ISC CCSP Certified Cloud Security Professional (CCSP) Online Training
ISC CCSP Online Training
The questions for CCSP were last updated at Jul 24,2025.
- Exam Code: CCSP
- Exam Name: Certified Cloud Security Professional (CCSP)
- Certification Provider: ISC
- Latest update: Jul 24,2025
Which of the following would NOT be a reason to activate a BCDR strategy?
- A . Staffing loss
- B . Terrorism attack
- C . Utility disruptions
- D . Natural disaster
Which of the cloud cross-cutting aspects relates to the oversight of processes and systems, as well as to ensuring their compliance with specific policies and regulations?
- A . Governance
- B . Regulatory requirements
- C . Service-level agreements
- D . Auditability
Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?
- A . Availability
- B . Interoperability
- C . Reversibility
- D . Portability
Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?
- A . Delete
- B . Modify
- C . Read
- D . Print
What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?
- A . Anonymization
- B . Tokenization
- C . Masking
- D . Obfuscation
What type of security threat is DNSSEC designed to prevent?
- A . Account hijacking
- B . Snooping
- C . Spoofing
- D . Injection
Which European Union directive pertains to personal data privacy and an individual’s control over their personal data?
- A . 99/9/EC
- B . 95/46/EC
- C . 2000/1/EC
- D . 2013/27001/EC
Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?
- A . regulatory requirements
- B . Auditability
- C . Service-level agreements
- D . Governance
Which data point that auditors always desire is very difficult to provide within a cloud environment?
- A . Access policy
- B . Systems architecture
- C . Baselines
- D . Privacy statement
What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?
- A . Proxy
- B . Bastion
- C . Honeypot
- D . WAF