CCSP Premium Bundle

CCSP Premium Bundle

Certified Cloud Security Professional Certification Exam

4.5 
(54060 ratings)
512 QuestionsPractice Tests
512 PDFPrint version
September 29, 2024Last update

ISC2 CCSP Free Practice Questions

Act now and download your ISC2 CCSP test today! Do not waste time for the worthless ISC2 CCSP tutorials. Download Refresh ISC2 Certified Cloud Security Professional exam with real questions and answers and begin to learn ISC2 CCSP with a classic professional.

Also have CCSP free dumps questions for you:

NEW QUESTION 1

A honeypot should contain data______.
Response:

  • A. Raw
  • B. Production
  • C. Useless
  • D. Sensitive

Answer: C

NEW QUESTION 2

Which of the following is not one of the defined security controls domains within the Cloud Controls Matrix, published by the Cloud Security Alliance?
Response:

  • A. Financial
  • B. Human resources
  • C. Mobile security
  • D. Identity and access management

Answer: A

NEW QUESTION 3

You are a consultant performing an external security review on a large manufacturing firm. You determine that its newest assembly plant, which cost $24 million, could be completely destroyed by a fire but that a fire suppression system could effectively protect the plant.
The fire suppression system costs $15 million. An insurance policy that would cover the full replacement cost of the plant costs $1 million per month.
In order to establish the true annualized loss expectancy (ALE), you would need all of the following information except ______ .
Response:

  • A. The amount of revenue generated by the plant
  • B. The rate at which the plant generates revenue
  • C. The length of time it would take to rebuild the plant
  • D. The amount of product the plant creates

Answer: D

NEW QUESTION 4

Under EU law, a cloud customer who gives sensitive data to a cloud provider is still legally responsible for the damages resulting from a data breach caused by the provider; the EU would say that it is the cloud customer’s fault for choosing the wrong provider.
This is an example of insufficient ______ .

  • A. Proof
  • B. Evidence
  • C. Due diligence
  • D. Application of reasonableness

Answer: C

NEW QUESTION 5

Which cloud service category offers the most customization options and control to the cloud customer?
Response:

  • A. PaaS
  • B. IaaS
  • C. SaaS
  • D. DaaS

Answer: B

NEW QUESTION 6

Each of the following are dependencies that must be considered when reviewing the BIA after cloud migration except:
Response:

  • A. The cloud provider’s suppliers
  • B. The cloud provider’s vendors
  • C. The cloud provider’s utilities
  • D. The cloud provider’s resellers

Answer: D

NEW QUESTION 7

Alice is the CEO for a software company; she is considering migrating the operation from the current on-premises legacy environment into the cloud.
In order to protect her company’s intellectual property, Alice might want to consider implementing all these techniques/solutions except ______.
Response:

  • A. Egress monitoring
  • B. Encryption
  • C. Turnstiles
  • D. Digital watermarking

Answer: C

NEW QUESTION 8

Which strategy involves using a fake production system to lure attackers in order to learn about their tactics?
Response:

  • A. IDS
  • B. Honeypot
  • C. IPS
  • D. Firewall

Answer: B

NEW QUESTION 9

What is the intellectual property protection for the logo of a new video game? Response:

  • A. Copyright
  • B. Patent
  • C. Trademark
  • D. Trade secret

Answer: C

NEW QUESTION 10

Devices in the cloud datacenter should be secure against attack. All the following are means of hardening devices, except:
Response:

  • A. Using a strong password policy
  • B. Removing default passwords
  • C. Strictly limiting physical access
  • D. Removing all admin accounts

Answer: D

NEW QUESTION 11

Which cloud service category brings with it the most expensive startup costs, but also the lowest costs for ongoing support and maintenance staff?
Response:

  • A. IaaS
  • B. SaaS
  • C. PaaS
  • D. DaaS

Answer: B

NEW QUESTION 12
What is a key component of GLBA? Response:

  • A. The right to be forgotten
  • B. EU Data Directives
  • C. The information security program
  • D. The right to audit

Answer: C

NEW QUESTION 13

Which type of software is most likely to be reviewed by the most personnel, with the most varied perspectives?
Response:

  • A. Database management software
  • B. Open source software
  • C. Secure software
  • D. Proprietary software

Answer: B

NEW QUESTION 14

There are two reasons to conduct a test of the organization’s recovery from backup in an environment other
than the primary production environment. Which of the following is one of them? Response:

  • A. It is good to invest in more than one community.
  • B. You want to approximate contingency conditions, which includes not operating in the primary location.
  • C. It is good for your personnel to see other places occasionally.
  • D. Your regulators won’t follow you offsite, so you’ll be unobserved during your test.

Answer: B

NEW QUESTION 15

TLS provides ______ and ______ for communications. Response:

  • A. Privacy, security
  • B. Security, optimization
  • C. Privacy, integrity
  • D. Enhancement, privacy

Answer: C

NEW QUESTION 16

Which of the following is a risk in the cloud environment that is not existing or is as prevalent in the legacy environment?
Response:

  • A. Legal liability in multiple jurisdictions
  • B. Loss of productivity due to DDoS
  • C. Ability of users to gain access to their physical workplace
  • D. Fire

Answer: A

NEW QUESTION 17
......

100% Valid and Newest Version CCSP Questions & Answers shared by Certleader, Get Full Dumps HERE: https://www.certleader.com/CCSP-dumps.html (New 512 Q&As)


START CCSP EXAM