Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSP Exam Dumps - Certified Cloud Security Professional (CCSP)

Go to page:
Question # 65

Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?

A.

PLAN

B.

WAN

C.

LAN

D.

VLAN

Full Access
Question # 66

Which of the following is not a component of contractual PII?

A.

Scope of processing

B.

Value of data

C.

Location of data

D.

Use of subcontractors

Full Access
Question # 67

Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?

A.

Sensitive data exposure

B.

Security misconfiguration

C.

Insecure direct object references

D.

Unvalidated redirect and forwards

Full Access
Question # 68

From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?

A.

Notification

B.

Key identification

C.

Data collection

D.

Virtual image snapshots

Full Access
Question # 69

Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?

A.

A Type 2 hypervisor runs on top of another operating system and is dependent on the security of the OS for its own security.

B.

A Type 2 hypervisor allows users to directly perform some functions with their own access.

C.

A Type 2 hypervisor is open source, so attackers can more easily find exploitable vulnerabilities with that access.

D.

A Type 2 hypervisor is always exposed to the public Internet for federated identity access.

Full Access
Question # 70

Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?

A.

European Union

B.

Germany

C.

Russia

D.

United States

Full Access
Question # 71

Which United States law is focused on data related to health records and privacy?

A.

Safe Harbor

B.

SOX

C.

GLBA

D.

HIPAA

Full Access
Question # 72

Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?

A.

SAS-70

B.

SOC 2

C.

SOC 1

D.

SOX

Full Access
Go to page: