ISC CCSP - Certified Cloud Security Professional (CCSP)
Which protocol does the REST API depend on?
Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?
What is used for local, physical access to hardware within a data center?
Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?
Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
What is the data encapsulation used with the SOAP protocol referred to?
Which of the following standards primarily pertains to cabling designs and setups in a data center?
Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?
What is the first stage of the cloud data lifecycle where security controls can be implemented?
Which United States law is focused on PII as it relates to the financial industry?
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
What does the REST API support that SOAP does NOT support?
Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?
Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?
What must be secured on physical hardware to prevent unauthorized access to systems?