Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 3 / 11
Total 512 questions

Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?

A.

SATA

B.

iSCSI

C.

TLS

D.

SCSI

Which of the following roles involves testing, monitoring, and securing cloud services for an organization?

A.

Cloud service integrator

B.

Cloud service business manager

C.

Cloud service user

D.

Cloud service administrator

Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?

A.

GLBA

B.

HIPAA

C.

Safe Harbor

D.

SOX

Which of the following does NOT relate to the hiding of sensitive data from data sets?

A.

Obfuscation

B.

Federation

C.

Masking

D.

Anonymization

Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?

A.

IDCA

B.

NFPA

C.

BICSI

D.

Uptime Institute

From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?

A.

Notification

B.

Key identification

C.

Data collection

D.

Virtual image snapshots

Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?

A.

PLAN

B.

WAN

C.

LAN

D.

VLAN

Which of the following is the biggest concern or challenge with using encryption?

A.

Dependence on keys

B.

Cipher strength

C.

Efficiency

D.

Protocol standards

Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?

A.

Cloud service business manager

B.

Cloud service user

C.

Cloud service administrator

D.

Cloud service integrator

Which of the following statements about Type 1 hypervisors is true?

A.

The hardware vendor and software vendor are different.

B.

The hardware vendor and software vendor are the same

C.

The hardware vendor provides an open platform for software vendors.

D.

The hardware vendor and software vendor should always be different for the sake of security.

Many aspects of cloud computing bring enormous benefits over a traditional data center, but also introduce new challenges unique to cloud computing.

Which of the following aspects of cloud computing makes appropriate data classification of high importance?

A.

Multitenancy

B.

Interoperability

C.

Portability

D.

Reversibility

Which of the following are distinguishing characteristics of a managed service provider?

A.

Be able to remotely monitor and manage objects for the customer and proactively maintain these objects under management.

B.

Have some form of a help desk but no NOC.

C.

Be able to remotely monitor and manage objects for the customer and reactively maintain these objects under management.

D.

Have some form of a NOC but no help desk.

What is the cloud service model in which the customer is responsible for administration of the OS?

A.

QaaS

B.

SaaS

C.

PaaS

D.

IaaS

Which of the following technologies is NOT commonly used for accessing systems and services in a cloud environment in a secure manner?

A.

KVM

B.

HTTPS

C.

VPN

D.

TLS

All of the following are techniques to enhance the portability of cloud data, in order to minimize the potential of vendor lock-in except:

A.

Ensure there are no physical limitations to moving

B.

Use DRM and DLP solutions widely throughout the cloud operation

C.

Ensure favorable contract terms to support portability

D.

Avoid proprietary data formats