ISC CCSP - Certified Cloud Security Professional (CCSP)
An audit scope statement defines the limits and outcomes from an audit.
Which of the following would NOT be included as part of an audit scope statement?
What category of PII data can carry potential fines or even criminal charges for its improper use or disclosure?
With a federated identity system, what does the identity provider send information to after a successful authentication?
Which protocol, as a part of TLS, handles negotiating and establishing a connection between two parties?
Which of the following areas of responsibility would be shared between the cloud customer and cloud provider within the Software as a Service (SaaS) category?
Which aspect of cloud computing serves as the biggest challenge to using DLP to protect data at rest?
Data labels could include all the following, except:
Which of the following best describes the Organizational Normative Framework (ONF)?
Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?
DLP solutions can aid in deterring loss due to which of the following?
What are SOC 1/SOC 2/SOC 3?
Which is the lowest level of the CSA STAR program?
The cloud customer will have the most control of their data and systems, and the cloud provider will have the least amount of responsibility, in which cloud computing arrangement?
Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:
Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed.
Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?