New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CCSP Exam - Topic 4 Question 34 Discussion

Actual exam question for ISC2's CCSP exam
Question #: 34
Topic #: 4
[All CCSP Questions]

Each of the following are dependencies that must be considered when reviewing the BIA after cloud migration except:

Show Suggested Answer Hide Answer
Suggested Answer: C

The cloud provider's resellers are a marketing and sales mechanism, not an operational dependency that could affect the security of a cloud customer.


Contribute your Thoughts:

0/2000 characters
Adell
4 months ago
I disagree, resellers shouldn't be a focus after migration.
upvoted 0 times
...
Shasta
4 months ago
Definitely, vendors play a huge role in the BIA review.
upvoted 0 times
...
Justine
4 months ago
Wait, are resellers really a dependency? Seems off.
upvoted 0 times
...
Dusti
4 months ago
I think the suppliers are more important than resellers.
upvoted 0 times
...
Blair
5 months ago
The cloud provider's utilities are essential to consider.
upvoted 0 times
...
Blossom
5 months ago
I think vendors are definitely important, but I can't recall if utilities are considered a dependency in this context.
upvoted 0 times
...
Darrin
5 months ago
I feel like resellers might not be directly relevant to BIA, but I could be mixing it up with another topic we covered.
upvoted 0 times
...
Rocco
5 months ago
I'm not entirely sure, but I think suppliers are crucial to consider. Didn't we have a practice question about that?
upvoted 0 times
...
Luke
5 months ago
I remember we discussed how the cloud provider's utilities are more about infrastructure than dependencies for BIA.
upvoted 0 times
...
Britt
5 months ago
Okay, let's see. I know the Area ID is definitely one, since that identifies the OSPF area. And the Hello and Dead intervals are crucial for timing. I'm pretty sure the Stub flag is also important, but I'm not 100% on the other two options.
upvoted 0 times
...
Melinda
5 months ago
Alright, time to apply what I've learned. I'll start by eliminating the options that don't seem relevant.
upvoted 0 times
...
Marleen
5 months ago
I'm pretty sure the answer is B. Each Application Server must be configured with the same encryption schemes and identical keys to ensure consistent security across the environment.
upvoted 0 times
...

Save Cancel