ISC CCSP Certified Cloud Security Professional (CCSP) Online Training
ISC CCSP Online Training
The questions for CCSP were last updated at Apr 25,2025.
- Exam Code: CCSP
- Exam Name: Certified Cloud Security Professional (CCSP)
- Certification Provider: ISC
- Latest update: Apr 25,2025
Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?
- A . Security misconfiguration
- B . Insecure direct object references
- C . Sensitive data exposure
- D . Unvalidated redirects and forwards
What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?
- A . Remove
- B . Monitor
- C . Disable
- D . Stop
Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?
- A . Modifying metadata
- B . Importing data
- C . Modifying data
- D . Constructing new data
What are the two protocols that TLS uses?
- A . Handshake and record
- B . Transport and initiate
- C . Handshake and transport
- D . Record and transmit
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
- A . IaaS
- B . DaaS
- C . SaaS
- D . PaaS
Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?
- A . Multitenancy
- B . Certification
- C . Regulation
- D . Virtualization
Which of the following is considered an internal redundancy for a data center?
- A . Power distribution units
- B . Network circuits
- C . Power substations
- D . Generators
Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?
- A . Share
- B . Reservation
- C . Provision
- D . Limit
Which of the following roles is responsible for peering with other cloud services and providers?
- A . Cloud auditor
- B . Inter-cloud provider
- C . Cloud service broker
- D . Cloud service developer
Which of the following does NOT relate to the hiding of sensitive data from data sets?
- A . Obfuscation
- B . Federation
- C . Masking
- D . Anonymization