C or A? Modifying metadata (A) doesn't actually make new data, just changes its details. Importing and constructing definitely count as creation in most lifecycle models. Pretty sure A is right but these terms sometimes get used loosely. Someone else see it differently?
Q: 11
As the Cloud Security Officer for a financial institution, you are required to conduct a Privacy Impact
Assessment (PIA) for a new cloud-based application that will handle sensitive customer data. The PIA is
a critical step in your organization's compliance process. What is the primary purpose of conducting a
Privacy Impact Assessment (PIA)?
Options
Discussion
Option A makes sense here. Modifying metadata doesn’t impact the actual data content, just its properties, so that isn’t really part of the "create" phase. B is a common distractor but importing is considered creation for cloud data. Agree?
Not B, it's actually A. Modifying metadata can be a trap since it changes properties not the actual data itself.
Nicely worded question, A is right.
Be respectful. No spam.
Q: 12
You are designing a cloud architecture for a multinational company that requires high availability and
fault tolerance. The company has a distributed team across different regions and needs to ensure
minimal latency and high performance. Which of the following cloud computing concepts would best
address these requirements?
Options
Discussion
Wish vendors would just standardize this, but I've always seen it as A. Once year.
A is correct. Monthly and every six months are overkill for most orgs, budget-based isn’t best practice. Seen similar Qs in other certs, annual’s the baseline. Let me know if you think otherwise.
Option C. Every six months
A imo, annual BCDR plan testing pops up a lot in practice tests and exam reports too.
Be respectful. No spam.
Q: 13
Which cloud deployment model would be ideal for a group of universities looking to work together,
where each university can gain benefits according to its specific needs?
Options
Discussion
D. This was in my CCSP practice questions, VLANs are the go-to for tenant isolation in multi-tenant setups. Confident here.
I don't think it's C, a lot of people fall for the shared storage trap. Without some kind of access control, that's just asking for data leakage. D is the solid move here, VLANs give each tenant strict network isolation. Open to pushback but pretty sure on this one.
Probably D makes sense, VLANs give each tenant their own logical network so their traffic stays separated. This is textbook tenant isolation at layer 2. The other options don’t really control access at all. Pretty sure about this but open if someone thinks otherwise.
Actually, it flips if regulatory compliance requires physical segmentation, but here D is still right in most enterprise scenarios.
D
Be respectful. No spam.
Q: 14
222/315
After a recent vulnerability scan, your organization discovered several high-risk vulnerabilities across its
cloud infrastructure. As the Cloud Security Professional, you need to prioritize these vulnerabilities and
plan remediation efforts accordingly. Which factor is most important to consider when prioritizing
vulnerabilities for remediation?
Options
Discussion
Maybe C. SOWs usually detail the actual tasks and deliverables, so I figured if you want specific requirements called out, that's where they'd land. Pretty sure the SLA covers metrics too though, so not 100% on this.
Not sure it's A. SOW (C) often spells out project details, including some requirements, so couldn't that cover availability and performance too? I see SLA is a trap if the question's really about contract deliverables.
Option A, Seen similar in exam reports, SLA is the doc that locks in those service levels for availability and performance.
Be respectful. No spam.
Q: 15
An e-commerce company is planning to migrate its services to a cloud environment. The risk
management team needs to assess the potential risks associated with the new cloud infrastructure,
including those related to the chosen cloud service provider (CSP), the underlying infrastructure, and the
business operations. Which factor is most critical to assess in order to understand the potential risks
associated with migrating to a cloud service provider?
Options
Discussion
encountered exactly similar question in my exam, in an exam report and picked C.
Probably B. Type 1 runs right on the hardware, so way less attack surface compared to Type 2 since it doesn't rely on a full OS underneath. Type 2 is more exposed because if the host OS is compromised, so are the VMs. Seen similar wording in a practice exam. Anyone see it different?
Be respectful. No spam.
Q: 16
Your company is moving its critical business applications to a public cloud platform. As part of the security design, you need to implement controls that ensure only authorized personnel can access sensitive resources within the cloud environment. Which of the following approaches is most effective for ensuring that users are properly authorized to access sensitive resources in the cloud?
Options
Discussion
C here, since PaaS helps reduce vendor lock-in by supporting standard APIs so you can move between providers more easily. The other options like manual scaling or single language aren't defining characteristics. Pretty sure that's what ISC2 is getting at.
C imo, reducing vendor lock-in is one of the big reasons organizations pick PaaS. You write to standard APIs so you can move providers easier if needed. Saw this type of question in some official practice test material too.
Looks like it's not D, B makes more sense here but I'm picking D anyway since manual scaling is usually available through PaaS dashboards. Just not the main selling point, right? Correct me if I missed something.
Call it D. Manual scaling sounds more like a PaaS feature to me.
Be respectful. No spam.
Q: 17
In response to a data breach in their cloud services, a tech company needs to ensure proper acquisition
and preservation of digital evidence for a forensic investigation. Which of the following steps should be
taken first?
Options
Discussion
Option D is right. Controls like classification and labeling are set up when data is created, not later. That’s the earliest chance to actually secure it. Pretty sure that’s what ISC2 wants here, but open to other views.
D
Be respectful. No spam.
Q: 18
Where is an XML firewall most commonly and effectively deployed in the environment?
Options
Discussion
C
Automated patch management is way better for big companies, especially when you're dealing with cloud and lots of endpoints. Manual updates (A) or relying on users (B) just isn't scalable or reliable. Automation helps keep everything current and reduces human errors. Pretty sure this is what most orgs go with for cloud security. Agree?
Automated patch management is way better for big companies, especially when you're dealing with cloud and lots of endpoints. Manual updates (A) or relying on users (B) just isn't scalable or reliable. Automation helps keep everything current and reduces human errors. Pretty sure this is what most orgs go with for cloud security. Agree?
C for sure. With cloud and global scale, only automated patching can keep up with zero days and reduce risk quickly. Manual or user-driven patching (A/B) just isn’t fast or reliable enough. Pretty standard practice now, but open to other takes.
Be respectful. No spam.
Q: 19
Which of the following is considered an internal redundancy for a data center?
Options
Discussion
B . NIST language calls it "measured service" specifically, even if "metered" seems close. Seen this on other real exam threads.
Option D makes sense to me since "metered service" sounds like paying by use. Saw this phrasing a few times in practice exams too. Official guide or the glossary section should clarify which term is standard. Agree?
Probably B here-NIST's definition for this is definitely "measured service" not "metered." Seen this exact wording pop up in official guides. If they want the textbook term, B is the right call.
B or D? I remember NIST specifically calls it "measured service" but sometimes "metered" gets used interchangeably in other cloud docs. If they're asking for the official definition, pretty sure it's B, but if they want common phrasing, D could trip you up.
Be respectful. No spam.
Q: 20
You are designing the logical layout of a secure data center for a large enterprise that uses a multi-
tenant architecture. Your objective is to ensure strict tenant partitioning and robust access control to
prevent unauthorized access and data leakage between tenants. Which of the following measures would
be most effective in ensuring tenant partitioning and access control in a multi-tenant environment?
Options
Discussion
Nah, C is more about access control but here they want to stop data exfiltration. D.
D , this lines up with what I've seen on similar exam questions-network DLP is all about monitoring and stopping sensitive info from leaking out, not just limiting access. Saw a few like this in practice sets.
I think C
Question's clear and the scenario makes sense, pretty similar to what I've seen in some practice sets.
Question's clear and the scenario makes sense, pretty similar to what I've seen in some practice sets.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2