Which of the following is a widely used tool for code development, branching, and collaboration?
What process is used within a clustered system to provide high availability and load balancing?
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
Which aspect of cloud computing makes data classification even more vital than in a traditional data center?
What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.
Which role would you be assuming under this directive?
Which aspect of cloud computing serves as the biggest challenge to using DLP to protect data at rest?
Which of the following storage types is most closely associated with a traditional file system and tree structure?
Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?
Which of the following types of data would fall under data rights management (DRM) rather than information rights management (IRM)?
Which component of ITIL involves handling anything that can impact services for either internal or public users?
DLP can be combined with what other security technology to enhance data controls?
For performance purposes, OS monitoring should include all of the following except:
Which of the following jurisdictions lacks a comprehensive national policy on data privacy and the protection of personally identifiable information (PII)?
Where is a DLP solution generally installed when utilized for monitoring data in use?
An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
Your new CISO is placing increased importance and focus on regulatory compliance as your applications and systems move into cloud environments.
Which of the following would NOT be a major focus of yours as you develop a project plan to focus on regulatory compliance?
BCDR strategies do not typically involve the entire operations of an organization, but only those deemed critical to their business.
Which concept pertains to the amount of services that need to be recovered to meet BCDR objectives?
Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?
In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?
Implementing baselines on systems would take an enormous amount of time and resources if the staff had to apply them to each server, and over time, it would be almost impossible to keep all the systems in sync on an ongoing basis.
Which of the following is NOT a package that can be used for implementing and maintaining baselines across an enterprise?
Within a federated identity system, which entity accepts tokens from the identity provider?
The GAPP framework was developed through a joint effort between the major Canadian and American professional accounting associations in order to assist their members with managing and preventing risks to the privacy of their data and customers.
Which of the following is the meaning of GAPP?
Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
Which of the following is NOT an application or utility to apply and enforce baselines on a system?
Which aspect of archiving must be tested regularly for the duration of retention requirements?
Which data point that auditors always desire is very difficult to provide within a cloud environment?
Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.
What term pertains to the application of scientific norms and protocols to digital investigations?
Within a federated identity system, which of the following would you be MOST likely to use for sending information for consumption by a relying party?
The president of your company has tasked you with implementing cloud services as the most efficient way of obtaining a robust disaster recovery configuration for your production services.
Which of the cloud deployment models would you MOST likely be exploring?
Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?
Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?
Which of the cloud cross-cutting aspects relates to the requirements placed on the cloud provider by the cloud customer for minimum performance standards and requirements that must be met?
Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?
What expectation of data custodians is made much more challenging by a cloud implementation, especially with PaaS or SaaS?
What is the first stage of the cloud data lifecycle where security controls can be implemented?
Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?
What is a serious complication an organization faces from the perspective of compliance with international operations?
Which of the following standards primarily pertains to cabling designs and setups in a data center?
What is the primary reason that makes resolving jurisdictional conflicts complicated?
What is the biggest benefit to leasing space in a data center versus building or maintain your own?
On large distributed systems with pooled resources, cloud computing relies on extensive orchestration to maintain the environment and the constant provisioning of resources.
Which of the following is crucial to the orchestration and automation of networking resources within a cloud?
Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?
When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.
What is the data encapsulation used with the SOAP protocol referred to as?
Which cloud deployment model is MOST likely to offer free or very cheap services to users?
Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.
Which concept encapsulates this?
Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?
The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/contractors.
What technology would be useful for protecting data at this point?
Which type of testing uses the same strategies and toolsets that hackers would use?
Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?
What does static application security testing (SAST) offer as a tool to the testers?
The SOC Type 2 reports are divided into five principles.
Which of the five principles must also be included when auditing any of the other four principles?
Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?
When a system needs to be exposed to the public Internet, what type of secure system would be used to perform only the desired operations?
Cloud Security | CCSP Questions Answers | CCSP Test Prep | Certified Cloud Security Professional Questions PDF | CCSP Online Exam | CCSP Practice Test | CCSP PDF | CCSP Test Questions | CCSP Study Material | CCSP Exam Preparation | CCSP Valid Dumps | CCSP Real Questions | Cloud Security CCSP Exam Questions