Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CCSP Certified Cloud Security Professional (CCSP) Questions and Answers

Questions 4

Which of the following is NOT one of five principles of SOC Type 2 audits?

Options:

A.

Privacy

B.

Processing integrity

C.

Financial

D.

Security

Buy Now
Questions 5

What is the concept of segregating information or processes, within the same system or application, for security reasons?

Options:

A.

fencing

B.

Sandboxing

C.

Cellblocking

D.

Pooling

Buy Now
Questions 6

Which of the following is a commonly used tool for maintaining system configurations?

Options:

A.

Maestro

B.

Orchestrator

C.

Puppet

D.

Conductor

Buy Now
Questions 7

What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?

Options:

A.

Masking

B.

Anonymization

C.

Tokenization

D.

Obfuscation

Buy Now
Questions 8

What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?

Options:

A.

Anonymization

B.

Tokenization

C.

Masking

D.

Obfuscation

Buy Now
Questions 9

What is an often overlooked concept that is essential to protecting the confidentiality of data?

Options:

A.

Strong password

B.

Training

C.

Security controls

D.

Policies

Buy Now
Questions 10

Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.

Which role would you be assuming under this directive?

Options:

A.

Cloud service administrator

B.

Cloud service user

C.

Cloud service integrator

D.

Cloud service business manager

Buy Now
Questions 11

Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?

Options:

A.

Modify data

B.

Modify metadata

C.

New data

D.

Import data

Buy Now
Questions 12

One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.

Which aspect of cloud computing makes this particular component more challenging than in a traditional data center?

Options:

A.

Portability

B.

Virtualization

C.

Elasticity

D.

Resource pooling

Buy Now
Questions 13

For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?

Options:

A.

Half

B.

Full

C.

Minimal

D.

Depends on the contract

Buy Now
Questions 14

Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.

What type of attack is this?

Options:

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

Buy Now
Questions 15

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.

Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

Options:

A.

SOC Type 2, one year

B.

SOC Type 1, one year

C.

SOC Type 2, one month

D.

SOC Type 2, six months

Buy Now
Questions 16

Which data state would be most likely to use TLS as a protection mechanism?

Options:

A.

Data in use

B.

Data at rest

C.

Archived

D.

Data in transit

Buy Now
Questions 17

If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?

Options:

A.

Memory and networking

B.

CPU and software

C.

CPU and storage

D.

CPU and memory

Buy Now
Questions 18

Which of the following systems is used to employ a variety of different techniques to discover and alert on threats and potential threats to systems and networks?

Options:

A.

IDS

B.

IPS

C.

Firewall

D.

WAF

Buy Now
Questions 19

The European Union is often considered the world leader in regard to the privacy of personal data and has declared privacy to be a " human right. "

In what year did the EU first assert this principle?

Options:

A.

1995

B.

2000

C.

2010

D.

1999

Buy Now
Questions 20

You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.

Which of the following would be the most appropriate action to take first?

Options:

A.

Take a shapshot of the virtual machines

B.

Escrow the encryption keys

C.

Copy the data

D.

Notify the customer

Buy Now
Questions 21

Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?

Options:

A.

Cross-site scripting

B.

Missing function-level access control

C.

Injection

D.

Cross-site forgery

Buy Now
Questions 22

Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?

Options:

A.

Continuity management

B.

Availability management

C.

Configuration management

D.

Problem management

Buy Now
Questions 23

The baseline should cover which of the following?

Options:

A.

Data breach alerting and reporting

B.

All regulatory compliance requirements

C.

As many systems throughout the organization as possible

D.

A process for version control

Buy Now
Questions 24

What is the intellectual property protection for a useful manufacturing innovation?

Options:

A.

Trademark

B.

Copyright

C.

patent

D.

Trade secret

Buy Now
Questions 25

Data masking can be used to provide all of the following functionality, except:

Options:

A.

Secure remote access

B.

test data in sandboxed environments

C.

Authentication of privileged users

D.

Enforcing least privilege

Buy Now
Questions 26

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

Options:

A.

Archive

B.

Share

C.

Store

D.

Destroy

Buy Now
Questions 27

Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.

Which of the following is the optimal temperature range as set by ASHRAE?

Options:

A.

69.8 to 86.0 degrees Fahrenheit (21 to 30 degrees Celsius)

B.

51.8 to 66.2 degrees Fahrenheit (11 to 19 degrees Celsius)

C.

64.4 to 80.6 degrees Fahrenheit (18 to 27 degrees Celsius)

D.

44.6 to 60.8 degrees Fahrenheit (7 to 16 degrees Celsius)

Buy Now
Questions 28

Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

Options:

A.

Regulation

B.

Multitenancy

C.

Virtualization

D.

Resource pooling

Buy Now
Questions 29

Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?

Options:

A.

SAML and HTML

B.

XML and SAML

C.

XML and JSON

D.

JSON and SAML

Buy Now
Questions 30

Which of the following threat types involves the sending of invalid and manipulated requests through a user ' s client to execute commands on the application under their own credentials?

Options:

A.

Injection

B.

Cross-site request forgery

C.

Missing function-level access control

D.

Cross-site scripting

Buy Now
Questions 31

Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?

Options:

A.

Multitenancy

B.

Certification

C.

Regulation

D.

Virtualization

Buy Now
Questions 32

Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?

Options:

A.

Volume

B.

Unstructured

C.

Structured

D.

Object

Buy Now
Questions 33

Which cloud deployment model would be ideal for a group of universities looking to work together, where each university can gain benefits according to its specific needs?

Options:

A.

Private

B.

Public

C.

Hybrid

D.

Community

Buy Now
Questions 34

There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the stricter requirements.

Which US program was designed to help companies overcome these differences?

Options:

A.

SOX

B.

HIPAA

C.

GLBA

D.

Safe Harbor

Buy Now
Questions 35

Which of the following tasks within a SaaS environment would NOT be something the cloud customer would be responsible for?

Options:

A.

Authentication mechanism

B.

Branding

C.

Training

D.

User access

Buy Now
Questions 36

Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?

Options:

A.

DaaS

B.

PaaS

C.

IaaS

D.

SaaS

Buy Now
Questions 37

Within a federated identity system, which entity accepts tokens from the identity provider?

Options:

A.

Assertion manager

B.

Servicing party

C.

Proxy party

D.

Relying party

Buy Now
Questions 38

Data centers have enormous power resources that are distributed and consumed throughout the entire facility.

Which of the following standards pertains to the proper fire safety standards within that scope?

Options:

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

Buy Now
Questions 39

You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?

Options:

A.

Measured service

B.

Broad network access

C.

Resource pooling

D.

On-demand self-service

Buy Now
Questions 40

DNSSEC was designed to add a layer of security to the DNS protocol.

Which type of attack was the DNSSEC extension designed to mitigate?

Options:

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Data exposure

Buy Now
Questions 41

Where is an XML firewall most commonly and effectively deployed in the environment?

Options:

A.

Between the application and data layers

B.

Between the presentation and application layers

C.

Between the IPS and firewall

D.

Between the firewall and application server

Buy Now
Questions 42

Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?

Options:

A.

IDCA

B.

NFPA

C.

BICSI

D.

Uptime Institute

Buy Now
Questions 43

What does the REST API support that SOAP does NOT support?

Options:

A.

Caching

B.

Encryption

C.

Acceleration

D.

Redundancy

Buy Now
Questions 44

Which aspect of archiving must be tested regularly for the duration of retention requirements?

Options:

A.

Availability

B.

Recoverability

C.

Auditability

D.

Portability

Buy Now
Questions 45

Which of the following is considered an external redundancy for a data center?

Options:

A.

Power feeds to rack

B.

Generators

C.

Power distribution units

D.

Storage systems

Buy Now
Questions 46

What is the data encapsulation used with the SOAP protocol referred to?

Options:

A.

Packet

B.

Envelope

C.

Payload

D.

Object

Buy Now
Questions 47

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it ' s used with the hypervisors.

What does the management plane typically leverage for this orchestration?

Options:

A.

APIs

B.

Scripts

C.

TLS

D.

XML

Buy Now
Questions 48

What does a cloud customer purchase or obtain from a cloud provider?

