Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Cloud Security Professional (CCSP)

Last Update 3 hours ago Total Questions : 512

The Certified Cloud Security Professional (CCSP) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include CCSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Cloud Security Professional (CCSP) practice test comfortably within the allotted time.

Question # 16

Where is an XML firewall most commonly deployed in the environment?

A.

Between the application and data layers

B.

Between the IPS and firewall

C.

Between the presentation and application layers

D.

Between the firewall and application server

Question # 17

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.

Which of the following is NOT something that firewalls are concerned with?

A.

IP address

B.

Encryption

C.

Port

D.

Protocol

Question # 18

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?

A.

Broad network access

B.

Interoperability

C.

Resource pooling

D.

Portability

Question # 19

Which of the following is NOT an application or utility to apply and enforce baselines on a system?

A.

Chef

B.

GitHub

C.

Puppet

D.

Active Directory

Question # 20

Which of the following APIs are most commonly used within a cloud environment?

A.

REST and SAML

B.

SOAP and REST

C.

REST and XML

D.

XML and SAML

Question # 21

Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?

A.

Security misconfiguration

B.

Insecure direct object references

C.

Sensitive data exposure

D.

Unvalidated redirects and forwards

Question # 22

What type of PII is controlled based on laws and carries legal penalties for noncompliance with requirements?

A.

Contractual

B.

Regulated

C.

Specific

D.

Jurisdictional

Question # 23

What is the biggest negative to leasing space in a data center versus building or maintain your own?

A.

Costs

B.

Control

C.

Certification

D.

Regulation

Question # 24

Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?

A.

Multitenancy

B.

Certification

C.

Regulation

D.

Virtualization

Question # 25

Which of the following jurisdictions lacks a comprehensive national policy on data privacy and the protection of personally identifiable information (PII)?

A.

European Union

B.

Asian-Pacific Economic Cooperation

C.

United States

D.

Russia

Question # 26

Within a federated identity system, which entity accepts tokens from the identity provider?

A.

Assertion manager

B.

Servicing party

C.

Proxy party

D.

Relying party

Question # 27

Which of the following is considered an external redundancy for a data center?

A.

Power feeds to rack

B.

Generators

C.

Power distribution units

D.

Storage systems

Question # 28

What is the best source for information about securing a physical asset ' s BIOS?

A.

Security policies

B.

Manual pages

C.

Vendor documentation

D.

Regulations

Question # 29

Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?

A.

Cloud service user

B.

Cloud service business manager

C.

Cloud service administrator

D.

Cloud service integrator

Question # 30

Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?

A.

Storage

B.

Application

C.

Mamory

D.

CPU

Go to page: