ISC CCSP - Certified Cloud Security Professional (CCSP)
Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?
A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it's best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within a cloud.
What is the biggest advantage to leasing space in a data center versus procuring cloud services?
With a federated identity system, where would a user perform their authentication when requesting services or application access?
Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?
Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.
Which of the following is NOT a regulatory system from the United States federal government?
Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?
Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.
Which of the following is NOT a technology for securing data in transit?
ISO/IEC has established international standards for many aspects of computing and any processes or procedures related to information technology.
Which ISO/IEC standard has been established to provide a framework for handling eDiscovery processes?
Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?
Which data state would be most likely to use TLS as a protection mechanism?
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
With IaaS, what is responsible for handling the security and control over the volume storage space?
What concept does the "R" represent with the DREAD model?
Which of the following would be a reason to undertake a BCDR test?
What does static application security testing (SAST) offer as a tool to the testers?