ISC CCSP Exam
Certified Cloud Security Professional (CCSP) (Page 4 )

Updated On: 7-Feb-2026

Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?

  1. Cryptographic erasure
  2. Zeroing
  3. Overwriting
  4. Deletion

Answer(s): D

Explanation:

Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.



Which of the following cloud aspects complicates eDiscovery?

  1. Resource pooling
  2. On-demand self-service
  3. Multitenancy
  4. Measured service

Answer(s): C

Explanation:

With multitenancy, eDiscovery becomes more complicated because the data collection involves extra steps to ensure that only those customers or systems that are within scope are turned over to the requesting authority.



What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?

  1. Scripts
  2. RDP
  3. APIs
  4. XML

Answer(s): C

Explanation:

The functions of the management plane are typically exposed as a series of remote calls and function executions and as a set of APIs. These APIs are typically leveraged through either a client or a web portal, with the latter being the most common.



What is a serious complication an organization faces from the perspective of compliance with international operations?

  1. Different certifications
  2. Multiple jurisdictions
  3. Different capabilities
  4. Different operational procedures

Answer(s): B

Explanation:

When operating within a global framework, a security professional runs into a multitude of jurisdictions and requirements, and many times they might be in contention with one other or not clearly applicable. These requirements can include the location of the users and the type of data they enter into systems, the laws governing the organization that owns the application and any regulatory requirements they may have, as well as the appropriate laws and regulations for the jurisdiction housing the IT resources and where the data is actually stored, which might be multiple jurisdictions as well.



Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?

  1. PLAN
  2. WAN
  3. LAN
  4. VLAN

Answer(s): D

Explanation:

A virtual area network (VLAN) allows the logical separation and isolation of networks and IP spaces to provide enhanced security and controls.



Viewing page 4 of 104
Viewing questions 16 - 20 out of 512 questions



Post your Comments and Discuss ISC CCSP exam prep with other Community members:

Join the CCSP Discussion