Vcehome > ISC > Certified Cloud Security Professional > CCSP > CCSP Online Practice Questions and Answers

CCSP Online Practice Questions and Answers

Questions 4

Which of the following storage types is most closely associated with a database-type storage implementation?

A. Object

B. Unstructured

C. Volume

D. Structured

Browse 512 Q&As
Questions 5

Which of the following roles is responsible for peering with other cloud services and providers?

A. Cloud auditor

B. Inter-cloud provider

C. Cloud service broker

D. Cloud service developer

Browse 512 Q&As
Questions 6

Which aspect of archiving must be tested regularly for the duration of retention requirements?

A. Availability

B. Recoverability

C. Auditability

D. Portability

Browse 512 Q&As
Questions 7

Which of the following is NOT a function performed by the record protocol of TLS?

A. Encryption

B. Acceleration

C. Authentication

D. Compression

Browse 512 Q&As
Questions 8

What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?

A. Masking

B. Anonymization

C. Tokenization

D. Obfuscation

Browse 512 Q&As
Questions 9

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?

A. Inter-cloud provider

B. Cloud service business manager

C. Cloud service administrator

D. Cloud service integrator

Browse 512 Q&As
Questions 10

Within a federated identity system, which entity accepts tokens from the identity provider?

A. Assertion manager

B. Servicing party

C. Proxy party

D. Relying party

Browse 512 Q&As
Questions 11

Countermeasures for protecting cloud operations against external attackers include all of the following except:

A. Continual monitoring for anomalous activity.

B. Detailed and extensive background checks.

C. Regular and detailed configuration/change management activities

D. Hardened devices and systems, including servers, hosts, hypervisors, and virtual machines.

Browse 512 Q&As
Questions 12

Countermeasures for protecting cloud operations against internal threats include all of the following except:

A. Extensive and comprehensive training programs, including initial, recurring, and refresher sessions

B. Skills and knowledge testing

C. Hardened perimeter devices

D. Aggressive background checks

Browse 512 Q&As
Questions 13

Which of the following best describes a sandbox?

A. An isolated space where untested code and experimentation can safely occur separate from the production environment.

B. A space where you can safely execute malicious code to see what it does.

C. An isolated space where transactions are protected from malicious software

D. An isolated space where untested code and experimentation can safely occur within the production environment.

Browse 512 Q&As
Exam Code: CCSP
Exam Name: Cloud Security
Last Update: Apr 22, 2024
Questions: 512 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99