Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Certified Cloud Security Professional Question and Answers

Certified Cloud Security Professional

Last Update Apr 27, 2024
Total Questions : 512

We are offering FREE CCSP ISC exam questions. All you do is to just go and sign up. Give your details, prepare CCSP free exam questions and then go for complete pool of Certified Cloud Security Professional test questions that will help you more.

CCSP pdf

CCSP PDF

$35  $99.99
CCSP Engine

CCSP Testing Engine

$42  $119.99
CCSP PDF + Engine

CCSP PDF + Testing Engine

$56  $159.99
Questions 1

If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?

Options:

A.  

Memory and networking

B.  

CPU and software

C.  

CPU and storage

D.  

CPU and memory

Discussion 0
Questions 2

What does a cloud customer purchase or obtain from a cloud provider?

Options:

A.  

Services

B.  

Hosting

C.  

Servers

D.  

Customers

Discussion 0
Questions 3

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

Options:

A.  

Hypervisor

B.  

Management plane

C.  

Object storage

D.  

Encryption

Discussion 0
Questions 4

In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?

Options:

A.  

GLBA

B.  

Safe Harbor

C.  

HIPAA

D.  

SOX

Discussion 0
Questions 5

From the perspective of compliance, what is the most important consideration when it comes to data center location?

Options:

A.  

Natural disasters

B.  

Utility access

C.  

Jurisdiction

D.  

Personnel access

Discussion 0
Questions 6

Where is a DLP solution generally installed when utilized for monitoring data in use?

Options:

A.  

Application server

B.  

Database server

C.  

Network perimeter

D.  

User’s client

Discussion 0
Questions 7

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

Options:

A.  

APIs

B.  

Scripts

C.  

TLS

D.  

XML

Discussion 0
Questions 8

Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.

Which of the following is NOT a regulatory system from the United States federal government?

Options:

A.  

HIPAA

B.  

SOX

C.  

FISMA

D.  

PCI DSS

Discussion 0
Questions 9

Which of the following is NOT one of the main intended goals of a DLP solution?

Options:

A.  

Showing due diligence

B.  

Preventing malicious insiders

C.  

Regulatory compliance

D.  

Managing and minimizing risk

Discussion 0
Questions 10

Many aspects and features of cloud computing can make eDiscovery compliance more difficult or costly.

Which aspect of cloud computing would be the MOST complicating factor?

Options:

A.  

Measured service

B.  

Broad network access

C.  

Multitenancy

D.  

Portability

Discussion 0
Questions 11

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

Options:

A.  

Distributed clustering

B.  

Distributed balancing

C.  

Distributed optimization

D.  

Distributed resource scheduling

Discussion 0
Questions 12

Which cloud deployment model is MOST likely to offer free or very cheap services to users?

Options:

A.  

Hybrid

B.  

Community

C.  

Public

D.  

Private

Discussion 0
Questions 13

Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?

Options:

A.  

Modify data

B.  

Modify metadata

C.  

New data

D.  

Import data

Discussion 0
Questions 14

Within a federated identity system, which of the following would you be MOST likely to use for sending information for consumption by a relying party?

Options:

A.  

XML

B.  

HTML

C.  

WS-Federation

D.  

SAML

Discussion 0
Questions 15

Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?

Options:

A.  

Structured

B.  

Unstructured

C.  

Volume

D.  

Object

Discussion 0
Questions 16

In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?

Options:

A.  

Limit

B.  

Cap

C.  

Throttle

D.  

Reservation

Discussion 0
Questions 17

Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?

Options:

A.  

Injection

B.  

Missing function-level access control

C.  

Cross-site scripting

D.  

Cross-site request forgery

Discussion 0
Questions 18

Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?

Options:

A.  

DaaS

B.  

PaaS

C.  

IaaS

D.  

SaaS

Discussion 0
Questions 19

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?

Options:

A.  

Functionality

B.  

Programming languages

C.  

Software platform

D.  

Security requirements

Discussion 0
Questions 20

Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?

Options:

A.  

Infrastructure

B.  

Platform

C.  

Application

D.  

Data

Discussion 0
Questions 21

What is the minimum regularity for testing a BCDR plan to meet best practices?

Options:

A.  

Once year

B.  

Once a month

C.  

Every six months

D.  

When the budget allows it

Discussion 0
Questions 22

Which of the following would be a reason to undertake a BCDR test?

Options:

A.  

Functional change of the application

B.  

Change in staff

C.  

User interface overhaul of the application

D.  

Change in regulations

Discussion 0
Questions 23

During which phase of the cloud data lifecycle is it possible for the classification of data to change?

Options:

A.  

Use

B.  

Archive

C.  

Create

D.  

Share

Discussion 0
Questions 24

Which of the following is NOT a factor that is part of a firewall configuration?

Options:

A.  

Encryption

B.  

Port

C.  

Protocol

D.  

Source IP

Discussion 0
Questions 25

How is an object stored within an object storage system?

Options:

A.  

Key value

B.  

Database

C.  

LDAP

D.  

Tree structure

Discussion 0
Questions 26

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

Options:

A.  

Dedicated switches

B.  

Trust zones

C.  

Redundant network circuits

D.  

Direct connections

Discussion 0
Questions 27

If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

Options:

A.  

Kerberos support

B.  

CHAP support

C.  

Authentication

D.  

Encryption

Discussion 0
Questions 28

Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?

Options:

A.  

Cloud service business manager

B.  

Cloud service user

C.  

Cloud service administrator

D.  

Cloud service integrator

Discussion 0
Questions 29

Which of the following is NOT a criterion for data within the scope of eDiscovery?

Options:

A.  

Possession

B.  

Custody

C.  

Control

D.  

Archive

Discussion 0
Questions 30

Which of the following APIs are most commonly used within a cloud environment?

Options:

A.  

REST and SAML

B.  

SOAP and REST

C.  

REST and XML

D.  

XML and SAML

Discussion 0
Questions 31

Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?

Options:

A.  

PLAN

B.  

WAN

C.  

LAN

D.  

VLAN

Discussion 0
Questions 32

Which of the following are the storage types associated with IaaS?

Options:

A.  

Volume and object

B.  

Volume and label

C.  

Volume and container

D.  

Object and target

Discussion 0
Questions 33

Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?

Options:

A.  

Multitenancy

B.  

Certification

C.  

Regulation

D.  

Virtualization

Discussion 0
Questions 34

What is the only data format permitted with the SOAP API?

Options:

A.  

HTML

B.  

SAML

C.  

XSML

D.  

XML

Discussion 0
Questions 35

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Options:

A.  

Cloud auditor

B.  

Inter-cloud provider

C.  

Cloud service broker

D.  

Cloud service developer

Discussion 0
Questions 36

Which of the following is the optimal humidity level for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?

Options:

A.  

30-50 percent relative humidity

B.  

50-75 percent relative humidity

C.  

20-40 percent relative humidity

D.  

40-60 percent relative humidity

Discussion 0
Questions 37

Which of the following is considered an external redundancy for a data center?

Options:

A.  

Power feeds to rack

B.  

Generators

C.  

Power distribution units

D.  

Storage systems

Discussion 0
Questions 38

Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?

Options:

A.  

Sensitive data exposure

B.  

Security misconfiguration

C.  

Insecure direct object references

D.  

Unvalidated redirect and forwards

Discussion 0
Questions 39

Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?

Options:

A.  

European Union

B.  

Germany

C.  

Russia

D.  

United States

Discussion 0
Questions 40

Which technology is NOT commonly used for security with data in transit?

Options:

A.  

DNSSEC

B.  

IPsec

C.  

VPN

D.  

HTTPS

Discussion 0
Questions 41

GAAPs are created and maintained by which organization?

Options:

A.  

ISO/IEC

B.  

AICPA

C.  

PCI Council

D.  

ISO

Discussion 0
Questions 42

What does SDN stand for within a cloud environment?

Options:

A.  

Software-dynamic networking

B.  

Software-defined networking

C.  

Software-dependent networking

D.  

System-dynamic nodes

Discussion 0
Questions 43

Which of the following roles involves the provisioning and delivery of cloud services?

Options:

A.  

Cloud service deployment manager

B.  

Cloud service business manager

C.  

Cloud service manager

D.  

Cloud service operations manager

Discussion 0
Questions 44

A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?

Options:

A.  

UPS

B.  

Generators

C.  

Joint operating agreements

D.  

Strict adherence to applicable regulations

Discussion 0
Questions 45

Which kind of SSAE audit report is most beneficial for a cloud customer, even though it’s unlikely the cloud provider will share it?

Options:

A.  

SOC 3

B.  

SOC 1 Type 2

C.  

SOC 2 Type 2

D.  

SOC 1 Type 1

Discussion 0
Questions 46

Your new CISO is placing increased importance and focus on regulatory compliance as your applications and systems move into cloud environments.

Which of the following would NOT be a major focus of yours as you develop a project plan to focus on regulatory compliance?

Options:

A.  

Data in transit

B.  

Data in use

C.  

Data at rest

D.  

Data custodian

Discussion 0
Questions 47

Which of the following storage types is most closely associated with a database-type storage implementation?

Options:

A.  

Object

B.  

Unstructured

C.  

Volume

D.  

Structured

Discussion 0
Questions 48

What is the concept of isolating an application from the underlying operating system for testing purposes?

Options:

A.  

Abstracting

B.  

Application virtualization

C.  

Hosting

D.  

Sandboxing

Discussion 0
Questions 49

When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.

Which of the following would NOT be something that is predefined as part of the audit agreement?

Options:

A.  

Size

B.  

Format

C.  

Structure

D.  

Audience

Discussion 0
Questions 50

Different security testing methodologies offer different strategies and approaches to testing systems, requiring security personnel to determine the best type to use for their specific circumstances.

What does dynamic application security testing (DAST) NOT entail that SAST does?

Options:

A.  

Discovery

B.  

Knowledge of the system

C.  

Scanning

D.  

Probing

Discussion 0
Questions 51

Which data sanitation method is also commonly referred to as "zeroing"?

Options:

A.  

Overwriting

B.  

Nullification

C.  

Blanking

D.  

Deleting

Discussion 0
Questions 52

Data masking can be used to provide all of the following functionality, except:

Options:

A.  

Secure remote access

B.  

test data in sandboxed environments

C.  

Authentication of privileged users

D.  

Enforcing least privilege

Discussion 0
Questions 53

What are SOC 1/SOC 2/SOC 3?

Options:

A.  

Audit reports

B.  

Risk management frameworks

C.  

Access controls

D.  

Software developments

Discussion 0
Questions 54

What is one of the reasons a baseline might be changed?

Options:

A.  

Numerous change requests

B.  

To reduce redundancy

C.  

Natural disaster

D.  

Power fluctuation

Discussion 0
Questions 55

What is the cloud service model in which the customer is responsible for administration of the OS?

Options:

A.  

QaaS

B.  

SaaS

C.  

PaaS

D.  

IaaS

Discussion 0
Questions 56

An audit scope statement defines the limits and outcomes from an audit.

Which of the following would NOT be included as part of an audit scope statement?

Options:

A.  

Reports

B.  

Certification

C.  

Billing

D.  

Exclusions

Discussion 0
Questions 57

When using an IaaS solution, what is the capability provided to the customer?

Options:

A.  

To provision processing, storage, networks, and other fundamental computing resources when the consumer is able to deploy and run arbitrary software, which can include OSs and applications.

B.  

To provision processing, storage, networks, and other fundamental computing resources when the auditor is able to deploy and run arbitrary software, which can include OSs and applications.

C.  

To provision processing, storage, networks, and other fundamental computing resources when the provider is able to deploy and run arbitrary software, which can include OSs and applications.

D.  

To provision processing, storage, networks, and other fundamental computing resources when the consumer is not able to deploy and run arbitrary software, which can include OSs and applications.

Discussion 0
Questions 58

The various models generally available for cloud BC/DR activities include all of the following except:

Options:

A.  

Private architecture, cloud backup

B.  

Cloud provider, backup from another cloud provider

C.  

Cloud provider, backup from same provider

D.  

Cloud provider, backup from private provider

Discussion 0
Questions 59

When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.

Which of the following is NOT one of the three main approaches to data discovery?

Options:

A.  

Content analysis

B.  

Hashing

C.  

Labels

D.  

Metadata

Discussion 0
Questions 60

Which of the following terms is not associated with cloud forensics?

Options:

A.  

eDiscovery

B.  

Chain of custody

C.  

Analysis

D.  

Plausibility

Discussion 0
Questions 61

Legal controls refer to which of the following?

Options:

A.  

ISO 27001

B.  

PCI DSS

C.  

NIST 800-53r4

D.  

Controls designed to comply with laws and regulations related to the cloud environment

Discussion 0
Questions 62

Having a reservation in a cloud environment can ensure operations continue in the event of high utilization across the cloud.

Which of the following would NOT be a capability covered by reservations?

Options:

A.  

Performing business operations

B.  

Starting virtual machines

C.  

Running applications

D.  

Auto-scaling

Discussion 0
Questions 63

What changes are necessary to application code in order to implement DNSSEC?

Options:

A.  

Adding encryption modules

B.  

Implementing certificate validations

C.  

Additional DNS lookups

D.  

No changes are needed.

Discussion 0
Questions 64

What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?

Options:

A.  

Proxy

B.  

Bastion

C.  

Honeypot

D.  

WAF

Discussion 0
Questions 65

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?

Options:

A.  

2010

B.  

2000

C.  

1995

D.  

1990

Discussion 0
Questions 66

Which if the following is NOT one of the three components of a federated identity system transaction?

Options:

A.  

Relying party

B.  

Identity provider

C.  

User

D.  

Proxy relay

Discussion 0
Questions 67

Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?

Options:

A.  

Delete

B.  

Modify

C.  

Read

D.  

Print

Discussion 0
Questions 68

What concept does the "R" represent with the DREAD model?

Options:

A.  

Reproducibility

B.  

Repudiation

C.  

Risk

D.  

Residual

Discussion 0
Questions 69

Which data point that auditors always desire is very difficult to provide within a cloud environment?

Options:

A.  

Access policy

B.  

Systems architecture

C.  

Baselines

D.  

Privacy statement

Discussion 0
Questions 70

Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?

Options:

A.  

Service-level agreements

B.  

Governance

C.  

Regulatory requirements

D.  

Auditability

Discussion 0
Questions 71

What concept does the "A" represent in the DREAD model?

Options:

A.  

Affected users

B.  

Authentication

C.  

Affinity

D.  

Authorization

Discussion 0
Questions 72

Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?

Options:

A.  

Russia

B.  

France

C.  

Germany

D.  

United States

Discussion 0
Questions 73

Which security concept would business continuity and disaster recovery fall under?

Options:

A.  

Confidentiality

B.  

Availability

C.  

Fault tolerance

D.  

Integrity

Discussion 0
Questions 74

Which of the cloud cross-cutting aspects relates to the ability for a cloud customer to easily remove their applications and data from a cloud environment?

Options:

A.  

Reversibility

B.  

Availability

C.  

Portability

D.  

Interoperability

Discussion 0
Questions 75

Which audit type has been largely replaced by newer approaches since 2011?

Options:

A.  

SOC Type 1

B.  

SSAE-16

C.  

SAS-70

D.  

SOC Type 2

Discussion 0
Questions 76

Which of the following is NOT a function performed by the record protocol of TLS?

Options:

A.  

Encryption

B.  

Acceleration

C.  

Authentication

D.  

Compression

Discussion 0