Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Cloud Security Professional (CCSP)

Last Update 3 hours ago Total Questions : 512

The Certified Cloud Security Professional (CCSP) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include CCSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Cloud Security Professional (CCSP) practice test comfortably within the allotted time.

Question # 31

With IaaS, what is responsible for handling the security and control over the volume storage space?

A.

Management plane

B.

Operating system

C.

Application

D.

Hypervisor

Question # 32

What is used for local, physical access to hardware within a data center?

A.

SSH

B.

KVM

C.

VPN

D.

RDP

Question # 33

What must SOAP rely on for security?

A.

Encryption

B.

Tokenization

C.

TLS

D.

SSL

Question # 34

What provides the information to an application to make decisions about the authorization level appropriate when granting access?

A.

User

B.

Relying party

C.

Federation

D.

Identity Provider

Question # 35

What are the two protocols that TLS uses?

A.

Handshake and record

B.

Transport and initiate

C.

Handshake and transport

D.

Record and transmit

Question # 36

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?

A.

2010

B.

2000

C.

1995

D.

1990

Question # 37

With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.

What is the term associated with this determination?

A.

Weighting

B.

Prioritization

C.

Shares

D.

Scoring

Question # 38

Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.

Which concept encapsulates this?

A.

Validity

B.

Integrity

C.

Accessibility

D.

Confidentiality

Question # 39

Which is the appropriate phase of the cloud data lifecycle for determining the data ' s classification?

A.

Create

B.

Use

C.

Share

D.

Store

Question # 40

Which technology can be useful during the " share " phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?

A.

IPS

B.

WAF

C.

DLP

D.

IDS

Question # 41

Which technique involves replacing values within a specific data field to protect sensitive data?

A.

Anonymization

B.

Masking

C.

Tokenization

D.

Obfuscation

Question # 42

Which of the following threat types involves the sending of untrusted data to a user ' s browser to be executed with their own credentials and access?

A.

Missing function level access control

B.

Cross-site scripting

C.

Cross-site request forgery

D.

Injection

Question # 43

What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?

A.

Remove

B.

Monitor

C.

Disable

D.

Stop

Question # 44

Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?

A.

On-demand self-service

B.

Resource pooling

C.

Measured service

D.

Rapid elasticity

Question # 45

GAAPs are created and maintained by which organization?

A.

ISO/IEC

B.

AICPA

C.

PCI Council

D.

ISO

Go to page: