New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CCSP Exam - Topic 6 Question 44 Discussion

Actual exam question for ISC2's CCSP exam
Question #: 44
Topic #: 6
[All CCSP Questions]

Countermeasures for protecting cloud operations against external attackers include all of the following except:

Show Suggested Answer Hide Answer
Suggested Answer: B

Background checks are controls for attenuating potential threats from internal actors; external threats aren't likely to submit to background checks.


Contribute your Thoughts:

0/2000 characters
Mable
4 months ago
I thought all of these were important!
upvoted 0 times
...
Lamonica
4 months ago
Wait, are we really saying background checks don't help?
upvoted 0 times
...
Laila
4 months ago
Totally agree, B doesn't fit with the others.
upvoted 0 times
...
Muriel
4 months ago
I think B is the odd one out here.
upvoted 0 times
...
Levi
5 months ago
A is definitely a must for cloud security.
upvoted 0 times
...
Laurene
5 months ago
Hardened systems were emphasized in my notes, so I believe those are also part of the protection strategy.
upvoted 0 times
...
Blair
5 months ago
I practiced a similar question where configuration management was highlighted as essential, so I think that one is a countermeasure too.
upvoted 0 times
...
Truman
5 months ago
I'm not entirely sure, but I feel like background checks might not directly protect cloud operations from external attackers.
upvoted 0 times
...
Junita
5 months ago
I remember studying that continual monitoring is crucial for detecting threats, so I think that's definitely a countermeasure.
upvoted 0 times
...
Allene
5 months ago
I'm leaning towards option A, but I want to double-check my understanding. The metadata contains the ABI, which is the interface for the contract, but I'm not certain about the contract address being included as well.
upvoted 0 times
...
Georgene
5 months ago
Hmm, I'm a bit unsure about the specific steps here. Let me re-read the question carefully.
upvoted 0 times
...
Phung
5 months ago
Based on what I practiced, I think we should set a maximum threshold for lower-priority traffic on the ge0/0 interface. That seems crucial to handle the overflow properly.
upvoted 0 times
...

Save Cancel