ISC CCSP Certified Cloud Security Professional (CCSP) Online Training
ISC CCSP Online Training
The questions for CCSP were last updated at Apr 27,2025.
- Exam Code: CCSP
- Exam Name: Certified Cloud Security Professional (CCSP)
- Certification Provider: ISC
- Latest update: Apr 27,2025
Which of the following are the storage types associated with IaaS?
- A . Volume and object
- B . Volume and label
- C . Volume and container
- D . Object and target
Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?
- A . IPS
- B . WAF
- C . DLP
- D . IDS
Which of the following storage types is most closely associated with a traditional file system and tree structure?
- A . Volume
- B . Unstructured
- C . Object
- D . Structured
Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?
- A . Provision
- B . Limit
- C . Reservation
- D . Share
Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?
- A . SAS-70
- B . SOC 2
- C . SOC 1
- D . SOX
Which of the following statements accurately describes VLANs?
- A . They are not restricted to the same data center or the same racks.
- B . They are not restricted to the name rack but restricted to the same data center.
- C . They are restricted to the same racks and data centers.
- D . They are not restricted to the same rack but restricted to same switches.
What must be secured on physical hardware to prevent unauthorized access to systems?
- A . BIOS
- B . SSH
- C . RDP
- D . ALOM
What type of PII is regulated based on the type of application or per the conditions of the specific hosting agreement?
- A . Specific
- B . Contractual
- C . regulated
- D . Jurisdictional
Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?
- A . VPN
- B . WAF
- C . IPSec
- D . HTTPS
Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?
- A . On-demand self-service
- B . Resource pooling
- C . Measured service
- D . Rapid elasticity