: Identification
  • D: Authorization

Question 94

Who would be responsible for implementing IPsec to secure communications for an application?

  • A: Developers
  • B: Systems staff
  • C: Auditors
  • D: Cloud customer

Question 95

What is the minimum regularity for testing a BCDR plan to meet best practices?

  • A: Once year
  • B: Once a month
  • C: Every six months
  • D: When the budget allows it

Question 96

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?

  • A: Broad network access
  • B: Interoperability
  • C: Resource pooling
  • D: Portability

Question 97

Which of the following is NOT part of a retention policy?

  • A: Format
  • B: Costs
  • C: Accessibility
  • D: Duration

Question 98

Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?

  • A: Interoperability
  • B: Resource pooling
  • C: Portability
  • D: Measured service

Question 99

Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?

  • A: Hybrid
  • B: Community
  • C: Private
  • D: Public

Question 100

Which of the following is NOT something that an HIDS will monitor?

  • A: Configurations
  • B: User logins
  • C: Critical system files
  • D: Network traffic
Page 4 of 21 • Questions 76-100 of 511

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!