CCSP Which aspect of cloud computing will be most negatively impacted by vendor lock-in?
#31
Answer: D✅ Correct❌ Incorrect
CCSP Which of the following APIs are most commonly used within a cloud environment?
#32
Answer: B✅ Correct❌ Incorrect
CCSP Which of the following attempts to establish an international standard for eDiscovery processes and best practices?
#33
Answer: B✅ Correct❌ Incorrect
CCSP Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?
#34
Answer: B✅ Correct❌ Incorrect
CCSP Which term relates to the application of scientific methods and practices to evidence?
#35
Answer: A✅ Correct❌ Incorrect
CCSP Which of the following roles involves the provisioning and delivery of cloud services?
#36
Answer: C✅ Correct❌ Incorrect
CCSP What is the primary reason that makes resolving jurisdictional conflicts complicated?
#37
Answer: D✅ Correct❌ Incorrect
CCSP GAAPs are created and maintained by which organization?
#38
Answer: B✅ Correct❌ Incorrect
CCSP Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?
#39
Answer: C✅ Correct❌ Incorrect
CCSP Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
#40
Answer: B✅ Correct❌ Incorrect
CCSP Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?
#41
Answer: B✅ Correct❌ Incorrect
CCSP Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
#42
Answer: A✅ Correct❌ Incorrect
CCSP Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
#43
Answer: A✅ Correct❌ Incorrect
CCSP Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and AirConditioning Engineers (ASHRAE)?
#44
Answer: B✅ Correct❌ Incorrect
CCSP Which of the following is not a risk management framework?
#45
Answer: B✅ Correct❌ Incorrect
CCSP Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?
#46
Answer: B✅ Correct❌ Incorrect
CCSP How is an object stored within an object storage system?
#47
Answer: A✅ Correct❌ Incorrect
CCSP Which of the following is NOT a regulatory system from the United States federal government?
#48
Answer: A✅ Correct❌ Incorrect
CCSP Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?
#49
Answer: D✅ Correct❌ Incorrect
CCSP Which United States law is focused on PII as it relates to the financial industry?
#50
Answer: D✅ Correct❌ Incorrect
CCSP Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?
#51
Answer: C✅ Correct❌ Incorrect
CCSP What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?
#52
Answer: A✅ Correct❌ Incorrect
CCSP Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?
#53
Answer: A✅ Correct❌ Incorrect
CCSP What are the two protocols that TLS uses?
#54
Answer: A✅ Correct❌ Incorrect
CCSP Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
#55
Answer: C✅ Correct❌ Incorrect
CCSP Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?
#56
Answer: C✅ Correct❌ Incorrect
CCSP Which of the following is considered an internal redundancy for a data center?
#57
Answer: A✅ Correct❌ Incorrect
CCSP Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?
#58
Answer: D✅ Correct❌ Incorrect
CCSP Which of the following roles is responsible for peering with other cloud services and providers?
#59
Answer: B✅ Correct❌ Incorrect
CCSP Which of the following does NOT relate to the hiding of sensitive data from data sets?