CCSP Domain 1

CCSP Domain 1

Professional Development

19 Qs

quiz-placeholder

Similar activities

Team Quiz 1

Team Quiz 1

Professional Development

15 Qs

Cloud for Sales Quiz 01

Cloud for Sales Quiz 01

Professional Development

21 Qs

Topic 1 -  Quiz

Topic 1 - Quiz

Professional Development

15 Qs

AWS Cloud

AWS Cloud

Professional Development

15 Qs

Cloud Computing_3

Cloud Computing_3

Professional Development

20 Qs

AWS CLF-C02 Quiz 1

AWS CLF-C02 Quiz 1

Professional Development

15 Qs

Sesion 5

Sesion 5

Professional Development

20 Qs

Privacy in the Modern Era

Privacy in the Modern Era

Professional Development

20 Qs

CCSP Domain 1

CCSP Domain 1

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Sylvia Anderson

Used 2+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When the IT security department allows users to use their own personal devices to access corporate data, which of the following aspects of mobile device management would not be a primary concern?

Backups

VPN access

E-mail security

Remote erasure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When implementing artificial intelligence into a system, the organization desires it to only use data points to make determinations and not try to make social or emotional decisions. What type of artificial intelligence would be utilized?

Human-inspired

Humanized

Cognitive

Analytical

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is used by blockchain to connect a new block to the previous block in the same chain to ensure integrity?

Timestamp

Cryptographic hash

Pointer

Linkage

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are common threats facing cloud computing platforms? (Choose two.)

Denial of service

Cryptographic hashing

Data breaches

Phishing attacks

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following standards is commonly applied to cloud computing security?

ISO/IEC 27001

ISO/IEC 27003

ISO/IEC 27013

ISO/IEC 27017

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following methods is commonly used to ensure that data removed from a cloud system is not recoverable?

Deletion

Degaussing

Overwriting

Shredding

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of hypervisor is a software implementation that runs on top of an operating system rather than tied to the hardware?

Type 1

Type 2

Type 3

Type 4

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?