Skip survey header

Certified Cloud Security Professional (CCSP) Practice Quiz 3

Certified Cloud Security Professional (CCSP) Practice Quiz 3

1. All of the following are usually nonfunctional requirements except ___________________.
2. Alice and Bob want to use the Internet to communicate privately. They each have their own asymmetric key pairs and want to use them to create temporary symmetric keys for each connection or session. Which of the following will enable them to do this?
3. __________________ is the legal concept that describes the actions and processes a cloud customer uses to ensure that a reasonable level of protection is applied to the data in their control.
4. Data dispersion is a cloud data security technique that is most similar to which legacy implementation?
5. What element of credit cardholder information may never be stored for any length of time, according to the Payment Card Industry Data Security Standard (PCI DSS)?
6. Who should be involved in review and maintenance of user accounts/access?

7. Bob is designing a data center to support his organization, a financial services firm. What Uptime Institute tier rating should Bob try to attain in order to meet his company’s needs without adding extraneous costs?

This free quiz was provided by: