Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSP Exam Dumps - Certified Cloud Security Professional (CCSP)

Go to page:
Question # 41

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?

A.

Applications

B.

Key performance indicators (KPIs)

C.

Services

D.

Security

Full Access
Question # 42

What type of security threat is DNSSEC designed to prevent?

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Injection

Full Access
Question # 43

Which of the following service capabilities gives the cloud customer an established and maintained framework to deploy code and applications?

A.

Software

B.

Desktop

C.

Platform

D.

Infrastructure

Full Access
Question # 44

What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?

A.

Anonymization

B.

Tokenization

C.

Masking

D.

Obfuscation

Full Access
Question # 45

Where is a DLP solution generally installed when utilized for monitoring data at rest?

A.

Network firewall

B.

Host system

C.

Application server

D.

Database server

Full Access
Question # 46

Which cloud deployment model would be ideal for a group of universities looking to work together, where each university can gain benefits according to its specific needs?

A.

Private

B.

Public

C.

Hybrid

D.

Community

Full Access
Question # 47

Within a federated identity system, which of the following would you be MOST likely to use for sending information for consumption by a relying party?

A.

XML

B.

HTML

C.

WS-Federation

D.

SAML

Full Access
Question # 48

In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?

A.

Limit

B.

Cap

C.

Throttle

D.

Reservation

Full Access
Go to page: