Ten questions on the content of the Certified Cloud Security Professional (CCSP) exam.

  1. What are the fundamental characteristics of cloud computing according to the NIST definition? a) Broad network access, rapid elasticity, on-demand self-service, measured service, resource pooling b) Broad network access, rapid elasticity, on-demand self-service, free service, resource pooling c) Broad network access, rapid elasticity, on-request self-service, measured service, resource pooling d) Broad network access, rapid elasticity, off-demand self-service, measured service, resource pooling
  2. Which of the following best defines the shared responsibility model in cloud computing? a) Cloud service provider is solely responsible for all security aspects b) Client is solely responsible for all security aspects c) Security responsibility is divided between the client and the cloud service provider d) Both the cloud service provider and the client are jointly responsible for all security aspects
  3. Which of the following is the PRIMARY purpose of encryption in cloud computing? a) To increase storage space b) To reduce processing power c) To ensure data privacy and integrity d) To facilitate data deletion
  4. What is the primary reason for an organization to perform a cloud-specific risk assessment before migrating to the cloud? a) To identify and evaluate potential costs b) To choose the best cloud service provider c) To understand and mitigate potential security risks d) To determine the needed internet bandwidth
  5. Which cloud deployment model involves resources exclusively maintained for a single organization? a) Public Cloud b) Private Cloud c) Hybrid Cloud d) Community Cloud
  6. In which of the following Service Models is the customer responsible for managing both Applications and Data? a) Infrastructure as a Service (IaaS) b) Platform as a Service (PaaS) c) Software as a Service (SaaS) d) Function as a Service (FaaS)
  7. Which cloud security control can prevent a cloud user from bypassing audit controls? a) Management plane controls b) User access controls c) Network security controls d) Data encryption controls
  8. When implementing identity and access management in a cloud environment, which principle helps limit the impact of a potential breach? a) Principle of least privilege b) Principle of maximum privilege c) Principle of shared accounts d) Principle of anonymous access
  9. What is the main purpose of using Cloud Access Security Broker (CASB) in cloud security? a) It allows the cloud user to bypass the CSP’s security b) It provides visibility into cloud usage and enforces security policies c) It enables a faster connection to the cloud services d) It allows multiple users to share a single cloud account
  10. What is data remanence in the context of cloud security? a) The persistent existence of data after it has been deleted b) The duplication of data in multiple locations c) The sharing of data between different cloud providers d) The recovery of data after a system crash

Leave a comment

Your email address will not be published. Required fields are marked *