Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
International Information Systems Security (ISC)
Exam 2: Certified Cloud Security Professional (CCSP)
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 121
Multiple Choice
Which of the cloud cross-cutting aspects relates to the requirements placed on the cloud provider by the cloud customer for minimum performance standards and requirements that must be met?
Question 122
Multiple Choice
Where is a DLP solution generally installed when utilized for monitoring data in transit?
Question 123
Multiple Choice
Which of the following provides assurance, to a predetermined acceptable level of certainty, that an entity is indeed who they claim to be?
Question 124
Multiple Choice
Which of the following areas of responsibility always falls completely under the purview of the cloud provider, regardless of which cloud service category is used?
Question 125
Multiple Choice
Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?
Question 126
Multiple Choice
Identity and access management (IAM) is a security discipline that ensures which of the following?
Question 127
Multiple Choice
Which of the following cloud aspects complicates eDiscovery?
Question 128
Multiple Choice
Which of the following is considered a technological control?
Question 129
Multiple Choice
Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?
Question 130
Multiple Choice
What is the term we use to describe the general ease and efficiency of moving data from one cloud provider either to another cloud provider or down from the cloud?
Question 131
Multiple Choice
What is the Cloud Security Alliance Cloud Controls Matrix (CCM) ?
Question 132
Multiple Choice
What is used for local, physical access to hardware within a data center?
Question 133
Multiple Choice
What process entails taking sensitive data and removing the indirect identifiers from each data object so that the identification of a single entity would not be possible?
Question 134
Multiple Choice
Tokenization requires two distinct _________________ .
Question 135
Multiple Choice
The various models generally available for cloud BC/DR activities include all of the following except:
Question 136
Multiple Choice
Which of the following is a valid risk management metric?
Question 137
Multiple Choice
The most pragmatic option for data disposal in the cloud is which of the following?
Question 138
Multiple Choice
Data centers have enormous power resources that are distributed and consumed throughout the entire facility. Which of the following standards pertains to the proper fire safety standards within that scope?