ISC2 Certified Cloud Security Professional (CCSP) Practice Question

While monitoring a customer's public IaaS environment you notice an instance suddenly initiating large volumes of outbound traffic to an unfamiliar external IP range. Company policy states that you must contain the threat, preserve volatile evidence, and avoid disrupting other tenants that share the same hypervisor. Which response action best satisfies these requirements?

  • Collect flow logs for later analysis and await formal customer authorization before taking any containment measures.

  • Terminate the compromised instance and redeploy it from a trusted golden image to restore service quickly.

  • Power off the affected instance from the hypervisor console, then create a block-level snapshot of its virtual disks for analysis.

  • Detach the instance's virtual network interface (or place it in an isolated security group) and immediately perform a live memory capture through the cloud provider's API.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot