ISC CCSP Certified Cloud Security Professional (CCSP) Online Training
ISC CCSP Online Training
The questions for CCSP were last updated at Jul 19,2025.
- Exam Code: CCSP
- Exam Name: Certified Cloud Security Professional (CCSP)
- Certification Provider: ISC
- Latest update: Jul 19,2025
If you’re using iSCSI in a cloud environment, what must come from an external protocol or application?
- A . Kerberos support
- B . CHAP support
- C . Authentication
- D . Encryption
Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?
- A . IDCA
- B . NFPA
- C . BICSI
- D . Uptime Institute
What does the REST API support that SOAP does NOT support?
- A . Caching
- B . Encryption
- C . Acceleration
- D . Redundancy
Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?
- A . A Type 1 hypervisor also controls patching of its hosted virtual machines ensure they are always secure.
- B . A Type 1 hypervisor is tied directly to the bare metal and only runs with code necessary to perform its specific mission.
- C . A Type 1 hypervisor performs hardware-level encryption for tighter security and efficiency.
- D . A Type 1 hypervisor only hosts virtual machines with the same operating systems as the hypervisor.
Which of the following are the storage types associated with PaaS?
- A . Structured and freeform
- B . Volume and object
- C . Structured and unstructured
- D . Database and file system
Which of the following threat types can occur when baselines are not appropriately applied or unauthorized changes are made?
- A . Insecure direct object references
- B . Unvalidated redirects and forwards
- C . Security misconfiguration
- D . Sensitive data exposure
What is the data encapsulation used with the SOAP protocol referred to?
- A . Packet
- B . Envelope
- C . Payload
- D . Object
Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
- A . Unvalidated redirects and forwards
- B . Insecure direct object references
- C . Security miscomfiguration
- D . Sensitive data exposure
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
- A . SP 800-153
- B . SP 800-145
- C . SP 800-53
- D . SP 800-40
What is the biggest negative to leasing space in a data center versus building or maintain your own?
- A . Costs
- B . Control
- C . Certification
- D . Regulation