Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Cloud Security Professional (CCSP)

Last Update 2 hours ago Total Questions : 512

The Certified Cloud Security Professional (CCSP) content is now fully updated, with all current exam questions added 2 hours ago. Deciding to include CCSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Cloud Security Professional (CCSP) practice test comfortably within the allotted time.

Question # 1

Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?

A.

Unvalidated redirects and forwards

B.

Insecure direct object references

C.

Security miscomfiguration

D.

Sensitive data exposure

Question # 2

Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?

A.

Provision

B.

Limit

C.

Reservation

D.

Share

Question # 3

You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?

A.

Measured service

B.

Broad network access

C.

Resource pooling

D.

On-demand self-service

Question # 4

Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user ' s client to execute commands on the application under the user ' s own credentials?

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

Question # 5

What expectation of data custodians is made much more challenging by a cloud implementation, especially with PaaS or SaaS?

A.

Data classification

B.

Knowledge of systems

C.

Access to data

D.

Encryption requirements

Question # 6

What does the REST API support that SOAP does NOT support?

A.

Caching

B.

Encryption

C.

Acceleration

D.

Redundancy

Question # 7

In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?

A.

GLBA

B.

Safe Harbor

C.

HIPAA

D.

SOX

Question # 8

Which regulatory system pertains to the protection of healthcare data?

A.

HIPAA

B.

HAS

C.

HITECH

D.

HFCA

Question # 9

What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?

A.

Anonymization

B.

Tokenization

C.

Masking

D.

Obfuscation

Question # 10

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

A.

Archive

B.

Share

C.

Store

D.

Destroy

Question # 11

Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?

A.

Cross-site request forgery

B.

Missing function-level access control

C.

Injection

D.

Cross-site scripting

Question # 12

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

A.

Distributed clustering

B.

Distributed balancing

C.

Distributed optimization

D.

Distributed resource scheduling

Question # 13

Which of the following is NOT one of five principles of SOC Type 2 audits?

A.

Privacy

B.

Processing integrity

C.

Financial

D.

Security

Question # 14

Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?

A.

Platform

B.

Data

C.

Physical environment

D.

Infrastructure

Question # 15

What is the concept of segregating information or processes, within the same system or application, for security reasons?

A.

fencing

B.

Sandboxing

C.

Cellblocking

D.

Pooling

Go to page: