Create Quiz

CCSP Certified Cloud Security Professional Quiz

CCSP Certified Cloud Security Professional Quiz

CCSP Certified Cloud Security Professional Quiz Test

You can mute/unmute sounds from here

You May Get Result Of CCSP Certified Cloud Security Professional Quiz

Fail
B
A
A+
POST YOUR ANSWER (READ ANSWERS)

Quiz Questions And Answers

What are the four cloud deployment models?

Public, Private, Hybrid and Community
Public, Private, Joint and Community
Public, Internal, Hybrid and Community
External, Private, Hybrid and Community

Which of the following are data storage types used with a Platform as a Service solution?

Unstructured and Ephemeral
Structured and Unstructured
Tabular and Object
Raw and Block

When using transparent encryption of a database, where does the encryption engine reside?

Within the database
On the instance(s) attached to the volume
In a Key Management System
At the application using the database

What is the key issue associated with the Object Storage type that the CSP has to be aware of?

Continuous Monitoring
Data consistency is achieved only after change propagation to all replica instances has taken place.
Access Control
Data consistency is achieved only after change propagation to a specified percentage of replica instances has taken plac

What does an audit scope statement provide to a cloud service customer or organization?

The credentials of the auditors, as well as the projected cost for the audit.
The required level of information for the client or organization subject to the audit to fully understand (and agree)
A list of all of the security controls to be audited.
The outcome of the audit, as well as a listing of any findings that need to be addressed.

What is the key benefit provided to a customer when using Infrastructure as a Service (IaaS) solution?

Ability to scale up infrastructure services on the basis of projected usage
Transfer in the cost of ownership
Usage is measured and priced on basis of consumed units
Efficiency of cooling system and increased energy

Which of these are the four cloud deployment models?

Public, Private, Joint, Community
Public Private, Hybrid, Community
External, Private, Hybrid, Community
Public, Internal, Hybrid, Community

Which of the following are the six components of the STRIDE Threat Model?

Spoofing, Repudiation, Tampering, Information Disclosure, Social Engineering and Denial of Service
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
Tampering, Spoofing, Non-Repudiation, Denial of Service, Information Disclosure and Elevation of Privilege
Spoofing, Tampering, Information Disclosure, Repudiation, Distributed Denial of Service, Elevation of Privilege

Who is the Relying Party in a federated environment, and what do they do?

The Customer. They consume tokens generated by the Identity Provider.
The Service Provider. They consume tokens generated by the customer.
The Identity Provider. They consume tokens generated by the service provider.
The Service Provider. They consume tokens generated by the Identity Provider.

Which of these are data storage types that can be used with Platform as a Service?

Unstructured and Ephemeral
Tabular and Object
Structured and Unstructured
Raw and Block
ANSWERS

Currently, we have no comments. Be first to comment on this quiz.

CCSP Certified Cloud Security Professional Quiz : Test Trivia

Ultimate impossible accurate personality honest Quiz Game

How do you rate this quiz?

Average rating 4.8 / 5. Vote: 5
Embed This Quiz
Copy the code below to embed this quiz