ISC2 Certified Cloud Security Professional (CCSP) Practice Question

While monitoring a customer's public IaaS environment you notice an instance suddenly initiating large volumes of outbound traffic to an unfamiliar external IP range. Company policy states that you must contain the threat, preserve volatile evidence, and avoid disrupting other tenants that share the same hypervisor. Which response action best satisfies these requirements?

  • Power off the affected instance from the hypervisor console, then create a block-level snapshot of its virtual disks for analysis.

  • Terminate the compromised instance and redeploy it from a trusted golden image to restore service quickly.

  • Detach the instance's virtual network interface (or place it in an isolated security group) and immediately perform a live memory capture through the cloud provider's API.

  • Collect flow logs for later analysis and await formal customer authorization before taking any containment measures.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot