Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Cloud Security Professional (CCSP)

Last Update 3 hours ago Total Questions : 512

The Certified Cloud Security Professional (CCSP) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include CCSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Cloud Security Professional (CCSP) practice test comfortably within the allotted time.

Question # 106

What must be secured on physical hardware to prevent unauthorized access to systems?

A.

BIOS

B.

SSH

C.

RDP

D.

ALOM

Question # 107

What is the biggest concern with hosting a key management system outside of the cloud environment?

A.

Confidentiality

B.

Portability

C.

Availability

D.

Integrity

Question # 108

Which of the following is not a risk management framework?

A.

COBIT

B.

Hex GBL

C.

ISO 31000:2009

D.

NIST SP 800-37

Question # 109

The REST API is a widely used standard for communications of web-based services between clients and the servers hosting them.

Which protocol does the REST API depend on?

A.

HTTP

B.

SSH

C.

SAML

D.

XML

Question # 110

In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?

A.

Demagnetizing

B.

Shredding

C.

Degaussing

D.

Cryptographic erasure

Question # 111

Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?

A.

Unstructured

B.

Object

C.

Volume

D.

Structured

Question # 112

You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.

Which of the following would be the most appropriate action to take first?

A.

Take a shapshot of the virtual machines

B.

Escrow the encryption keys

C.

Copy the data

D.

Notify the customer

Question # 113

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

A.

Hypervisor

B.

Management plane

C.

Object storage

D.

Encryption

Question # 114

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?

A.

Memory

B.

Number of users

C.

Storage

D.

CPU

Question # 115

During which phase of the cloud data lifecycle is it possible for the classification of data to change?

A.

Use

B.

Archive

C.

Create

D.

Share

Question # 116

Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.

Which of the following compromise the two facets of computing?

A.

CPU and software

B.

CPU and storage

C.

CPU and memory

D.

Memory and networking

Question # 117

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?

A.

Inter-cloud provider

B.

Cloud service business manager

C.

Cloud service administrator

D.

Cloud service integrator

Question # 118

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.

Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

A.

SOC Type 2, one year

B.

SOC Type 1, one year

C.

SOC Type 2, one month

D.

SOC Type 2, six months

Question # 119

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

A.

TLS

B.

HTTPS

C.

VPN

D.

IRM

Question # 120

When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:

A.

Many states have data breach notification laws.

B.

Breaches can cause the loss of proprietary data.

C.

Breaches can cause the loss of intellectual property.

D.

Legal liability can’t be transferred to the cloud provider.

Go to page: