Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! CCSP Certified Cloud Security Professional (CCSP) is now Stable and With Pass Result

CCSP Practice Exam Questions and Answers

Certified Cloud Security Professional (CCSP)

Last Update 5 days ago
Total Questions : 512

Certified Cloud Security Professional (CCSP) is stable now with all latest exam questions are added 5 days ago. Incorporating CCSP practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Certified Cloud Security Professional (CCSP) exam format, identifying knowledge gaps, applying theoretical knowledge in ISC practical scenarios, you are setting yourself up for success. CCSP exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

CCSP exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through CCSP dumps allows you to practice pacing yourself, ensuring that you can complete all Certified Cloud Security Professional (CCSP) exam questions within the allotted time frame without sacrificing accuracy.

CCSP PDF

CCSP PDF (Printable)
$48
$119.99

CCSP Testing Engine

CCSP PDF (Printable)
$56
$139.99

CCSP PDF + Testing Engine

CCSP PDF (Printable)
$70.8
$176.99
Question # 1

Because cloud providers will not give detailed information out about their infrastructures and practices to the general public, they will often use established auditing reports to ensure public trust, where the reputation of the auditors serves for assurance.

Which type of audit reports can be used for general public trust assurances?

Options:

A.  

SOC 2

B.  

SAS-70

C.  

SOC 3

D.  

SOC 1

Discussion 0
Question # 2

What masking strategy involves the replacing of sensitive data at the time it is accessed and used as it flows between the data and application layers of a service?

Options:

A.  

Active

B.  

Static

C.  

Dynamic

D.  

Transactional

Discussion 0
Question # 3

Which of the following best describes a cloud carrier?

Options:

A.  

The intermediary who provides connectivity and transport of cloud providers and cloud consumers

B.  

A person or entity responsible for making a cloud service available to consumers

C.  

The person or entity responsible for transporting data across the Internet

D.  

The person or entity responsible for keeping cloud services running for customers

Discussion 0
Question # 4

When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.

Which of the following is NOT one of the three main approaches to data discovery?

Options:

A.  

Content analysis

B.  

Hashing

C.  

Labels

D.  

Metadata

Discussion 0
Question # 5

In attempting to provide a layered defense, the security practitioner should convince senior management to include security controls of which type?

Options:

A.  

Physical

B.  

All of the above

C.  

technological

D.  

Administrative

Discussion 0
Question # 6

Gap analysis is performed for what reason?

Options:

A.  

To begin the benchmarking process

B.  

To assure proper accounting practices are being used

C.  

To provide assurances to cloud customers

D.  

To ensure all controls are in place and working properly

Discussion 0
Question # 7

As part of the auditing process, getting a report on the deviations between intended configurations and actual policy is often crucial for an organization.

What term pertains to the process of generating such a report?

Options:

A.  

Deficiencies

B.  

Findings

C.  

Gap analysis

D.  

Errors

Discussion 0
Question # 8

Whereas a contract articulates overall priorities and requirements for a business relationship, which artifact enumerates specific compliance requirements, metrics, and response times?

Options:

A.  

Service level agreement

B.  

Service level contract

C.  

Service compliance contract

D.  

Service level amendment

Discussion 0
Question # 9

In addition to whatever audit results the provider shares with the customer, what other mechanism does the customer have to ensure trust in the provider’s performance and duties?

Options:

A.  

HIPAA

B.  

The contract

C.  

Statutes

D.  

Security control matrix

Discussion 0
Question # 10

Identity and access management (IAM) is a security discipline that ensures which of the following?

Options:

A.  

That all users are properly authorized

B.  

That the right individual gets access to the right resources at the right time for the right reasons.

C.  

That all users are properly authenticated

D.  

That unauthorized users will get access to the right resources at the right time for the right reasons

Discussion 0
Question # 11

Limits for resource utilization can be set at different levels within a cloud environment to ensure that no particular entity can consume a level of resources that impacts other cloud customers.

Which of the following is NOT a unit covered by limits?

Options:

A.  

Hypervisor

B.  

Cloud customer

C.  

Virtual machine

D.  

Service

Discussion 0
Question # 12

Which data sanitation method is also commonly referred to as "zeroing"?

Options:

A.  

Overwriting

B.  

Nullification

C.  

Blanking

D.  

Deleting

Discussion 0
Question # 13

Best practices for key management include all of the following, except:

Options:

A.  

Ensure multifactor authentication

B.  

Pass keys out of band

C.  

Have key recovery processes

D.  

Maintain key security

Discussion 0
Question # 14

Which of the following best describes the Organizational Normative Framework (ONF)?

Options:

A.  

A set of application security, and best practices, catalogued and leveraged by the organization

B.  

A container for components of an application’s security, best practices catalogued and leveraged by the organization

C.  

A framework of containers for some of the components of application security, best practices, catalogued and leveraged by the organization

D.  

A framework of containers for all components of application security, best practices, catalogued and leveraged by the organization.

Discussion 0
Question # 15

What is the concept of isolating an application from the underlying operating system for testing purposes?

Options:

A.  

Abstracting

B.  

Application virtualization

C.  

Hosting

D.  

Sandboxing

Discussion 0
Question # 16

All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except:

Options:

A.  

Tokenization

B.  

Masking

C.  

Data discovery

D.  

Obfuscation

Discussion 0
Question # 17

In a federated identity arrangement using a trusted third-party model, who is the identity provider and who is the relying party?

Options:

A.  

The users of the various organizations within the federations within the federation/a CASB

B.  

Each member organization/a trusted third party

C.  

Each member organization/each member organization

D.  

A contracted third party/the various member organizations of the federation

Discussion 0
Question # 18

Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?

Options:

A.  

Data owner

B.  

Data processor

C.  

Database administrator

D.  

Data custodian

Discussion 0
Question # 19

Which of the following are attributes of cloud computing?

Options:

A.  

Minimal management effort and shared resources

B.  

High cost and unique resources

C.  

Rapid provisioning and slow release of resources

D.  

Limited access and service provider interaction

Discussion 0
Question # 20

What must be secured on physical hardware to prevent unauthorized access to systems?

Options:

A.  

BIOS

B.  

SSH

C.  

RDP

D.  

ALOM

Discussion 0
Question # 21

Which of the following roles is responsible for peering with other cloud services and providers?

Options:

A.  

Cloud auditor

B.  

Inter-cloud provider

C.  

Cloud service broker

D.  

Cloud service developer

Discussion 0
Question # 22

Which protocol does the REST API depend on?

Options:

A.  

HTTP

B.  

XML

C.  

SAML

D.  

SSH

Discussion 0
Question # 23

Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?

Options:

A.  

GLBA

B.  

HIPAA

C.  

Safe Harbor

D.  

SOX

Discussion 0
Question # 24

How is an object stored within an object storage system?

Options:

A.  

Key value

B.  

Database

C.  

LDAP

D.  

Tree structure

Discussion 0
Question # 25

Which aspect of archiving must be tested regularly for the duration of retention requirements?

Options:

A.  

Availability

B.  

Recoverability

C.  

Auditability

D.  

Portability

Discussion 0
Question # 26

What are the two protocols that TLS uses?

Options:

A.  

Handshake and record

B.  

Transport and initiate

C.  

Handshake and transport

D.  

Record and transmit

Discussion 0
Question # 27

Which of the following attempts to establish an international standard for eDiscovery processes and best practices?

Options:

A.  

ISO/IEC 31000

B.  

ISO/IEC 27050

C.  

ISO/IEC 19888

D.  

ISO/IEC 27001

Discussion 0
Question # 28

Which of the following is not a risk management framework?

Options:

A.  

COBIT

B.  

Hex GBL

C.  

ISO 31000:2009

D.  

NIST SP 800-37

Discussion 0
Question # 29

Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?

Options:

A.  

SAS-70

B.  

SOC 2

C.  

SOC 1

D.  

SOX

Discussion 0
Question # 30

Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?

Options:

A.  

Cloud service business manager

B.  

Cloud service deployment manager

C.  

Cloud service operations manager

D.  

Cloud service manager

Discussion 0
Question # 31

Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?

Options:

A.  

Cloud service business manager

B.  

Cloud service operations manager

C.  

Cloud service manager

D.  

Cloud service deployment manager

Discussion 0
Question # 32

Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?

Options:

A.  

Cloud service manager

B.  

Cloud service deployment

C.  

Cloud service business manager

D.  

Cloud service operations manager

Discussion 0
Question # 33

Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?

Options:

A.  

Consumable service

B.  

Measured service

C.  

Billable service

D.  

Metered service

Discussion 0
Question # 34

Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?

Options:

A.  

NFPA

B.  

BICSI

C.  

IDCA

D.  

Uptime Institute

Discussion 0
Question # 35

Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?

Options:

A.  

IDCA

B.  

NFPA

C.  

BICSI

D.  

Uptime Institute

Discussion 0
Question # 36

Which of the following cloud aspects complicates eDiscovery?

Options:

A.  

Resource pooling

B.  

On-demand self-service

C.  

Multitenancy

D.  

Measured service

Discussion 0
Question # 37

Which of the following statements accurately describes VLANs?

Options:

A.  

They are not restricted to the same data center or the same racks.

B.  

They are not restricted to the name rack but restricted to the same data center.

C.  

They are restricted to the same racks and data centers.

D.  

They are not restricted to the same rack but restricted to same switches.

Discussion 0
Question # 38

What type of PII is regulated based on the type of application or per the conditions of the specific hosting agreement?

Options:

A.  

Specific

B.  

Contractual

C.  

regulated

D.  

Jurisdictional

Discussion 0
Question # 39

Which of the following is NOT an application or utility to apply and enforce baselines on a system?

Options:

A.  

Chef

B.  

GitHub

C.  

Puppet

D.  

Active Directory

Discussion 0
Question # 40

Which regulatory system pertains to the protection of healthcare data?

Options:

A.  

HIPAA

B.  

HAS

C.  

HITECH

D.  

HFCA

Discussion 0
Question # 41

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?

Options:

A.  

Applications

B.  

Key performance indicators (KPIs)

C.  

Services

D.  

Security

Discussion 0
Question # 42

Which of the cloud cross-cutting aspects relates to the requirements placed on the cloud provider by the cloud customer for minimum performance standards and requirements that must be met?

Options:

A.  

Regulatory requirements

B.  

SLAs

C.  

Auditability

D.  

Governance

Discussion 0
Question # 43

Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?

Options:

A.  

Integrity

B.  

Availability

C.  

Confidentiality

D.  

Nonrepudiation

Discussion 0
Question # 44

At which stage of the BCDR plan creation phase should security be included in discussions?

Options:

A.  

Define scope

B.  

Analyze

C.  

Assess risk

D.  

Gather requirements

Discussion 0
Question # 45

What concept does the "I" represent with the STRIDE threat model?

Options:

A.  

Integrity

B.  

Information disclosure

C.  

IT security

D.  

Insider threat

Discussion 0
Question # 46

Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?

Options:

A.  

regulatory requirements

B.  

Auditability

C.  

Service-level agreements

D.  

Governance

Discussion 0
Question # 47

What does dynamic application security testing (DAST) NOT entail?

Options:

A.  

Scanning

B.  

Probing

C.  

Discovery

D.  

Knowledge of the system

Discussion 0
Question # 48

Which of the following is NOT part of a retention policy?

Options:

A.  

Format

B.  

Costs

C.  

Accessibility

D.  

Duration

Discussion 0
Question # 49

Which of the following is NOT a function performed by the handshake protocol of TLS?

Options:

A.  

Key exchange

B.  

Encryption

C.  

Negotiation of connection

D.  

Establish session ID

Discussion 0
Question # 50

Which type of audit report is considered a "restricted use" report for its intended audience?

Options:

A.  

SAS-70

B.  

SSAE-16

C.  

SOC Type 1

D.  

SOC Type 2

Discussion 0
Question # 51

What concept does the "T" represent in the STRIDE threat model?

Options:

A.  

TLS

B.  

Testing

C.  

Tampering with data

D.  

Transport

Discussion 0
Question # 52

Which of the following is NOT a function performed by the record protocol of TLS?

Options:

A.  

Encryption

B.  

Acceleration

C.  

Authentication

D.  

Compression

Discussion 0
Question # 53

Which security concept is focused on the trustworthiness of data?

Options:

A.  

Integrity

B.  

Availability

C.  

Nonrepudiation

D.  

Confidentiality

Discussion 0
Question # 54

What concept does the "R" represent with the DREAD model?

Options:

A.  

Reproducibility

B.  

