CCSP Review Quiz
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
How long should a UPS system be able to sustain a system?
CorrectIncorrect -
Question 2 of 20
2. Question
When should deviations to the OS baseline be allowed?
CorrectIncorrect -
Question 3 of 20
3. Question
What is a legitimate barrier to conducting SAST testing?
CorrectIncorrect -
Question 4 of 20
4. Question
A company wants their SaaS applications to communicate with each other using XML based communication. What should the company implement?
CorrectIncorrect -
Question 5 of 20
5. Question
Which of the following is a method of mitigating risk?
CorrectIncorrect -
Question 6 of 20
6. Question
The following are directly related to forensics except:
CorrectIncorrect -
Question 7 of 20
7. Question
A company that handles health care information has outsourced it’s customer service department and is concerned about protecting the confidentiality of its data against insider threat. Which technique should the company employ?
CorrectIncorrect -
Question 8 of 20
8. Question
What best describes gap analysis?
CorrectIncorrect -
Question 9 of 20
9. Question
Which region has the most comprehensive privacy laws for its citizens?
CorrectIncorrect -
Question 10 of 20
10. Question
In what document would you find the “right to audit”?
CorrectIncorrect -
Question 11 of 20
11. Question
Which of the following attack methods is not in the OWASP top 10?
CorrectIncorrect -
Question 12 of 20
12. Question
Spoofing can be best described as:
CorrectIncorrect -
Question 13 of 20
13. Question
What is a method of risk mitigation helps to mitigate the loss of personnel or expertise within an organization?
CorrectIncorrect -
Question 14 of 20
14. Question
Which of the following is not a step of the BIA?
CorrectIncorrect -
Question 15 of 20
15. Question
Which step comes last in business continuity planning?
CorrectIncorrect -
Question 16 of 20
16. Question
Which of the following is not true of TLS?
CorrectIncorrect -
Question 17 of 20
17. Question
Who issues certificates in a PKI?
CorrectIncorrect -
Question 18 of 20
18. Question
This encryption method is capable of encrypting an entire virtual instance:
CorrectIncorrect -
Question 19 of 20
19. Question
What is the primary role of the KDC in Kerberos
CorrectIncorrect -
Question 20 of 20
20. Question
Agile Business Intelligence is best described as:
CorrectIncorrect