ISC CCSP Certified Cloud Security Professional (CCSP) Online Training
ISC CCSP Online Training
The questions for CCSP were last updated at Mar 31,2025.
- Exam Code: CCSP
- Exam Name: Certified Cloud Security Professional (CCSP)
- Certification Provider: ISC
- Latest update: Mar 31,2025
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
- A . Cloud auditor
- B . Inter-cloud provider
- C . Cloud service broker
- D . Cloud service developer
What is the best source for information about securing a physical asset’s BIOS?
- A . Security policies
- B . Manual pages
- C . Vendor documentation
- D . Regulations
Which of the following is not a component of contractual PII?
- A . Scope of processing
- B . Value of data
- C . Location of data
- D . Use of subcontractors
Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?
- A . Consumable service
- B . Measured service
- C . Billable service
- D . Metered service
Which of the following roles involves testing, monitoring, and securing cloud services for an organization?
- A . Cloud service integrator
- B . Cloud service business manager
- C . Cloud service user
- D . Cloud service administrator
What is the only data format permitted with the SOAP API?
- A . HTML
- B . SAML
- C . XSML
- D . XML
Which data formats are most commonly used with the REST API?
- A . JSON and SAML
- B . XML and SAML
- C . XML and JSON
- D . SAML and HTML
Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?
- A . Injection
- B . Missing function-level access control
- C . Cross-site request forgery
- D . Cross-site scripting
Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?
- A . Cloud service user
- B . Cloud service business manager
- C . Cloud service administrator
- D . Cloud service integrator
What is the biggest concern with hosting a key management system outside of the cloud environment?
- A . Confidentiality
- B . Portability
- C . Availability
- D . Integrity