ISC2 Certified Cloud Security Professional (CCSP) Practice Question

Your organization is migrating an analytics workload that processes highly sensitive patient data to a public cloud Kubernetes cluster. Security policy requires that the information remain protected even while it is being processed in memory, so that neither cloud provider administrators nor a malicious hypervisor can view it. Which emerging technology, now offered by several major cloud providers, best satisfies this requirement with minimal application refactoring?

  • Re-architecting the application to run as blockchain smart contracts for tamper-evident processing

  • Applying quantum-resistant encryption algorithms to protect data stored on cloud disks

  • Deploying the workload to edge computing nodes located closer to end users

  • Confidential computing that leverages CPU-based trusted execution environments to keep data encrypted during processing

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Concepts, Architecture and Design
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot