Certified Cloud Security Professional (CCSP) Quiz Questions and Answers

Who pays for the Common Criteria certification of an IT product?

Answer :
  • The vendor/manufacturer

Which of the following sanitization methods is feasible for use in the cloud?

Answer :
  • Crypto-shredding

In which of the following situations does the data owner have to administer the OS?

Answer :
  • IaaS

DLP solutions may use all the following techniques to identify sensitive data except...

Answer :
  • Inference

Data dispersion is a cloud data security technique that is most similar to which legacy implementation?

Answer :
  • Redundant Array of Inexpensive Disks (RAID

According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?

Answer :
  • Store

According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes immediately before the Share phase?

Answer :
  • Use

Which of the following should occur during the final phase of the Cloud Secure Data Life Cycle?

Answer :
  • Crypto-shredding

What is a form of cloud data protection where data is spread across multiple storage devices/locations, similar to RAID in the legacy environment?

Answer :
  • Data dispersion

Which of the following will DLP solutions most likely not inspect?

Answer :
  • VoIP conversations