CCSP Practice Test Questions

512 Questions


Topic 2, Exam Pool B

Which of the following data protection methodologies maintains the ability to connect back
values to the original values?
Response:


A.

Tokenization


B.

Anonymization


C.

Obfuscation


D.

Dynamic mapping





A.
  

Tokenization



When designing a cloud data center, which of the following aspects is not necessary to
ensure continuity of operations during contingency operations?
Response:


A.

Access to clean water


B.

Broadband data connection


C.

Extended battery backup


D.

Physical access to the data center





C.
  

Extended battery backup



Which key storage solution would be the BEST choice in a situation where availability
might be of a particular concern?
Response:


A.

Internal


B.

External


C.

Hosted


D.

Embedded





A.
  

Internal



Which of the following is not typically included in the list of critical assets specified for
continuity during BCDR contingency operations?
Response:


A.

Systems


B.

Data


C.

Cash


D.

Personnel





C.
  

Cash



Which type of testing tends to produce the best and most comprehensive results for
discovering system vulnerabilities?
Response:


A.

Static


B.

Dynamic


C.

Pen


D.

Vulnerability





A.
  

Static



A bare-metal hypervisor is Type ____________.
Response:


A.

1


B.

2


C.

3


D.

4





A.
  

1



What are SOCI/SOCII/SOCIII?
Response:


A.

Risk management frameworks


B.

Access controls


C.

Audit reports


D.

Software development phases





C.
  

Audit reports



The destruction of a cloud customer’s data can be required by all of the following except
___________.
Response:


A.

Statute


B.

Regulation


C.

The cloud provider’s policy


D.

Contract





C.
  

The cloud provider’s policy



Federation should be __________ to the users.
Response:


A.

Hostile


B.

Proportional


C.

Transparent


D.

Expensive





C.
  

Transparent



What is a cloud storage architecture that manages the data in a hierarchy of files?
Response:


A.

Object-based storage


B.

File-based storage


C.

Database


D.

CDN





B.
  

File-based storage



You have been tasked by management to offload processing and validation of incoming
encoded data from your application servers and their associated APIs. Which of the
following would be the most appropriate device or software to consider?Response:


A.

XML accelerator


B.

XML firewall


C.

Web application firewall


D.

Firewall





A.
  

XML accelerator



What is the most secure form of code testing and review?
Response:


A.

Open source


B.

Proprietary/internal


C.

Neither open source nor proprietary


D.

Combination of open source and proprietary





D.
  

Combination of open source and proprietary




Page 15 out of 43 Pages
Previous