Free CCSP Exam Braindumps (page: 23)

Page 22 of 129

Which of the following is the biggest concern or challenge with using encryption?

  1. Dependence on keys
  2. Cipher strength
  3. Efficiency
  4. Protocol standards

Answer(s): A

Explanation:

No matter what kind of application, system, or hosting model used, encryption is 100 percent dependent on encryption keys. Properly securing the keys and the exchange of them is the biggest and most important challenge of encryption systems.



Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?

  1. Storage
  2. Application
  3. Mamory
  4. CPU

Answer(s): B

Explanation:

Infrastructure as a Service pools the compute resources for platforms and applications to build upon, including CPU, memory, and storage. Applications are not part of an IaaS offering from the cloud provider.



Which technology is NOT commonly used for security with data in transit?

  1. DNSSEC
  2. IPsec
  3. VPN
  4. HTTPS

Answer(s): A

Explanation:

DNSSEC relates to the integrity of DNS resolutions and the prevention of spoofing or redirection, and does not pertain to the actual security of transmissions or the protection of data.



Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?

  1. Cloud service business manager
  2. Cloud service operations manager
  3. Cloud service manager
  4. Cloud service deployment manager

Answer(s): D

Explanation:

The cloud service deployment manager is responsible for gathering metrics on cloud services, managing cloud deployments and the deployment process, and defining the environments and processes.






Post your Comments and Discuss ISC CCSP exam with other Community members:

CCSP Exam Discussions & Posts