Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Cloud Security Professional (CCSP)

Last Update 3 hours ago Total Questions : 512

The Certified Cloud Security Professional (CCSP) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include CCSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Cloud Security Professional (CCSP) practice test comfortably within the allotted time.

Question # 46

Which United States law is focused on PII as it relates to the financial industry?

A.

HIPAA

B.

SOX

C.

Safe Harbor

D.

GLBA

Question # 47

How is an object stored within an object storage system?

A.

Key value

B.

Database

C.

LDAP

D.

Tree structure

Question # 48

Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?

A.

IDCA

B.

Uptime Institute

C.

NFPA

D.

BICSI

Question # 49

When is a virtual machine susceptible to attacks while a physical server in the same state would not be?

A.

When it is behind a WAF

B.

When it is behind an IPS

C.

When it is not patched

D.

When it is powered off

Question # 50

From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions?

A.

Access provisioning

B.

Auditing

C.

Jurisdictions

D.

Authorization

Question # 51

What concept does the " T " represent in the STRIDE threat model?

A.

TLS

B.

Testing

C.

Tampering with data

D.

Transport

Question # 52

What does static application security testing (SAST) offer as a tool to the testers?

A.

Production system scanning

B.

Injection attempts

C.

Source code access

D.

Live testing

Question # 53

Which of the following is NOT a function performed by the handshake protocol of TLS?

A.

Key exchange

B.

Encryption

C.

Negotiation of connection

D.

Establish session ID

Question # 54

Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?

A.

Virtualization

B.

Multitenancy

C.

Resource pooling

D.

Dynamic optimization

Question # 55

Which approach is typically the most efficient method to use for data discovery?

A.

Metadata

B.

Content analysis

C.

Labels

D.

ACLs

Question # 56

What does the REST API use to protect data transmissions?

A.

NetBIOS

B.

VPN

C.

Encapsulation

D.

TLS

Question # 57

With an API, various features and optimizations are highly desirable to scalability, reliability, and security.

What does the REST API support that the SOAP API does NOT support?

A.

Acceleration

B.

Caching

C.

Redundancy

D.

Encryption

Question # 58

Different types of audits are intended for different audiences, such as internal, external, regulatory, and so on.

Which of the following audits are considered " restricted use " versus being for a more broad audience?

A.

SOC Type 2

B.

SOC Type 1

C.

SOC Type 3

D.

SAS-70

Question # 59

Which of the following statements best describes a Type 1 hypervisor?

A.

The hypervisor software runs within an operating system tied to the hardware.

B.

The hypervisor software runs as a client on a server and needs an external service to administer it.

C.

The hypervisor software runs on top of an application layer.

D.

The hypervisor software runs directly on “bare metal” without an intermediary.

Question # 60

Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?

A.

GLBA

B.

HIPAA

C.

Safe Harbor

D.

SOX

Go to page: