Exam 2: Certified Cloud Security Professional (CCSP)
Exam 1: Certified Authorization Professional313 Questions
Exam 2: Certified Cloud Security Professional (CCSP)501 Questions
Exam 3: Certified Information Systems Security Professional336 Questions
Select questions type
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
A
Key maintenance and security are paramount within a cloud environment due to the widespread use of encryption for both data and transmissions. Which of the following key-management systems would provide the most robust control over and ownership of the key-management processes for the cloud customer?
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
A
BCDR strategies do not typically involve the entire operations of an organization, but only those deemed critical to their business. Which concept pertains to the amount of services that need to be recovered to meet BCDR objectives?
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
A
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings. Which role would you be assuming under this directive?
(Multiple Choice)
4.8/5
(51)
In a federated identity arrangement using a trusted third-party model, who is the identity provider and who is the relying party?
(Multiple Choice)
4.9/5
(46)
You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers. Which of the following would be the most appropriate action to take first?
(Multiple Choice)
4.9/5
(50)
In addition to battery backup, a UPS can offer which capability?
(Multiple Choice)
4.7/5
(39)
Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?
(Multiple Choice)
4.9/5
(34)
Which of the following report is most aligned with financial control audits?
(Multiple Choice)
4.7/5
(38)
In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?
(Multiple Choice)
4.9/5
(47)
Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?
(Multiple Choice)
4.9/5
(32)
What's a potential problem when object storage versus volume storage is used within IaaS for application use and dependency?
(Multiple Choice)
4.8/5
(38)
Which of the following storage types is most closely associated with a database-type storage implementation?
(Multiple Choice)
4.9/5
(38)
Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?
(Multiple Choice)
5.0/5
(44)
Because cloud providers will not give detailed information out about their infrastructures and practices to the general public, they will often use established auditing reports to ensure public trust, where the reputation of the auditors serves for assurance. Which type of audit reports can be used for general public trust assurances?
(Multiple Choice)
4.7/5
(38)
Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?
(Multiple Choice)
4.8/5
(34)
The cloud customer's trust in the cloud provider can be enhanced by all of the following except:
(Multiple Choice)
4.9/5
(38)
Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations. Which of the following is NOT a regulatory system from the United States federal government?
(Multiple Choice)
4.7/5
(40)
What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?
(Multiple Choice)
4.9/5
(37)
What is the first stage of the cloud data lifecycle where security controls can be implemented?
(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 501
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)