Certified Cloud Security Professional (CCSP) Quiz Questions and Answers

In which of the following situations does the data owner have to administer the OS?

Answer :
  • IaaS

Which of the following sanitization methods is feasible for use in the cloud?

Answer :
  • Crypto-shredding

Data dispersion is a cloud data security technique that is most similar to which legacy implementation?

Answer :
  • Redundant Array of Inexpensive Disks (RAID)

DLP solutions may use all the following techniques to identify sensitive data except...

Answer :
  • Inference

Data dispersion is a cloud data security technique that is most similar to which legacy implementation?

Answer :
  • Redundant Array of Inexpensive Disks (RAID

Egress monitoring solutions usually include a function that …...............

Answer :
  • Discovers data assets according to classification/categorization

According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?

Answer :
  • Store

According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes immediately before the Share phase?

Answer :
  • Use

Which of the following should occur during the final phase of the Cloud Secure Data Life Cycle?

Answer :
  • Crypto-shredding

What is a form of cloud data protection where data is spread across multiple storage devices/locations, similar to RAID in the legacy environment?

Answer :
  • Data dispersion