ISC CCSP - Certified Cloud Security Professional (CCSP)
Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
Which of the following roles involves testing, monitoring, and securing cloud services for an organization?
Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?
Which of the following does NOT relate to the hiding of sensitive data from data sets?
Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?
From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?
Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?
Which of the following is the biggest concern or challenge with using encryption?
Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?
Which of the following statements about Type 1 hypervisors is true?
Many aspects of cloud computing bring enormous benefits over a traditional data center, but also introduce new challenges unique to cloud computing.
Which of the following aspects of cloud computing makes appropriate data classification of high importance?
Which of the following are distinguishing characteristics of a managed service provider?
What is the cloud service model in which the customer is responsible for administration of the OS?
Which of the following technologies is NOT commonly used for accessing systems and services in a cloud environment in a secure manner?
All of the following are techniques to enhance the portability of cloud data, in order to minimize the potential of vendor lock-in except: