CCSP 2024 Practice Questions Unlocked Part 2

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ม.ค. 2025

ความคิดเห็น • 20

  • @balasoupramanienr8178
    @balasoupramanienr8178 4 หลายเดือนก่อน

    Overall a good video and much of insight information for those who preparing CCSP

  • @MrJam8891
    @MrJam8891 8 หลายเดือนก่อน

    Prabh thank you for the questions and detailed answers for CCSP certification, it helps me by covering concepts that I need additional knowledge.

  • @vishnuravindran5953
    @vishnuravindran5953 10 หลายเดือนก่อน

    The questions provided were very useful for preparation.

  • @chikoobikoo3753
    @chikoobikoo3753 8 หลายเดือนก่อน

    Prabh Bhai, really you are doing a great job. God Bless you, while preparing for CCSP; your videos are mind opening and very precise with full of relevant information. I passed yesterday and really wanted to thank you. You are doing a great job.
    Thank you brother.

  • @katheresh
    @katheresh 7 หลายเดือนก่อน

    @prabh,
    Today in was able to successfully clear by CCSP EXAM. I can’t thank you enough for your videos and coffee shot series, I highly recommend to all aspirants, to watch Prabh videos.

  • @shinestars7946
    @shinestars7946 10 หลายเดือนก่อน

    Please More content like this for CCSP . Thank you so much.

  • @dg30726
    @dg30726 7 หลายเดือนก่อน

    For ques 26, how is DLP going to prevent the use of unsanctioned apps and shadow IT , it seems that option B is more convincing or am i understanding the question wrongly ?

  • @sandipanpaul2007
    @sandipanpaul2007 8 หลายเดือนก่อน

    ​ @PrabhNair1 Hi Prabh, one question - Q no 26, how DLP will prevent unsanctioned app usage and shadow IT concerns when the data not leaving the org? Option B looks more comprehensive (think like a manager approach).

  • @gausbv
    @gausbv 10 หลายเดือนก่อน

    For Q#18, how resource pooling will be an operational efficiency while it is a CapEx savings?

  • @rgscorpio1
    @rgscorpio1 6 หลายเดือนก่อน

    In Q.18 - if the option had been "multitenancy", would you still have gone with resource pooling?

    • @dawalimsuya6006
      @dawalimsuya6006 2 หลายเดือนก่อน

      I though the same that it should me multitenancy which also uses resource pooling

  • @dushyantsingh2592
    @dushyantsingh2592 10 หลายเดือนก่อน

    @prabh could u share some detailed video on CISSP 2024

  • @vivekk8239
    @vivekk8239 8 หลายเดือนก่อน

    Confused with Coffee shot 21. Prabh says transparent encryption is encrypting a row and column of a database.
    According to his friend Prasant on his CCSP book pg 33 it says Transparent encryption is encrypting full database.
    Don't know who is misleading us. As per Google, we have column level encryption for encrypting column, and row level encryption for encrypting row. That means book could be correct.
    I am not challenging the knowledge of anyone. But a response would be appreciated .

    • @PrabhNair1
      @PrabhNair1  8 หลายเดือนก่อน

      b) Transparent encryption
      Explanation:
      Full Database Encryption:
      This approach encrypts the entire database, which can impact performance and does not allow for selective encryption of specific data. It's not ideal for encrypting specific rows and columns without compromising accessibility and performance.
      Transparent Encryption (Correct Answer):
      Transparent encryption, often referred to as Transparent Data Encryption (TDE), encrypts data at rest within the database and allows for the encryption of specific tables or columns. It operates transparently to applications and users, maintaining accessibility and performance. The encryption keys can be managed externally, ensuring they are only accessible to authorized users.
      Static Data Masking:
      This technique involves obfuscating or masking data, typically used for non-production environments like development or testing. It is not suitable for protecting live, sensitive data in a production environment while ensuring efficient access.
      Application Level Encryption:
      This approach involves encrypting data at the application level before it is stored in the database. While it provides a high level of security, it can introduce complexity and performance overhead, making it less ideal for scenarios where seamless accessibility and performance are crucial.

  • @ad206
    @ad206 8 หลายเดือนก่อน

    Question 24 I'm confused by. It seems to me the answer is "do the same thing you did before but with a 'robust' approach to key and secret management" which doesn't define what that approach is.
    Is it customary to have questions that ask things like "what must be your priority if your organizations wants to mitigate risks associated with key management?" And the answer is "Approach key management strongly?" Or "Approach key management robustly?" That seems bizarre to me for the questions on the exam to be this way.

  • @udhay.msundaram3625
    @udhay.msundaram3625 10 หลายเดือนก่อน

    B for Beta😊

  • @sharathugranad1646
    @sharathugranad1646 8 หลายเดือนก่อน

    Hi youtube.com/@PrabhNair1 , for question 26 - shouldn't the answer be B, according to "Think Like a Manager" video by Gwen, start with People, Process and Technology from the options. Option D is related to technology and Option B related to People & Process. Please share your thoughts.

    • @PrabhNair1
      @PrabhNair1  8 หลายเดือนก่อน

      Very good observation ur right if question say first but for operation we need technical control

    • @sharathugranad1646
      @sharathugranad1646 8 หลายเดือนก่อน

      @@PrabhNair1 : Thanks for responding. All your videos - Coffee shots, discussion with Krish are all very insightful information. These are helping me to gain confidence to appear for the exam. Continue with the good work.