Cloud Platform & Infrastructure Security

Design secure cloud infrastructure and platform components.

Covers cloud infrastructure components, secure data center design, risk assessment, security controls, and disaster recovery/business continuity.
5 minutes 5 Questions

Cloud Platform and Infrastructure Security, constituting Domain 3 of the Certified Cloud Security Professional (CCSP) certification, focuses on securing the physical and virtual foundations of the cloud environment. It addresses the design, implementation, and risk management of the underlying comp…

Concepts covered: Cloud infrastructure components, Secure data center design, Risk assessment and analysis of cloud infrastructure, Cloud vulnerabilities, threats, and attacks, Virtualization risks, Countermeasure strategies, Design and plan security controls, Physical and environmental protection, System and communication protection, Virtualization systems protection, Identification and authentication, Audit mechanisms, Disaster recovery (DR) and business continuity (BC) strategy

Test mode:
CCSP - Cloud Platform & Infrastructure Security Example Questions

Test your knowledge of Cloud Platform & Infrastructure Security

Question 1

A cloud architect is finalizing the security design for a legacy financial calculation engine moving to a public IaaS provider. The design must guarantee that the application's data-in-use is cryptographically isolated from the cloud provider's hypervisor, satisfying the requirement to process existing binaries without code modification. Additionally, the system must utilize a cryptographic challenge to verify the host's integrity before releasing sensitive parameters. Which security architecture satisfies these specific constraints?

Question 2

A security architect is designing an authentication flow for a Single Page Application (SPA) involving a public client that cannot securely store secrets. To effectively mitigate authorization code interception attacks and ensure that the entity exchanging the code for a token is the same entity that initiated the request, which standard protocol extension should be implemented?

Question 3

During a forensic investigation of a compromised cloud workload, security analysts discover that an attacker manipulated a server-side image rendering function to force the application to issue HTTP GET requests to the link-local IPv4 address 169.254.169.254. This action allowed the extraction of temporary security credentials assigned to the compute resource's identity role. Which specific attack vector exploits this trust relationship between the virtual instance and the cloud control plane?

More Cloud Platform & Infrastructure Security questions
130 questions (total)