ISC2 Certified Cloud Security Professional (CCSP) Practice Question

During an investigation in an IaaS environment, a security engineer discovers that an active Windows Server virtual machine may be exfiltrating sensitive data. The engineer can immediately perform any of the following actions: request a hypervisor memory dump of the running VM, trigger a crash-consistent snapshot of its virtual disks, download the cloud provider's API access logs, or retrieve the last 24 hours of firewall logs. To best preserve digital evidence in line with the accepted order of volatility, which action should the engineer perform first?

  • Download the cloud provider's API access logs before they are overwritten.

  • Trigger an immediate crash-consistent snapshot of the VM's virtual disks.

  • Collect the past 24 hours of firewall logs from the provider's archive.

  • Request a hypervisor-level memory snapshot of the live virtual machine.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot