Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CCSP - Certified Cloud Security Professional (CCSP)

Page: 1 / 11
Total 512 questions

Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?

A.

Create

B.

Use

C.

Share

D.

Store

Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?

A.

Consumable service

B.

Measured service

C.

Billable service

D.

Metered service

What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?

A.

Remove

B.

Monitor

C.

Disable

D.

Stop

Within an Infrastructure as a Service model, which of the following would NOT be a measured service?

A.

CPU

B.

Storage

C.

Number of users

D.

Memory

Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?

A.

IDCA

B.

Uptime Institute

C.

NFPA

D.

BICSI

Which data formats are most commonly used with the REST API?

A.

JSON and SAML

B.

XML and SAML

C.

XML and JSON

D.

SAML and HTML

Which of the following APIs are most commonly used within a cloud environment?

A.

REST and SAML

B.

SOAP and REST

C.

REST and XML

D.

XML and SAML

Which United States law is focused on accounting and financial practices of organizations?

A.

Safe Harbor

B.

GLBA

C.

SOX

D.

HIPAA

GAAPs are created and maintained by which organization?

A.

ISO/IEC

B.

AICPA

C.

PCI Council

D.

ISO

Which of the following are the storage types associated with PaaS?

A.

Structured and freeform

B.

Volume and object

C.

Structured and unstructured

D.

Database and file system

Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?

A.

Hybrid

B.

Public

C.

Private

D.

Community

Which of the following are the storage types associated with IaaS?

A.

Volume and object

B.

Volume and label

C.

Volume and container

D.

Object and target

Which United States law is focused on data related to health records and privacy?

A.

Safe Harbor

B.

SOX

C.

GLBA

D.

HIPAA

Which of the following threat types can occur when baselines are not appropriately applied or unauthorized changes are made?

A.

Insecure direct object references

B.

Unvalidated redirects and forwards

C.

Security misconfiguration

D.

Sensitive data exposure

Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?

A.

A Type 1 hypervisor also controls patching of its hosted virtual machines ensure they are always secure.

B.

A Type 1 hypervisor is tied directly to the bare metal and only runs with code necessary to perform its specific mission.

C.

A Type 1 hypervisor performs hardware-level encryption for tighter security and efficiency.

D.

A Type 1 hypervisor only hosts virtual machines with the same operating systems as the hypervisor.