ISC CCSP - Certified Cloud Security Professional (CCSP)
At which stage of the BCDR plan creation phase should security be included in discussions?
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
Which type of audit report is considered a "restricted use" report for its intended audience?
Which type of controls are the SOC Type 1 reports specifically focused on?
Which of the following is NOT a factor that is part of a firewall configuration?
What type of data does data rights management (DRM) protect?
Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?
With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?
Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?
What is the concept of segregating information or processes, within the same system or application, for security reasons?
What is the biggest challenge to data discovery in a cloud environment?
Which approach is typically the most efficient method to use for data discovery?
What process is used within a clustered system to provide high availability and load balancing?
Which of the following is NOT one of five principles of SOC Type 2 audits?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?