CCSP Domain 1

CCSP Domain 1

Professional Development

19 Qs

quiz-placeholder

Similar activities

GCP-FOUND4

GCP-FOUND4

Professional Development

20 Qs

Team Quiz 1

Team Quiz 1

Professional Development

15 Qs

Cloud for Sales Quiz 01

Cloud for Sales Quiz 01

Professional Development

21 Qs

CHFI QUIZ

CHFI QUIZ

Professional Development

20 Qs

CYBER SECURITY

CYBER SECURITY

Professional Development

20 Qs

Sec+ Quiz - 1

Sec+ Quiz - 1

Professional Development

15 Qs

Cloud services

Cloud services

Professional Development

20 Qs

AWS CLF-C02 Quiz 1

AWS CLF-C02 Quiz 1

Professional Development

15 Qs

CCSP Domain 1

CCSP Domain 1

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Sylvia Anderson

Used 2+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When the IT security department allows users to use their own personal devices to access corporate data, which of the following aspects of mobile device management would not be a primary concern?

Backups

VPN access

E-mail security

Remote erasure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When implementing artificial intelligence into a system, the organization desires it to only use data points to make determinations and not try to make social or emotional decisions. What type of artificial intelligence would be utilized?

Human-inspired

Humanized

Cognitive

Analytical

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is used by blockchain to connect a new block to the previous block in the same chain to ensure integrity?

Timestamp

Cryptographic hash

Pointer

Linkage

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are common threats facing cloud computing platforms? (Choose two.)

Denial of service

Cryptographic hashing

Data breaches

Phishing attacks

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following standards is commonly applied to cloud computing security?

ISO/IEC 27001

ISO/IEC 27003

ISO/IEC 27013

ISO/IEC 27017

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following methods is commonly used to ensure that data removed from a cloud system is not recoverable?

Deletion

Degaussing

Overwriting

Shredding

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of hypervisor is a software implementation that runs on top of an operating system rather than tied to the hardware?

Type 1

Type 2

Type 3

Type 4

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?