Which of the following roles involves testing, monitoring, and securing cloud services for an organization?
Answer(s): D
The cloud service administrator is responsible for testing cloud services, monitoring services, administering security for services, providing usage reports on cloud services, and addressing problem reports
What is the only data format permitted with the SOAP API?
The SOAP protocol only supports the XML data format.
Which data formats are most commonly used with the REST API?
Answer(s): C
JavaScript Object Notation (JSON) and Extensible Markup Language (XML) are the most commonly used data formats for the Representational State Transfer (REST) API, and are typically implemented with caching for increased scalability and performance.
Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?
Answer(s): B
It is imperative that an application perform checks when each function or portion of the application is accessed, to ensure that the user is properly authorized to access it. Without continual checks each time a function is accessed, an attacker could forge requests to access portions of the application where authorization has not been granted.
Post your Comments and Discuss ISC CCSP exam with other Community members:
Bini commented on December 02, 2024 I would like to see more questions related to CCSP Anonymous upvote
SSSR commented on October 22, 2024 Great stuff and nicely formatted content. PDF is version is what I highly recommend as it has double the amount of questions. UNITED KINGDOM upvote
MP commented on October 16, 2024 Still Preparing Hopefully these are helpful UNITED STATES upvote
Mohammad commented on September 25, 2024 helpful, but i think it should be updated Anonymous upvote
Manoj commented on September 12, 2024 helpful but some of the answers are debatable. not sure what to accept for exam passing. UNITED STATES upvote