(CCSP)
phase of the cloud data life cycle allows both read and process
functions to be performed?
A Create
B Archive
C Store
D Share ......ANSWER......A
Which phase of the cloud data security life cycle typically occurs
simultaneously with creation?
A Share
B Store
C Use
D Destroy ......ANSWER......B
Which phase of the cloud data life cycle uses content delivery
networks?
pg. 1
,A Destroy
B Archive
C Share
D Create ......ANSWER......C
Which phase of the cloud data life cycle is associated with crypto-
shredding?
A Share
B Use
C Destroy
D Store ......ANSWER......C
Which cloud data storage architecture allows sensitive data to be
replaced with unique identification symbols that retain all the essential
information about the data without compromising its security?
A Randomization
B Obfuscation
C Anonymization
D Tokenization ......ANSWER......D
pg. 2
,Which methodology could cloud data storage utilize to encrypt all data
associated in an infrastructure as a service (IaaS) deployment model?
A Sandbox encryption
B Polymorphic encryption
C Client-side encryption
D Whole-instance encryption ......ANSWER......D
There is a threat to a banking cloud platform service. The developer
needs to provide inclusion in a relational database that is seamless and
readily searchable by search engine algorithms.
Which platform as a service (PaaS) data type should be used?
A Short-term storage
B Structured
C Unstructured
D Long-term storage ......ANSWER......B
Which platform as a service (PaaS) storage architecture should be used
if an organization wants to store presentations, documents, and audio
files?
pg. 3
, A Relational database
B Block
C Distributed
D Object ......ANSWER......D
Which technique scrambles the content of data using a mathematical
algorithm while keeping the structural arrangement of the data?
A Dynamic masking
B Format-preserving encryption
C Proxy-based encryption
D Tokenization ......ANSWER......B
Which encryption technique connects the instance to the encryption
instance that handles all crypto operations?
A Database
B Proxy
C Externally managed
D Server-side ......ANSWER......B
Which type of control should be used to implement custom controls
that safeguard data?
pg. 4