ISC2 Certified Cloud Security Professional (CCSP) Practice Question

While monitoring usage metrics in their Kubernetes cluster hosted on a public cloud, a DevOps team notices a sudden spike in CPU consumption from a newly deployed microservice. Further review shows the container image was pulled from an unverified public registry and is mining cryptocurrency for an external wallet. Which cloud-specific threat does this incident most clearly illustrate?

  • Exploitation of insecure cloud management APIs

  • Unauthorized resource hijacking of shared compute capacity

  • Hypervisor escape from a guest virtual machine

  • Residual data exposure due to storage media remanence

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Platform & Infrastructure Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot