00:20:00

ISC2 Certified Cloud Security Professional (CCSP) Practice Test

Use the form below to configure your ISC2 Certified Cloud Security Professional (CCSP) Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for ISC2 Certified Cloud Security Professional (CCSP)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

ISC2 Certified Cloud Security Professional (CCSP) Information

About the ISC2 Certified Cloud Security Professional (CCSP) Exam

The Certified Cloud Security Professional (CCSP) certification from ISC2 is a globally recognized credential that validates an individual's advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud. Earning the CCSP demonstrates a professional's expertise in cloud security architecture, design, operations, and service orchestration. The latest version of the CCSP exam, updated in August 2024, consists of 125 multiple-choice questions that candidates have three hours to complete. To pass, a candidate must score at least 700 out of 1000 points. The exam questions are designed to be scenario-based, assessing a practitioner's ability to apply their knowledge in real-world situations.

Core Domains of the CCSP Exam

The CCSP exam is structured around six core domains, each with a specific weighting. These domains encompass the full spectrum of cloud security. The domains and their respective weights are: Cloud Concepts, Architecture and Design (17%), Cloud Data Security (20%), Cloud Platform & Infrastructure Security (17%), Cloud Application Security (17%), Cloud Security Operations (16%), and Legal, Risk and Compliance (13%). To be eligible for the exam, candidates generally need a minimum of five years of cumulative, full-time experience in Information Technology. This must include three years in cybersecurity and one year in one or more of the six CCSP domains.

The Value of Practice Exams in Preparation

Thorough preparation is key to success on the CCSP exam, and taking practice exams is a highly effective strategy. Practice tests help candidates to assess their knowledge, identify areas of weakness across the six domains, and become familiar with the question format and exam structure. By simulating the actual exam environment, practice questions also allow candidates to improve their time management skills and build confidence. Regularly reviewing mistakes made on practice tests provides an opportunity to revisit and reinforce challenging concepts, personalizing the study strategy for a more efficient and effective preparation process.

ISC2 Certified Cloud Security Professional (CCSP) Logo
  • Free ISC2 Certified Cloud Security Professional (CCSP) Practice Test

  • 20 Questions
  • Unlimited time
  • Cloud Concepts, Architecture and Design
    Cloud Data Security
    Cloud Platform & Infrastructure Security
    Cloud Application Security
    Cloud Security Operations
    Legal, Risk and Compliance

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 20

Your organization is moving an internal HR application to virtual machines hosted in a public IaaS environment. Security policy requires that employees continue to authenticate with their on-premises Active Directory credentials and that only the HR support group may administer the cloud resources used by the application. Which identity and access control solution best meets these requirements while honoring least-privilege principles?

  • Create individual IAM users in the cloud provider and enforce complex password rotation policies.

  • Embed shared root-level SSH keys into the VM images and distribute the key pair to the HR team.

  • Permit anonymous access to the cloud resource endpoints and rely solely on application-level authentication.

  • Configure SAML 2.0 federation between Active Directory Federation Services and the cloud provider, mapping AD groups to fine-grained IAM roles.

Question 2 of 20

A company is concerned that virtual machines in its public-cloud VPC can still initiate east-west connections to other subnets even when each subnet has its own network security group (NSG). The cloud security architect is told to move toward a zero-trust model so that every packet between workloads is evaluated against identity, device posture, and real-time context instead of static IP rules. Which control BEST meets this requirement without adding a traditional perimeter firewall appliance?

  • Implement microsegmentation with an identity-aware, software-defined firewall that applies tag-based policies at each workload.

  • Migrate the workloads into a private cloud and separate them with dedicated VLANs.

  • Deploy a traditional next-generation firewall at the VPC's internet gateway to inspect all traffic.

  • Broaden the NSG CIDR ranges so all subnets are included under a single ruleset.

Question 3 of 20

During a design workshop for a new DevOps platform, your team insists that developers must be able to spin up and tear down virtual machines and databases at any time through a web portal or API, without opening tickets with the provider's operations staff. In NIST's cloud definition, which essential characteristic directly addresses this requirement?

  • Measured service

  • On-demand self-service

  • Broad network access

  • Resource pooling

Question 4 of 20

During a quarterly budget review, a company's CFO asks the cloud architect how the organization can accurately allocate infrastructure costs to each department based on the exact amount of virtual CPU, storage, and network bandwidth they consume. Which essential cloud computing characteristic directly enables this type of departmental chargeback model?

  • Broad network access

  • Multi-tenancy

  • Rapid elasticity

  • Measured service

Question 5 of 20

A financial services firm stores customer information in a cloud-hosted relational database. You are asked to implement automated discovery of personally identifiable information (PII) so that the data protection team can track where sensitive fields are located before applying controls. Which approach is most suitable for discovering PII that resides in this structured data set while keeping the rate of false positives low?

  • Export all tables to flat files and run regular-expression searches for Social Security number and credit-card patterns across the dumps.

  • Deploy an agentless network DLP appliance to inspect outbound SQL traffic for PII signatures as users query the database.

  • Encrypt the entire database with fully homomorphic encryption so discovery tools can scan the ciphertext without exposure.

  • Analyze the database's system catalog and column metadata to identify fields whose names, data types, or built-in sensitivity tags indicate they may contain PII.

Question 6 of 20

Your organization is refactoring a monolithic web application into stateless microservices that will run in containers managed by a cloud-native orchestration platform. Management wants the new deployment to add or remove service instances automatically as traffic fluctuates, without manual administrator intervention. Which core capability of container orchestration platforms most directly enables this requirement and aligns with the cloud characteristic of rapid elasticity?

  • Sharing the underlying host operating system kernel to minimize virtualization overhead

  • Use of overlay networking to decouple container networks from physical hosts

  • Automatic horizontal scaling of containers based on real-time resource or application metrics

  • Built-in secret management for injecting credentials at container start-up

Question 7 of 20

Your operations team reports that the public-cloud virtual machines hosting the company's e-commerce site are saturated every Friday night. Management wants the environment to automatically add or remove instances in real time so performance stays steady and charges reflect only what is actually consumed-without opening tickets or calling the provider. According to the NIST definition of cloud computing, which essential characteristic addresses this requirement?

  • On-demand self-service

  • Rapid elasticity

  • Resource pooling

  • Measured service

Question 8 of 20

Your organization is standardizing on a single data classification policy (Public, Internal, Confidential, Restricted) before migrating workloads to AWS, Azure, and GCP. Planned controls-such as automatic encryption, data loss prevention, and lifecycle rules-will trigger from metadata tags that carry the classification value on every object or datastore. Which planning decision will most help prevent gaps in those controls as data moves between the three cloud platforms?

  • Permit project teams to define additional custom classification levels so they can refine the four-level scheme as needed.

  • Create separate tag schemes for each provider and translate the labels through an API proxy when data is replicated.

  • Adopt a uniform, provider-agnostic set of classification tags that uses the same names and format in every cloud account and subscription.

  • Tag only personally identifiable information (PII) as sensitive and leave all other data untagged to simplify tagging workflows.

Question 9 of 20

Your organization runs several public IaaS virtual machines that process regulated data. The security team is worried that a malicious tenant hosted on the same physical server could exploit a hypervisor weakness to escape its guest instance and gain access to your workloads. Which cloud-specific threat category best describes this concern?

  • Exploitation of shared technology vulnerabilities resulting in tenant isolation failure

  • Vendor lock-in that limits workload portability between providers

  • Phishing attacks against the cloud management console

  • Data remanence caused by insufficient media sanitization

Question 10 of 20

While performing a risk assessment on a public IaaS provider, you discover that customer virtual machines are frequently live-migrated between hosts for load balancing. The migration traffic travels across an unsegmented management network and is not encrypted. Which risk should you flag as the most significant to confidential data handled by a tenant workload?

  • Complicated guest operating system patch schedules caused by host reallocation

  • Exposure of in-memory tenant data to interception during migration traffic

  • Temporary performance degradation on the VM due to increased hypervisor overhead

  • Violation of per-CPU software licensing as the VM lands on differently licensed hosts

Question 11 of 20

Your organization is evaluating cloud providers. Developers insist they must be able to create, modify, and delete virtual machines through a web portal or API at any time without opening support tickets. Which NIST-defined cloud characteristic must the provider explicitly demonstrate to satisfy this requirement?

  • On-demand self-service

  • Measured service

  • Resource pooling

  • Rapid elasticity

Question 12 of 20

During a project briefing, the CIO notes that the cloud provider will draw CPU, memory and storage from a shared hardware platform and dynamically allocate those resources to any tenant that needs them, while shielding customers from the exact physical location of their workloads. According to the NIST definition of cloud computing, which essential characteristic is the CIO describing?

  • Rapid elasticity

  • Resource pooling

  • On-demand self-service

  • Broad network access

Question 13 of 20

Your organization is a SaaS provider hosting its application on a fleet of Linux-based virtual machines in a public cloud. A critical vulnerability in the OS kernel has just been disclosed and a vendor patch is available. To follow sound cloud security hygiene and minimize configuration drift, which action should the provider take first?

  • Update and test the hardened golden image in a staging environment, then redeploy instances from this new baseline.

  • Apply a network egress block on the affected VMs and plan to revisit patching during the next regular maintenance window.

  • Push the patch to every production VM immediately, skipping testing to reduce exposure.

  • E-mail customers advising them to apply the patch because guest OS maintenance is their responsibility.

Question 14 of 20

Your organization collects security logs from cloud-hosted virtual machines and must keep them for potential litigation. The security architect needs to ensure that any individual log file can later be shown to be (1) exactly the same bits that were gathered at collection time and (2) unquestionably linked to the administrator who performed the collection. Which approach best meets both chain-of-custody and non-repudiation requirements for each log file?

  • Digitally sign each log file with the organization's root CA private key and record the signature hash on a blockchain ledger.

  • Generate a SHA-256 hash of the log at collection, then place the hash, collection timestamp, and collector's certificate inside a digitally signed manifest kept with the file.

  • Write logs directly to a storage bucket configured with write-once-read-many (WORM) retention and governance-mode legal hold.

  • Encrypt each log file with AES-256 and store the encryption key in the cloud provider's key-management service.

Question 15 of 20

A security architect must choose a data loss prevention (DLP) deployment option that allows the organization to continuously inspect files already stored in sanctioned SaaS applications such as Microsoft 365 and Box. The solution must not require tunneling user traffic through an on-premises proxy or installing new endpoint agents. Which approach best meets these requirements?

  • Deploy endpoint DLP agents on all user devices to monitor file activity.

  • Insert an SMTP relay with DLP capabilities in front of the corporate mail server.

  • Route traffic through an on-premises secure web gateway using the ICAP protocol for DLP inspection.

  • Use an API-based cloud DLP/CASB connector to the SaaS tenant.

Question 16 of 20

During a redesign of an e-commerce application hosted in a public IaaS cloud, the web tier will be deployed on dozens of auto-scaled virtual machines. For performance, each VM writes temporary session cache files to local disk, but the data has no value once the VM is terminated. To reduce cost and limit residual-data exposure, which cloud storage type should you specify for those cache volumes?

  • Long-term object storage class designed for infrequent access and archival

  • Raw block storage mapped directly to the host's physical disk for persistent use

  • Ephemeral instance storage that is automatically deleted when the VM is stopped

  • Network file share backed by durable distributed storage

Question 17 of 20

A public IaaS provider uses KVM to host multitenant workloads. A critical hypervisor privilege-escalation (VM-escape) flaw that abuses direct device passthrough handling has just been disclosed. While vendor patches are still being validated, which immediate action will most directly reduce the likelihood that a malicious tenant can break out of its guest and reach the host or neighboring tenants?

  • Enable memory page deduplication so identical memory pages are shared across guest VMs.

  • Store every tenant's encryption keys inside the same virtual machine that uses them to avoid network exposure.

  • Disable all PCI, USB, and other device passthrough so guests use only standard virtual devices.

  • Place each tenant in a separate virtual network and enforce restrictive security group rules.

Question 18 of 20

Your organization is building a microservice that will run in a Kubernetes cluster and intends to use a popular open-source reverse-proxy image pulled from a public registry. To satisfy the company policy that mandates deployment of only validated open-source software, which action best demonstrates that the image has been properly validated before it is promoted to the production registry?

  • Pull the image only from its official repository on Docker Hub, trusting that the maintainers keep it secure and up to date.

  • Deploy the image in an isolated namespace first and rely on runtime behavioral monitoring to spot suspicious activity.

  • Fork the image's source code into an internal Git repository and disable automatic updates so the code base remains unchanged.

  • Scan the container image with an SCA tool to create an SBOM and address any reported CVEs before copying it into the enterprise registry.

Question 19 of 20

A healthcare provider is migrating electronic health record data that includes patient Social Security numbers to a multi-tenant SaaS platform. Regulations state the cloud provider must never be able to view the real SSNs, yet the application must still perform exact-match searches on that field and the organization needs the ability to restore the original values during legal discovery. Which data-protection technique best satisfies these requirements?

  • Irreversible hashing of the SSN with SHA-256 and a unique salt

  • Static data masking applied to the SSN before upload

  • Format-preserving encryption of the SSN using AES-FF1 with client-side key management

  • Tokenization of the SSN with a centrally managed on-premises token vault

Question 20 of 20

A SaaS provider receives an email from a customer asking that five new employee accounts be added to the tenant. The provider's operator signs in to the provider-side management console, creates the accounts, assigns them the correct role, and then informs the customer that the service is ready for use. Under the ISO/IEC cloud reference architecture, which cloud computing activity is the operator performing when creating and configuring those user accounts?

  • Cloud service provisioning

  • Cloud service usage

  • Configure

  • Cloud service support