Options:

A.

Services

B.

Hosting

C.

Servers

D.

Customers

Buy Now
Questions 49

If a key feature of cloud computing that your organization desires is the ability to scale and expand without limit or concern about available resources, which cloud deployment model would you MOST likely be considering?

Options:

A.

Public

B.

Hybrid

C.

Private

D.

Community

Buy Now
Questions 50

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?

Options:

A.

Inter-cloud provider

B.

Cloud service business manager

C.

Cloud service administrator

D.

Cloud service integrator

Buy Now
Questions 51

When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.

What is the data encapsulation used with the SOAP protocol referred to as?

Options:

A.

Packet

B.

Payload

C.

Object

D.

Envelope

Buy Now
Questions 52

Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?

Options:

A.

Hardening

B.

Leveling

C.

Baselines

D.

Standards

Buy Now
Questions 53

A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it ' s best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within a cloud.

What is the biggest advantage to leasing space in a data center versus procuring cloud services?

Options:

A.

Regulations

B.

Control

C.

Security

D.

Costs

Buy Now
Questions 54

Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.

What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?

Options:

A.

Distributed clustering

B.

Distributed balancing

C.

Distributed optimization

D.

Distributed resource scheduling

Buy Now
Questions 55

Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?

Options:

A.

Segregated from host systems

B.

Network access

C.

Scalability

D.

External to system patching

Buy Now
Questions 56

Different certifications and standards take different approaches to data center design and operations. Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?

Options:

A.

IDCA

B.

BICSI

C.

Uptime Institute

D.

NFPA

Buy Now
Questions 57

Which cloud deployment model is MOST likely to offer free or very cheap services to users?

Options:

A.

Hybrid

B.

Community

C.

Public

D.

Private

Buy Now
Questions 58

Data center and operations design traditionally takes a tiered, topological approach.

Which of the following standards is focused on that approach and is prevalently used throughout the industry?

Options:

A.

IDCA

B.

NFPA

C.

BICSI

D.

Uptime Institute

Buy Now
Questions 59

What is the cloud service model in which the customer is responsible for administration of the OS?

Options:

A.

QaaS

B.

SaaS

C.

PaaS

D.

IaaS

Buy Now
Questions 60

Which data formats are most commonly used with the REST API?

Options:

A.

JSON and SAML

B.

XML and SAML

C.

XML and JSON

D.

SAML and HTML

Buy Now
Questions 61

Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?

Options:

A.

SATA

B.

iSCSI

C.

TLS

D.

SCSI

Buy Now
Questions 62

Which of the following storage types is most closely associated with a database-type storage implementation?

Options:

A.

Object

B.

Unstructured

C.

Volume

D.

Structured

Buy Now
Questions 63

Which aspect of cloud computing will be most negatively impacted by vendor lock-in?

Options:

A.

Elasticity

B.

Reversibility

C.

Interoperability

D.

Portability

Buy Now
Questions 64

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Options:

A.

Cloud auditor

B.

Inter-cloud provider

C.

Cloud service broker

D.

Cloud service developer

Buy Now
Questions 65

What expectation of data custodians is made much more challenging by a cloud implementation, especially with PaaS or SaaS?

Options:

A.

Data classification

B.

Knowledge of systems

C.

Access to data

D.

Encryption requirements

Buy Now
Questions 66

Which United States law is focused on accounting and financial practices of organizations?

Options:

A.

Safe Harbor

B.

GLBA

C.

SOX

D.

HIPAA

Buy Now
Questions 67

Which type of cloud model typically presents the most challenges to a cloud customer during the " destroy " phase of the cloud data lifecycle?

Options:

A.

IaaS

B.

DaaS

C.

SaaS

D.

PaaS

Buy Now
Questions 68

What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?

Options:

A.

Virtual

B.

Security

C.

Physical

D.

Logical

Buy Now
Questions 69

Which of the following represents a minimum guaranteed resource within a cloud environment for the cloud customer?

Options:

A.

Reservation

B.

Share

C.

Limit

D.

Provision

Buy Now
Questions 70

Which term relates to the application of scientific methods and practices to evidence?

Options:

A.

Forensics

B.

Methodical

C.

Theoretical

D.

Measured

Buy Now
Questions 71

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

Options:

A.

Dedicated switches

B.

Trust zones

C.

Redundant network circuits

D.

Direct connections

Buy Now
Questions 72

What type of masking strategy involves making a separate and distinct copy of data with masking in place?

Options:

A.

Dynamic

B.

Replication

C.

Static

D.

Duplication

Buy Now
Questions 73

Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?

Options:

A.

Cloud service business manager

B.

Cloud service operations manager

C.

Cloud service manager

D.

Cloud service deployment manager

Buy Now
Questions 74

Which of the following cloud aspects complicates eDiscovery?

Options:

A.

Resource pooling

B.

On-demand self-service

C.

Multitenancy

D.

Measured service

Buy Now
Questions 75

From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?

Options:

A.

Notification

B.

Key identification

C.

Data collection

D.

Virtual image snapshots

Buy Now
Questions 76

Which of the following roles involves the provisioning and delivery of cloud services?

Options:

A.

Cloud service deployment manager

B.

Cloud service business manager

C.

Cloud service manager

D.

Cloud service operations manager

Buy Now
Questions 77

What is the biggest benefit to leasing space in a data center versus building or maintain your own?

Options:

A.

Certification

B.

Costs

C.

Regulation

D.

Control

Buy Now
Questions 78

Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?

Options:

A.

Hybrid

B.

Public

C.

Private

D.

Community

Buy Now
Questions 79

Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:

Options:

A.

Ransomware

B.

Syn floods

C.

XSS and SQL injection

D.

Password cracking

Buy Now
Questions 80

Which technology is NOT commonly used for security with data in transit?

Options:

A.

DNSSEC

B.

IPsec

C.

VPN

D.

HTTPS

Buy Now
Questions 81

Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

Options:

A.

Resource pooling

B.

Virtualization

C.

Multitenancy

D.

Regulation

Buy Now
Questions 82

Without the extensive funds of a large corporation, a small-sized company could gain considerable and cost-effective services for which of the following concepts by moving to a cloud environment?

Options:

A.

Regulatory

B.

Security

C.

Testing

D.

Development

Buy Now
Questions 83

You need to gain approval to begin moving your company ' s data and systems into a cloud environment. However, your CEO has mandated the ability to easily remove your IT assets from the cloud provider as a precondition.

Which of the following cloud concepts would this pertain to?

Options:

A.

Removability

B.

Extraction

C.

Portability

D.

Reversibility

Buy Now
Questions 84

What is the intellectual property protection for the tangible expression of a creative idea?

Options:

A.

Trade secret

B.

Copyright

C.

Trademark

D.

Patent

Buy Now
Questions 85

Which of the following is the best example of a key component of regulated PII?

Options:

A.

Audit rights of subcontractors

B.

Items that should be implemented

C.

PCI DSS

D.

Mandatory breach reporting

Buy Now
Questions 86

Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.

Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?

Options:

A.

Interoperability

B.

Resiliency

C.

Scalability

D.

Portability

Buy Now
Questions 87

When using a PaaS solution, what is the capability provided to the customer?

Options:

A.

To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The provider does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

B.

To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

C.

To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the consumer supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

D.

To deploy onto the cloud infrastructure provider-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

Buy Now
Questions 88

Proper implementation of DLP solutions for successful function requires which of the following?

Options:

A.

Physical access limitations

B.

USB connectivity

C.

Accurate data categorization

D.

Physical presence

Buy Now
Questions 89

As a result of scandals involving publicly traded corporations such as Enron, WorldCom, and Adelphi, Congress passed legislation known as:

Options:

A.

SOX

B.

HIPAA

C.

FERPA

D.

GLBA

Buy Now
Questions 90

A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?

Options:

A.

UPS

B.

Generators

C.

Joint operating agreements

D.

Strict adherence to applicable regulations

Buy Now
Questions 91

Which protocol operates at the network layer and provides for full point-to-point encryption of all communications and transmissions?

Options:

A.

IPSec

B.

VPN

C.

SSL

D.

TLS

Buy Now
Questions 92

BCDR strategies do not typically involve the entire operations of an organization, but only those deemed critical to their business.

Which concept pertains to the amount of services that need to be recovered to meet BCDR objectives?

Options:

A.

RSL

B.

RTO

C.

RPO

D.

SRE

Buy Now
Questions 93

Which component of ITIL involves the creation of an RFC ticket and obtaining official approvals for it?

Options:

A.

Problem management

B.

Release management

C.

Deployment management

D.

Change management

Buy Now
Questions 94

On large distributed systems with pooled resources, cloud computing relies on extensive orchestration to maintain the environment and the constant provisioning of resources.

Which of the following is crucial to the orchestration and automation of networking resources within a cloud?

Options:

A.

DNSSEC

B.

DNS

C.

DCOM

D.

DHCP

Buy Now
Questions 95

Because of multitenancy, specific risks in the public cloud that don’t exist in the other cloud service models include all the following except:

Options:

A.

DoS/DDoS

B.

Information bleed

C.

Risk of loss/disclosure due to legal seizures

D.

Escalation of privilege

Buy Now
Questions 96

Which of the following roles is responsible for creating cloud components and the testing and validation of services?

Options:

A.

Cloud auditor

B.

Inter-cloud provider

C.

Cloud service broker

D.

Cloud service developer

Buy Now
Questions 97

The GAPP framework was developed through a joint effort between the major Canadian and American professional accounting associations in order to assist their members with managing and preventing risks to the privacy of their data and customers.

Which of the following is the meaning of GAPP?

Options:

A.

General accounting personal privacy

B.

Generally accepted privacy practices

C.

Generally accepted privacy principles

D.

General accounting privacy policies

Buy Now
Questions 98

In a cloud environment, encryption should be used for all the following, except:

Options:

A.

Secure sessions/VPN

B.

Long-term storage of data

C.

Near-term storage of virtualized images

D.

Profile formatting

Buy Now
Questions 99

A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.

However, what is one consideration that is often overlooked with the formulation of a BCDR plan?

Options:

A.

Availability of staff

B.

Capacity at the BCDR site

C.

Restoration of services

D.

Change management processes

Buy Now
Questions 100

Countermeasures for protecting cloud operations against external attackers include all of the following except:

Options:

A.

Continual monitoring for anomalous activity.

B.

Detailed and extensive background checks.

C.

Regular and detailed configuration/change management activities

D.

Hardened devices and systems, including servers, hosts, hypervisors, and virtual machines.

Buy Now
Questions 101

Which of the following could be used as a second component of multifactor authentication if a user has an RSA token?

Options:

A.

Access card

B.

USB thumb drive

C.

Retina scan

D.

RFID

Buy Now
Questions 102

The goals of SIEM solution implementation include all of the following, except:

Options:

A.

Dashboarding

B.

Performance enhancement

C.

Trend analysis

D.

Centralization of log streams

Buy Now
Questions 103

All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except:

Options:

A.

Tokenization

B.

Masking

C.

Data discovery

D.

Obfuscation

Buy Now
Questions 104

Cloud systems are increasingly used for BCDR solutions for organizations.

What aspect of cloud computing makes their use for BCDR the most attractive?

Options:

A.

On-demand self-service

B.

Measured service

C.

Portability

D.

Broad network access

Buy Now
Questions 105

Data labels could include all the following, except:

Options:

A.

Data value

B.

Data of scheduled destruction

C.

Date data was created

D.

Data owner

Buy Now
Questions 106

Which component of ITIL involves planning for the restoration of services after an unexpected outage or incident?

Options:

A.

Continuity management

B.

Problem management

C.

Configuration management

D.

Availability management

Buy Now
Questions 107

Legal controls refer to which of the following?

Options:

A.

ISO 27001

B.

PCI DSS

C.

NIST 800-53r4

D.

Controls designed to comply with laws and regulations related to the cloud environment

Buy Now
Questions 108

Which of the following is considered a technological control?

Options:

A.

Firewall software

B.

Firing personnel

C.

Fireproof safe

D.

Fire extinguisher

Buy Now
Questions 109

To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:

Options:

A.

Multifactor authentication

B.

DLP agents

C.

Two-person integrity

D.

Local encryption

Buy Now
Questions 110

The cloud customer will have the most control of their data and systems, and the cloud provider will have the least amount of responsibility, in which cloud computing arrangement?

Options:

A.

IaaS

B.

SaaS

C.

Community cloud

D.

PaaS

Buy Now
Questions 111

Which protocol, as a part of TLS, handles the actual secure communications and transmission of data?

Options:

A.

Negotiation

B.

Handshake

C.

Transfer

D.

Record

Buy Now
Questions 112

What type of solution is at the core of virtually all directory services?

Options:

A.

WS

B.

LDAP

C.

ADFS

D.

PKI

Buy Now
Questions 113

What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?

Options:

A.

Scripts

B.

RDP

C.

APIs

D.

XML

Buy Now
Questions 114

Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?

Options:

A.

Unvalidated redirects and forwards

B.

Insecure direct object references

C.

Security miscomfiguration

D.

Sensitive data exposure

Buy Now
Questions 115

What are the two protocols that TLS uses?

Options:

A.

Handshake and record

B.

Transport and initiate

C.

Handshake and transport

D.

Record and transmit

Buy Now
Questions 116

Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?

Options:

A.

SP 800-153

B.

SP 800-145

C.

SP 800-53

D.

SP 800-40

Buy Now
Questions 117

Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?

Options:

A.

NFPA

B.

BICSI

C.

IDCA

D.

Uptime Institute

Buy Now
Questions 118

Which of the following is the biggest concern or challenge with using encryption?

Options:

A.

Dependence on keys

B.

Cipher strength

C.

Efficiency

D.

Protocol standards

Buy Now
Questions 119

Which is the appropriate phase of the cloud data lifecycle for determining the data ' s classification?

Options:

A.

Create

B.

Use

C.

Share

D.

Store

Buy Now
Questions 120

Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?

Options:

A.

Sensitive data exposure

B.

Security misconfiguration

C.

Insecure direct object references

D.

Unvalidated redirect and forwards

Buy Now
Questions 121

Which of the following are the storage types associated with IaaS?

Options:

A.

Volume and object

B.

Volume and label

C.

Volume and container

D.

Object and target

Buy Now
Questions 122

Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?

Options:

A.

69.8-86.0degF (21-30degC)

B.

64.4-80.6degF(18-27degC)

C.

51.8-66.2degF(11-19degC)

D.

44.6-60-8degF(7-16degC)

Buy Now
Questions 123

Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?

Options:

A.

A Type 2 hypervisor runs on top of another operating system and is dependent on the security of the OS for its own security.

B.

A Type 2 hypervisor allows users to directly perform some functions with their own access.

C.

A Type 2 hypervisor is open source, so attackers can more easily find exploitable vulnerabilities with that access.

D.

A Type 2 hypervisor is always exposed to the public Internet for federated identity access.

Buy Now
Questions 124

Which of the following is NOT something that an HIDS will monitor?

Options:

A.

Configurations

B.

User logins

C.

Critical system files

D.

Network traffic

Buy Now
Questions 125

Which of the following features is a main benefit of PaaS over IaaS?

Options:

A.

Location independence

B.

High-availability

C.

Physical security requirements

D.

Auto-scaling

Buy Now
Questions 126

Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?

Options:

A.

Virtualization

B.

Multitenancy

C.

Resource pooling

D.

Dynamic optimization

Buy Now
Questions 127

Which of the cloud cross-cutting aspects relates to the ability for a cloud customer to easily remove their applications and data from a cloud environment?

Options:

A.

Reversibility

B.

Availability

C.

Portability

D.

Interoperability

Buy Now
Questions 128

The SOC Type 2 reports are divided into five principles.

Which of the five principles must also be included when auditing any of the other four principles?

Options:

A.

Confidentiality

B.

Privacy

C.

Security

D.

Availability

Buy Now
Questions 129

Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?

Options:

A.

Community

B.

Public

C.

Hybrid

D.

Private

Buy Now
Questions 130

Which if the following is NOT one of the three components of a federated identity system transaction?

Options:

A.

Relying party

B.

Identity provider

C.

User

D.

Proxy relay

Buy Now
Questions 131

At which stage of the BCDR plan creation phase should security be included in discussions?

Options:

A.

Define scope

B.

Analyze

C.

Assess risk

D.

Gather requirements

Buy Now
Questions 132

Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?

Options:

A.

Platform

B.

Infrastructure

C.

Governance

D.

Application

Buy Now
Questions 133

Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management ' s objectives?

Options:

A.

RSL

B.

RPO

C.

SRE

D.

RTO

Buy Now
Questions 134

Which of the following would NOT be a reason to activate a BCDR strategy?

Options:

A.

Staffing loss

B.

Terrorism attack

C.

Utility disruptions

D.

Natural disaster

Buy Now
Questions 135

Which security concept is focused on the trustworthiness of data?

Options:

A.

Integrity

B.

Availability

C.

Nonrepudiation

D.

Confidentiality

Buy Now
Questions 136

Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?

Options:

A.

regulatory requirements

B.

Auditability

C.

Service-level agreements

D.

Governance

Buy Now
Questions 137

Which regulatory system pertains to the protection of healthcare data?

Options:

A.

HIPAA

B.

HAS

C.

HITECH

D.

HFCA

Buy Now
Questions 138

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

Options:

A.

Community

B.

Hybrid

C.

Private

D.

Public

Buy Now
Questions 139

Which audit type has been largely replaced by newer approaches since 2011?

Options:

A.

SOC Type 1

B.

SSAE-16

C.

SAS-70

D.

SOC Type 2

Buy Now
Questions 140

Which of the following is NOT a focus or consideration of an internal audit?

Options:

A.

Certification

B.

Design

C.

Costs

D.

Operational efficiency

Buy Now
Questions 141

Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?

Options:

A.

Service-level agreements

B.

Governance

C.

Regulatory requirements

D.

Auditability

Buy Now
Questions 142

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?

Options:

A.

2010

B.

2000

C.

1995

D.

1990

Buy Now
Questions 143

Which of the following service categories entails the least amount of support needed on the part of the cloud customer?

Options:

A.

SaaS

B.

IaaS

C.

DaaS

D.

PaaS

Buy Now
Questions 144

What does the REST API use to protect data transmissions?

Options:

A.

NetBIOS

B.

VPN

C.

Encapsulation

D.

TLS

Buy Now
Questions 145

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

Options:

A.

Platform

B.

Infrastructure

C.

Software

D.

Desktop

Buy Now
Questions 146

Which data point that auditors always desire is very difficult to provide within a cloud environment?

Options:

A.

Access policy

B.

Systems architecture

C.

Baselines

D.

Privacy statement

Buy Now
Questions 147

What changes are necessary to application code in order to implement DNSSEC?

Options:

A.

Adding encryption modules

B.

Implementing certificate validations

C.

Additional DNS lookups

D.

No changes are needed.

Buy Now
Questions 148

Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?

Options:

A.

Delete

B.

Modify

C.

Read

D.

Print

Buy Now
Questions 149

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?

Options:

A.

Broad network access

B.

Interoperability

C.

Resource pooling

D.

Portability

Buy Now
Questions 150

What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?

Options:

A.

Dynamic clustering

B.

Dynamic balancing

C.

Dynamic resource scheduling

D.

Dynamic optimization

Buy Now
Questions 151

What process is used within a clustered system to provide high availability and load balancing?

Options:

A.

Dynamic balancing

B.

Dynamic clustering

C.

Dynamic optimization

D.

Dynamic resource scheduling

Buy Now
Questions 152

Which European Union directive pertains to personal data privacy and an individual ' s control over their personal data?

Options:

A.

99/9/EC

B.

95/46/EC

C.

2000/1/EC

D.

2013/27001/EC

Buy Now
Exam Code: CCSP
Exam Name: Certified Cloud Security Professional (CCSP)
Last Update: Apr 30, 2026
Questions: 512

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CCSP testing engine

PDF (Q&A)

$43.57  $124.49
buy now CCSP pdf