CCSP Review Quiz
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
Which technique is not used in when hardening a device?
CorrectIncorrect -
Question 2 of 20
2. Question
A restaurant uses a cloud storage option to store company data including their famous spicy chicken recipe. What form of protection is this recipe entitled to?
CorrectIncorrect -
Question 3 of 20
3. Question
Cloud based streaming services, such as YouTube, use these cloud servers to distribute their videos more efficiently to different geographical locations (at least the advertisements anyway).
CorrectIncorrect -
Question 4 of 20
4. Question
A public cloud service provider wants to implement tokens to control access. What will the CSP need to implement this technology?
CorrectIncorrect -
Question 5 of 20
5. Question
A cloud based company wants to implement DLP software to protect its data. What will they need to do to their data first to successfully implement DLP?
CorrectIncorrect -
Question 6 of 20
6. Question
Which of the following is the most important consideration when storing cryptographic keys?
CorrectIncorrect -
Question 7 of 20
7. Question
A CASB traditionally provides all of the following functions except:
CorrectIncorrect -
Question 8 of 20
8. Question
The following are methods of protecting against external threats against a cloud server except:
CorrectIncorrect -
Question 9 of 20
9. Question
The following are methods to protect against an internal threat except:
CorrectIncorrect -
Question 10 of 20
10. Question
A CSP might provide these to a customer to build confidence in the CSP’s security measures:
CorrectIncorrect -
Question 11 of 20
11. Question
Vulnerability scans are unable to detect:
CorrectIncorrect -
Question 12 of 20
12. Question
Which of the following is a component of STRIDE?
CorrectIncorrect -
Question 13 of 20
13. Question
This is the most prevalent security vulnerability found in virtual machines that are used for software development:
CorrectIncorrect -
Question 14 of 20
14. Question
This is the most important aspect to consider when securing cryptographic keys.
CorrectIncorrect -
Question 15 of 20
15. Question
Identify Access Management (IAM) can be best described as:
CorrectIncorrect -
Question 16 of 20
16. Question
SAML is used for:
CorrectIncorrect -
Question 17 of 20
17. Question
WAFs best protect against which of the following threats:
CorrectIncorrect -
Question 18 of 20
18. Question
A company is planning to develop a cloud based application that acts as an e-mail client. They want to test the software in the best way possible, how can the company accomplish this?
CorrectIncorrect -
Question 19 of 20
19. Question
A KVM switch should implement all of the following features for security except:
CorrectIncorrect -
Question 20 of 20
20. Question
Which of the following is most likely to have the greatest impact on a datacenter’s incoming bandwidth?
CorrectIncorrect