Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSP Exam Dumps - Certified Cloud Security Professional (CCSP)

Go to page:
Question # 9

Which of the following storage types is most closely associated with a database-type storage implementation?

A.

Object

B.

Unstructured

C.

Volume

D.

Structured

Full Access
Question # 10

What is the intellectual property protection for a confidential recipe for muffins?

A.

Patent

B.

Trademark

C.

Trade secret

D.

Copyright

Full Access
Question # 11

Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?

A.

Segregated from host systems

B.

Network access

C.

Scalability

D.

External to system patching

Full Access
Question # 12

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?

A.

Memory

B.

Number of users

C.

Storage

D.

CPU

Full Access
Question # 13

The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.

What does the management plane typically leverage for this orchestration?

A.

APIs

B.

Scripts

C.

TLS

D.

XML

Full Access
Question # 14

An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?

A.

Network

B.

Users

C.

Memory

D.

CPU

Full Access
Question # 15

Database activity monitoring (DAM) can be:

A.

Host-based or network-based

B.

Server-based or client-based

C.

Used in the place of encryption

D.

Used in place of data masking

Full Access
Question # 16

When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.

Which of the following is NOT one of the three main approaches to data discovery?

A.

Content analysis

B.

Hashing

C.

Labels

D.

Metadata

Full Access
Go to page: