Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSP Exam Dumps - Certified Cloud Security Professional (CCSP)

Go to page:
Question # 17

Which of the following is considered a technological control?

A.

Firewall software

B.

Firing personnel

C.

Fireproof safe

D.

Fire extinguisher

Full Access
Question # 18

Which of the following are distinguishing characteristics of a managed service provider?

A.

Be able to remotely monitor and manage objects for the customer and proactively maintain these objects under management.

B.

Have some form of a help desk but no NOC.

C.

Be able to remotely monitor and manage objects for the customer and reactively maintain these objects under management.

D.

Have some form of a NOC but no help desk.

Full Access
Question # 19

What is the Cloud Security Alliance Cloud Controls Matrix (CCM)?

A.

A set of software development life cycle requirements for cloud service providers

B.

An inventory of cloud services security controls that are arranged into a hierarchy of security domains

C.

An inventory of cloud service security controls that are arranged into separate security domains

D.

A set of regulatory requirements for cloud service providers

Full Access
Question # 20

Which of the following terms is not associated with cloud forensics?

A.

eDiscovery

B.

Chain of custody

C.

Analysis

D.

Plausibility

Full Access
Question # 21

What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?

A.

Dynamic clustering

B.

Dynamic balancing

C.

Dynamic resource scheduling

D.

Dynamic optimization

Full Access
Question # 22

Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?

A.

Community

B.

Hybrid

C.

Private

D.

Public

Full Access
Question # 23

Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?

A.

Functionality

B.

Programming languages

C.

Software platform

D.

Security requirements

Full Access
Question # 24

Which of the following is NOT something that an HIDS will monitor?

A.

Configurations

B.

User logins

C.

Critical system files

D.

Network traffic

Full Access
Go to page: