Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 2 / 11
Total 512 questions

Which protocol does the REST API depend on?

A.

HTTP

B.

XML

C.

SAML

D.

SSH

Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?

A.

Inter-cloud provider

B.

Cloud service broker

C.

Cloud auditor

D.

Cloud service developer

What is used for local, physical access to hardware within a data center?

A.

SSH

B.

KVM

C.

VPN

D.

RDP

Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?

A.

VPN

B.

WAF

C.

IPSec

D.

HTTPS

Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?

A.

Unvalidated redirects and forwards

B.

Insecure direct object references

C.

Security miscomfiguration

D.

Sensitive data exposure

What is the data encapsulation used with the SOAP protocol referred to?

A.

Packet

B.

Envelope

C.

Payload

D.

Object

Which of the following standards primarily pertains to cabling designs and setups in a data center?

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?

A.

69.8-86.0degF (21-30degC)

B.

64.4-80.6degF(18-27degC)

C.

51.8-66.2degF(11-19degC)

D.

44.6-60-8degF(7-16degC)

What is the first stage of the cloud data lifecycle where security controls can be implemented?

A.

Use

B.

Store

C.

Share

D.

Create

Which United States law is focused on PII as it relates to the financial industry?

A.

HIPAA

B.

SOX

C.

Safe Harbor

D.

GLBA

Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?

A.

SP 800-153

B.

SP 800-145

C.

SP 800-53

D.

SP 800-40

What does the REST API support that SOAP does NOT support?

A.

Caching

B.

Encryption

C.

Acceleration

D.

Redundancy

Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?

A.

On-demand self-service

B.

Resource pooling

C.

Measured service

D.

Rapid elasticity

Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?

A.

Share

B.

Reservation

C.

Provision

D.

Limit

What must be secured on physical hardware to prevent unauthorized access to systems?

A.

BIOS

B.

SSH

C.

RDP

D.

ALOM