ISC2 Certified Cloud Security Professional (CCSP) Practice Question

Your organization collects security logs from cloud-hosted virtual machines and must keep them for potential litigation. The security architect needs to ensure that any individual log file can later be shown to be (1) exactly the same bits that were gathered at collection time and (2) unquestionably linked to the administrator who performed the collection. Which approach best meets both chain-of-custody and non-repudiation requirements for each log file?

  • Digitally sign each log file with the organization's root CA private key and record the signature hash on a blockchain ledger.

  • Generate a SHA-256 hash of the log at collection, then place the hash, collection timestamp, and collector's certificate inside a digitally signed manifest kept with the file.

  • Encrypt each log file with AES-256 and store the encryption key in the cloud provider's key-management service.

  • Write logs directly to a storage bucket configured with write-once-read-many (WORM) retention and governance-mode legal hold.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Data Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot