CCSP Exam Questions

Total 512 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Exam Pool A

Who will determine data classifications for the cloud customer?


A.

The cloud provider


B.

NIST


C.

Regulators


D.

The cloud customer





D.
  

The cloud customer



_______ is the most prevalent protocol used in identity federation.


A.

HTTP


B.

SAML


C.

FTP


D.

WS-Federation





B.
  

SAML



Which cloud storage type uses an opaque value or descriptor to categorize and organize
data?
Response:


A.

Volume


B.

Object


C.

Structured


D.

Unstructured





D.
  

Unstructured



What does nonrepudiation mean?
Response:


A.

Prohibiting certain parties from a private conversation


B.

Ensuring that a transaction is completed before saving the results


C.

Ensuring that someone cannot turn off auditing capabilities while performing a function


D.

Preventing any party that participates in a transaction from claiming that it did not





D.
  

Preventing any party that participates in a transaction from claiming that it did not



Which of the following data sanitation methods would be the MOST effective if you needed
to securely remove data as quickly as possible in a cloud environment?
Response:


A.

Zeroing


B.

Cryptographic erasure


C.

Overwriting


D.

Degaussing





B.
  

Cryptographic erasure



Which of the following is the recommended operating range for temperature and
humidity in a data center?
Response:


A.

Between 62 °F - 81 °F and 40% and 65% relative humidity


B.

Between 64 °F - 81 °F and 40% and 60% relative humidity


C.

Between 64 °F - 84 °F and 30% and 60% relative humidity


D.

Between 60 °F - 85 °F and 40% and 60% relative humidity





B.
  

Between 64 °F - 81 °F and 40% and 60% relative humidity



A honeypot should contain _________ data.
Response:


A.

Raw


B.

Production


C.

Useless


D.

Sensitive





C.
  

Useless



When an organization considers cloud migrations, the organization’s software
developers will need to know which _______ and _______ which the organization will
be using, in order to properly and securely create suitable applications.


A.

Geographic location, native language


B.

Legal restrictions, specific ISP


C.

Service model, deployment model


D.

Available bandwidth, telecommunications country code





C.
  

Service model, deployment model



What type of device is often leveraged to assist legacy applications that may not
have the programmatic capability to process assertions from modern web services?


A.

Web application firewall


B.

XML accelerator


C.

Relying party


D.

XML firewall





B.
  

XML accelerator



Which of the following management risks can make an organization’s cloud
environment unviable?
Response:


A.

Insider trading


B.

VM sprawl


C.

Hostile takeover


D.

Improper personnel selection





B.
  

VM sprawl




Page 7 out of 52 Pages
Previous