Repudiation

C.  

Risk

D.  

Residual

Discussion 0
Question # 55

Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?

Options:

A.  

Availability

B.  

Interoperability

C.  

Reversibility

D.  

Portability

Discussion 0
Question # 56

What type of data does data rights management (DRM) protect?

Options:

A.  

Consumer

B.  

PII

C.  

Financial

D.  

Healthcare

Discussion 0
Question # 57

Which of the following is NOT a factor that is part of a firewall configuration?

Options:

A.  

Encryption

B.  

Port

C.  

Protocol

D.  

Source IP

Discussion 0
Question # 58

Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?

Options:

A.  

SAML and HTML

B.  

XML and SAML

C.  

XML and JSON

D.  

JSON and SAML

Discussion 0
Question # 59

Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?

Options:

A.  

Injection

B.  

Missing function-level access control

C.  

Cross-site scripting

D.  

Cross-site request forgery

Discussion 0
Question # 60

With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?

Options:

A.  

Structured and hierarchical

B.  

Volume and object

C.  

Volume and database

D.  

Structured and unstructured

Discussion 0
Question # 61

Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.

Which of the following is NOT a technology for securing data in transit?

Options:

A.  

VPN

B.  

TLS

C.  

DNSSEC

D.  

HTTPS

Discussion 0
Question # 62

Which of the following is not a risk management framework?

Options:

A.  

COBIT

B.  

Hex GBL

C.  

ISO 31000:2009

D.  

NIST SP 800-37

Discussion 0
Question # 63

What does a cloud customer purchase or obtain from a cloud provider?

Options:

A.  

Services

B.  

Hosting

C.  

Servers

D.  

Customers

Discussion 0
Question # 64

Where is a DLP solution generally installed when utilized for monitoring data in transit?

Options:

A.  

Network perimeter

B.  

Database server

C.  

Application server

D.  

Web server

Discussion 0
Question # 65

With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.

What is the term associated with this determination?

Options:

A.  

Weighting

B.  

Prioritization

C.  

Shares

D.  

Scoring

Discussion 0
Question # 66

Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

Options:

A.  

Regulation

B.  

Multitenancy

C.  

Virtualization

D.  

Resource pooling

Discussion 0
Question # 67

An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?

Options:

A.  

Network

B.  

Users

C.  

Memory

D.  

CPU

Discussion 0
Question # 68

Which of the following is considered an internal redundancy for a data center?

Options:

A.  

Power feeds

B.  

Chillers

C.  

Network circuits

D.  

Generators

Discussion 0
Question # 69

If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?

Options:

A.  

Limit

B.  

Reservation

C.  

Assurance

D.  

Guarantee

Discussion 0
Question # 70

Implementing baselines on systems would take an enormous amount of time and resources if the staff had to apply them to each server, and over time, it would be almost impossible to keep all the systems in sync on an ongoing basis.

Which of the following is NOT a package that can be used for implementing and maintaining baselines across an enterprise?

Options:

A.  

Puppet

B.  

SCCM

C.  

Chef

D.  

GitHub

Discussion 0
Question # 71

Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?

Options:

A.  

Unstructured

B.  

Object

C.  

Volume

D.  

Structured

Discussion 0
Question # 72

Which of the following tasks within a SaaS environment would NOT be something the cloud customer would be responsible for?

Options:

A.  

Authentication mechanism

B.  

Branding

C.  

Training

D.  

User access

Discussion 0
Question # 73

You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.

Which of the following would be the most appropriate action to take first?

Options:

A.  

Take a shapshot of the virtual machines

B.  

Escrow the encryption keys

C.  

Copy the data

D.  

Notify the customer

Discussion 0
Question # 74

During which phase of the cloud data lifecycle is it possible for the classification of data to change?

Options:

A.  

Use

B.  

Archive

C.  

Create

D.  

Share

Discussion 0
Question # 75

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.

Which of the following is NOT something that firewalls are concerned with?

Options:

A.  

IP address

B.  

Encryption

C.  

Port

D.  

Protocol

Discussion 0
Question # 76

A DLP solution/implementation has three main components.

Which of the following is NOT one of the three main components?

Options:

A.  

Monitoring

B.  

Enforcement

C.  

Auditing

D.  

Discovery and classification

Discussion 0
Get CCSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions