ISC2 Certified Cloud Security Professional (CCSP) Practice Question

Your organization is refactoring a legacy three-tier web application into containers running on a managed Kubernetes service in a public cloud. During the architecture review, the security team insists that the design must satisfy the Security pillar of the provider's Well-Architected Framework. Which of the following design choices best demonstrates compliance with that pillar?

  • Autoscale worker nodes across multiple availability zones to withstand instance failures.

  • Place read-heavy database replicas in regions closer to users to reduce latency.

  • Schedule a weekly rightsizing exercise to shut down idle development clusters to reduce waste.

  • Encrypt all data in transit and at rest using customer-managed keys stored in a dedicated key management service.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Concepts, Architecture and Design
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot