CCSP
Q: 1
Where is a DLP solution generally installed when utilized for monitoring data at rest?
Options
Q: 2
What is a standard configuration and policy set that is applied to systems and virtual machines
called?
Options
Q: 3
Gathering business requirements can aid the organization in determining all of this information
about organizational assets, except:
Options
Q: 4
A global logistics company is managing its cloud infrastructure and needs to secure both local and
remote access to its systems. Which access control measure would provide the highest level of security
for remote administrative access to cloud servers?
203/315
Options
Q: 5
Tokenization requires two distinct ________
Options
Q: 6
A financial services firm has detected a security vulnerability in a cloud-based application provided by an
external vendor. To manage communication with the vendor effectively, which of the following actions
should the Incident Response Team take first?
Options
Q: 7
A healthcare organization needs to share patient data with a research institution for a study. The
organization must ensure that the shared data does not reveal any personally identifiable information
(PII) while still allowing the research institution to conduct meaningful analysis. Which data obfuscation
technique should the healthcare organization implement to meet this requirement?
Options
Q: 8
82/315
Which of the following threat types involves an application that does not validate authorization for
portions of itself beyond when the user first enters it?
Options
Q: 9
The baseline should cover which of the following?
Options
Q: 10
A multinational corporation is planning to migrate its entire IT infrastructure to a cloud environment. The
company has several business-critical applications that require high availability, scalability, and robust
security measures. They need to ensure that the cloud infrastructure components selected can support
these requirements effectively. Which of the following cloud infrastructure components is most critical for
ensuring high availability, scalability, and robust security for the company’s business-critical
applications?
Options
Question 1 of 10