ISC CCSP Exam
Certified Cloud Security Professional (CCSP) (Page 5 )

Updated On: 7-Feb-2026

Which of the following standards primarily pertains to cabling designs and setups in a data center?

  1. IDCA
  2. BICSI
  3. NFPA
  4. Uptime Institute

Answer(s): B

Explanation:

The standards put out by Building Industry Consulting Service International (BICSI) primarily cover complex cabling designs and setups for data centers, but also include specifications on power, energy efficiency, and hot/cold aisle setups.



Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?

  1. IDCA
  2. Uptime Institute
  3. NFPA
  4. BICSI

Answer(s): B

Explanation:

The Uptime Institute publishes the most commonly used and widely known standard on data center tiers and topologies. It is based on a series of four tiers, with each progressive increase in number representing more stringent, reliable, and redundant systems for security, connectivity, fault tolerance, redundancy, and cooling.



What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?

  1. Virtual
  2. Security
  3. Physical
  4. Logical

Answer(s): D

Explanation:

Cloud environments lack the ability to physically separate resources like a traditional data center can. To compensate, cloud computing logical segregation concepts are employed. These include VLANs, sandboxing, and the use of virtual network devices such as firewalls.



Which United States law is focused on data related to health records and privacy?

  1. Safe Harbor
  2. SOX
  3. GLBA
  4. HIPAA

Answer(s): D

Explanation:

The Health Insurance Portability and Accountability Act (HIPAA) requires the U.S. Federal Department of Health and Human Services to publish and enforce regulations pertaining to electronic health records and identifiers between patients, providers, and insurance companies. It is focused on the security controls and confidentiality of medical records, rather than the specific technologies used, so long as they meet the requirements of the regulations.



What is used for local, physical access to hardware within a data center?

  1. SSH
  2. KVM
  3. VPN
  4. RDP

Answer(s): B

Explanation:

Local, physical access in a data center is done via KVM (keyboard, video, mouse) switches.



Viewing page 5 of 104
Viewing questions 21 - 25 out of 512 questions



Post your Comments and Discuss ISC CCSP exam prep with other Community members:

Join the CCSP Discussion