ISC CCSP Certified Cloud Security Professional (CCSP) Online Training
ISC CCSP Online Training
The questions for CCSP were last updated at Jul 23,2025.
- Exam Code: CCSP
- Exam Name: Certified Cloud Security Professional (CCSP)
- Certification Provider: ISC
- Latest update: Jul 23,2025
What process is used within a clustered system to provide high availability and load balancing?
- A . Dynamic balancing
- B . Dynamic clustering
- C . Dynamic optimization
- D . Dynamic resource scheduling
Which of the following is NOT a function performed by the handshake protocol of TLS?
- A . Key exchange
- B . Encryption
- C . Negotiation of connection
- D . Establish session ID
Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time.
What is the minimum span of time for a SOC Type 2 report?
- A . Six months
- B . One month
- C . One year
- D . One week
What changes are necessary to application code in order to implement DNSSEC?
- A . Adding encryption modules
- B . Implementing certificate validations
- C . Additional DNS lookups
- D . No changes are needed.
Which type of controls are the SOC Type 1 reports specifically focused on?
- A . Integrity
- B . PII
- C . Financial
- D . Privacy
Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?
- A . Integrity
- B . Availability
- C . Confidentiality
- D . Nonrepudiation
Which of the following is NOT a domain of the Cloud Controls Matrix (CCM)?
- A . Data center security
- B . Human resources
- C . Mobile security
- D . Budgetary and cost controls
Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?
- A . Sandboxing
- B . Encryption
- C . Firewalls
- D . Access control
Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?
- A . Platform
- B . Data
- C . Physical environment
- D . Infrastructure
Which of the following is NOT a factor that is part of a firewall configuration?
- A . Encryption
- B . Port
- C . Protocol
- D . Source IP