Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CCSP 2020 BEST EXAM STUDY

Rating
-
Sold
-
Pages
157
Grade
A+
Uploaded on
22-07-2022
Written in
2021/2022

CCSP 2020 BEST EXAM STUDY

Institution
Course

Content preview

CCSP 2020 BEST EXAM STUDY

What type of solutions enable enterprises or individuals to store data and computer files
on the Internet using a storage service provider rather than keeping the data locally on a
physical disk such as a hard drive or tape backup?

A.
Online backups

B.
Cloud backup solutions

C.
Removable hard drives

D.
Masking Correct answer- B

When using an infrastructure as a service (IaaS) solution, which of the following is not
an essential benefit for the customer?

A.
Removing the need to maintain a license library
B.
Metered service
C.
Energy and cooling efficiencies
D.
Transfer of ownership cost Correct answer- A

______________focuses on security and encryption to prevent unauthorized copying
and limitations on distribution to only those who pay.

A.
Information rights management (IRM)
B.
Masking
C.
Bit splitting
D.
Degaussing Correct answer- A

,Which of the following represents the correct set of four cloud deployment models?

A.
Public, private, joint and community
B.
Public, private, hybrid, and community
C.
Public, Internet, hybrid, and community
D.
External, private, hybrid, and community Correct answer- B

A special mathematical code that allows encryption hardware/software to encrypt and
then decipher a message.

A.
PKI
B.
Key
C.
Public-private
D.
Masking Correct answer- B

Which of the following lists the correct six components of the STRIDE threat model?
A.
Spoofing, tampering, repudiation, information disclosure, denial of service, and
elevation of privilege
B.
Spoofing, tampering, refutation, information disclosure, denial of service, and social
engineering elasticity
C.
Spoofing, tampering, repudiation, information disclosure, distributed denial of service,
and elevation of privilege
D.
Spoofing, tampering, nonrepudiation, information disclosure, denial of service, and
elevation of privilege Correct answer- A

What is the term that describes the assurance that a specific author actually created
and sent a specific item to a specific recipient, and that the message was successfully
received?
A.
PKI
B.
DLP
C.
Nonrepudiation

,D.
Bit splitting Correct answer- C

What is the correct term for the process of deliberately destroying the encryption keys
used to encrypt data?
A.
Poor key management
B.
PKI
C.
Obfuscation
D.
Crypto-shredding Correct answer- D

In a federated environment, who is the relying party, and what do they do?
A.
The relying party is the service provider, and they consume the tokens generated by the
identity provider.
B.
The relying party is the service provider, and they consume the tokens generated by the
customer.
C.
The relying party is the customer, and they consume the tokens generated by the
identity provider.
D.
The relying party is the identity provider, and they consume the tokens generated by the
service provider. Correct answer- A

What is the process of replacing sensitive data with unique identification
symbols/addresses?
A.
Randomization
B.
Elasticity
C.
Obfuscation
D.
Tokenization Correct answer- D

Which of the following data storage types are associated or used with platform as a
service (PaaS)?
A.
Databases and big data
B.
SaaS application
C.

, Tabular
D.
Raw and block Correct answer- A

What is the term used for software technology that abstracts application software from
the underlying operating system on which it is executed?
A.
Partition
B.
Application virtualization
C.
Distributed
D.
SaaS Correct answer- B

Which of the following represents the US legislation enacted to protect shareholders
and the public from enterprise accounting errors and fraudulent practices?
A.
PCI
B.
Gramm-Leach-Bliley Act (GLBA)
C.
Sarbanes-Oxley Act (SOX)
D.
HIPAA Correct answer- C

Which of the following is a device that can safely store and manage encryption keys and
is used in servers, data transmission, and log files?
A.
Private key
B.
Hardware security module (HSM)
C.
Public key
D.
Trusted operating system module (TOS) Correct answer- B

What is a type of cloud infrastructure that is provisioned for open use by the general
public and is owned, managed, and operated by a cloud provider?
A.
Private cloud
B.
Public cloud
C.
Hybrid cloud
D.

Written for

Course

Document information

Uploaded on
July 22, 2022
Number of pages
157
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMCOLLECTIVES Herzing University
Follow You need to be logged in order to follow users or courses
Sold
1773
Member since
4 year
Number of followers
1159
Documents
23334
Last sold
1 day ago
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Read more Read less
4.1

446 reviews

5
252
4
57
3
84
2
18
1
35

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions