Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSP Exam Dumps - Certified Cloud Security Professional (CCSP)

Go to page:
Question # 73

Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?

A.

Security misconfiguration

B.

Insecure direct object references

C.

Sensitive data exposure

D.

Unvalidated redirects and forwards

Full Access
Question # 74

Which of the following standards primarily pertains to cabling designs and setups in a data center?

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

Full Access
Question # 75

Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?

A.

SP 800-153

B.

SP 800-145

C.

SP 800-53

D.

SP 800-40

Full Access
Question # 76

Within an Infrastructure as a Service model, which of the following would NOT be a measured service?

A.

CPU

B.

Storage

C.

Number of users

D.

Memory

Full Access
Question # 77

Which data formats are most commonly used with the REST API?

A.

JSON and SAML

B.

XML and SAML

C.

XML and JSON

D.

SAML and HTML

Full Access
Question # 78

Which protocol does the REST API depend on?

A.

HTTP

B.

XML

C.

SAML

D.

SSH

Full Access
Question # 79

Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?

A.

Storage

B.

Application

C.

Mamory

D.

CPU

Full Access
Question # 80

What is the only data format permitted with the SOAP API?

A.

HTML

B.

SAML

C.

XSML

D.

XML

Full Access
Go to page: