ISC2 Certified Cloud Security Professional (CCSP) Practice Question

During an incident response, your IaaS provider notifies you that a compromised Linux virtual machine running a Docker container will be auto-scaled down in the next five minutes. You are tasked with supporting digital forensics and must preserve volatile evidence from the running container while maintaining its admissibility in court. Which action should you perform first?

  • Generate a live memory snapshot of the container and immediately calculate a SHA-256 hash of the snapshot file.

  • Export the container's syslog files to on-premises storage using SCP over an encrypted tunnel.

  • Power off the virtual machine to freeze the container state and rely on the cloud provider's automated backups.

  • Spin up an identical container on the same host to replicate the attack traffic for later analysis.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot