Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSP Exam Dumps - Certified Cloud Security Professional (CCSP)

Go to page:
Question # 49

Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.

What term pertains to the application of scientific norms and protocols to digital investigations?

A.

Scientific

B.

Investigative

C.

Methodological

D.

Forensics

Full Access
Question # 50

Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

A.

Regulation

B.

Multitenancy

C.

Virtualization

D.

Resource pooling

Full Access
Question # 51

With a federated identity system, where would a user perform their authentication when requesting services or application access?

A.

Cloud provider

B.

The application

C.

Their home organization

D.

Third-party authentication system

Full Access
Question # 52

In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?

A.

Demagnetizing

B.

Shredding

C.

Degaussing

D.

Cryptographic erasure

Full Access
Question # 53

Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?

A.

Hardening

B.

Leveling

C.

Baselines

D.

Standards

Full Access
Question # 54

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

A.

Archive

B.

Share

C.

Store

D.

Destroy

Full Access
Question # 55

Where is an XML firewall most commonly and effectively deployed in the environment?

A.

Between the application and data layers

B.

Between the presentation and application layers

C.

Between the IPS and firewall

D.

Between the firewall and application server

Full Access
Question # 56

Which of the following aspects of security is solely the responsibility of the cloud provider?

A.

Regulatory compliance

B.

Physical security

C.

Operating system auditing

D.

Personal security of developers

Full Access
Go to page: