CCSP Exam Questions

Total 512 Questions

Last Updated Exam : 15-Apr-2025

Topic 2, Exam Pool B

Which of the following methods is often used to obscure data from production systems for use in test or development environments?
Response:


A.

Tokenization


B.

Encryption


C.

Masking


D.

Classification





C.
  

Masking



Single sign-on systems work by authenticating users from a centralized location or using a
centralized method, and then allowing applications that trust the system to grant those
users access. What would be passed between the authentication system and the
applications to grant a user access?
Response:


A.

Ticket


B.

Certificate


C.

Credential


D.

Token





D.
  

Token



Why does the physical location of your data backup and/or BCDR failover environment
matter?
Response:


A.

It may affect regulatory compliance


B.

Lack of physical security


C.

Environmental factors such as humidity


D.

It doesn’t matter. Data can be saved anywhere without consequence





A.
  

It may affect regulatory compliance



Which phase of the cloud data lifecycle also typically entails the process of data
classification?
Response:


A.

Use


B.

Store


C.

Create


D.

Archive





C.
  

Create



When considering the option to migrate from an on-premises environment to a hosted
cloud service, an organization should weigh the risks of allowing external entities to access
the cloud data for collaborative purposes against ____________.
Response:


A.

Not securing the data in the legacy environment


B.

Disclosing the data publicly


C.

Inviting external personnel into the legacy workspace in order to enhance collaboration


D.

Sending the data outside the legacy environment for collaborative purposes





D.
  

Sending the data outside the legacy environment for collaborative purposes



What principle must always been included with an SOC 2 report?
Response:


A.

Confidentiality


B.

Security


C.

Privacy


D.

Processing integrity





B.
  

Security



The tasks performed by the hypervisor in the virtual environment can most be likened to
the tasks of the ________ in the legacy environment.
Response:


A.

Central processing unit (CPU)


B.

Security team


C.

OS


D.

PGP





A.
  

Central processing unit (CPU)



You are the IT director for a small contracting firm. Your company is considering migrating
to a cloud production environment.
Which service model would best fit your needs if you wanted an option that reduced the
chance of vendor lock-in but also did not require the highest degree of administration by
your own personnel?
Response:


A.

IaaS


B.

PaaS


C.

SaaS


D.

TanstaafL





B.
  

PaaS



Which of the following data protection methodologies maintains the ability to connect back
values to the original values?
Response:


A.

Tokenization


B.

Anonymization


C.

Obfuscation


D.

Dynamic mapping





A.
  

Tokenization



When designing a cloud data center, which of the following aspects is not necessary to
ensure continuity of operations during contingency operations?
Response:


A.

Access to clean water


B.

Broadband data connection


C.

Extended battery backup


D.

Physical access to the data center





C.
  

Extended battery backup




Page 17 out of 52 Pages
Previous