ISC CCSP Exam
Certified Cloud Security Professional (CCSP) (Page 13 )

Updated On: 9-Feb-2026

Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?

  1. Multitenancy
  2. Certification
  3. Regulation
  4. Virtualization

Answer(s): C

Explanation:

Some regulations may require specific security controls or certifications be used for hosting certain types of data or functions, and in some circumstances they may be requirements that are unable to be met by any cloud provider.



Which of the following is considered an internal redundancy for a data center?

  1. Power distribution units
  2. Network circuits
  3. Power substations
  4. Generators

Answer(s): A

Explanation:

Power distribution units are internal to a data center and supply power to internal components such as racks, appliances, and cooling systems. As such, they are considered an internal redundancy.



Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?

  1. Share
  2. Reservation
  3. Provision
  4. Limit

Answer(s): D

Explanation:

Limits are put in place to enforce a maximum on the amount of memory or processing a cloud customer can use. This can be done either on a virtual machine or as a comprehensive whole for a customer, and is meant to ensure that enormous cloud resources cannot be allocated or consumed by a single host or customer to the detriment of other hosts and customers.



Which of the following roles is responsible for peering with other cloud services and providers?

  1. Cloud auditor
  2. Inter-cloud provider
  3. Cloud service broker
  4. Cloud service developer

Answer(s): B

Explanation:

The inter-cloud provider is responsible for peering with other cloud services and providers, as well as overseeing and managing federations and federated services.



Which of the following does NOT relate to the hiding of sensitive data from data sets?

  1. Obfuscation
  2. Federation
  3. Masking
  4. Anonymization

Answer(s): B

Explanation:

Federation pertains to authenticating systems between different organizations.






Post your Comments and Discuss ISC CCSP exam prep with other Community members:

Join the CCSP Discussion