ExamGecko
Home Home / CSA / CCSK
Ask QuestionAsk Question

CSA CCSK Practice Test - Questions Answers

Question list
Search
Search

Question 1

Report
Export
Collapse

All cloud services utilize virtualization technologies.

A.
False
A.
False
Answers
B.
True
B.
True
Answers
Suggested answer: B
asked 16/09/2024
JULIUS BALNEG
37 questions

Question 2

Report
Export
Collapse

If there are gaps in network logging data, what can you do?

A.
Nothing. There are simply limitations around the data that can be logged in the cloud.
A.
Nothing. There are simply limitations around the data that can be logged in the cloud.
Answers
B.
Ask the cloud provider to open more ports.
B.
Ask the cloud provider to open more ports.
Answers
C.
You can instrument the technology stack with your own logging.
C.
You can instrument the technology stack with your own logging.
Answers
D.
Ask the cloud provider to close more ports.
D.
Ask the cloud provider to close more ports.
Answers
E.
Nothing. The cloud provider must make the information available.
E.
Nothing. The cloud provider must make the information available.
Answers
Suggested answer: C
asked 16/09/2024
Edwin Daneel
32 questions

Question 3

Report
Export
Collapse

CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.

A.
Risk Impact
A.
Risk Impact
Answers
B.
Domain
B.
Domain
Answers
C.
Control Specification
C.
Control Specification
Answers
Suggested answer: C
asked 16/09/2024
Akash Makkar
35 questions

Question 4

Report
Export
Collapse

Who is responsible for the security of the physical infrastructure and virtualization platform?

A.
The cloud consumer
A.
The cloud consumer
Answers
B.
The majority is covered by the consumer
B.
The majority is covered by the consumer
Answers
C.
It depends on the agreement
C.
It depends on the agreement
Answers
D.
The responsibility is split equally
D.
The responsibility is split equally
Answers
E.
The cloud provider
E.
The cloud provider
Answers
Suggested answer: E
asked 16/09/2024
javier mungaray
34 questions

Question 5

Report
Export
Collapse

What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?

A.
The physical location of the data and how it is accessed
A.
The physical location of the data and how it is accessed
Answers
B.
The fragmentation and encryption algorithms employed
B.
The fragmentation and encryption algorithms employed
Answers
C.
The language of the data and how it affects the user
C.
The language of the data and how it affects the user
Answers
D.
The implications of storing complex information on simple storage systems
D.
The implications of storing complex information on simple storage systems
Answers
E.
The actual size of the data and the storage format
E.
The actual size of the data and the storage format
Answers
Suggested answer: D
asked 16/09/2024
mr Craig Ferguson
34 questions

Question 6

Report
Export
Collapse

Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?

A.
Platform-as-a-service (PaaS)
A.
Platform-as-a-service (PaaS)
Answers
B.
Desktop-as-a-service (DaaS)
B.
Desktop-as-a-service (DaaS)
Answers
C.
Infrastructure-as-a-service (IaaS)
C.
Infrastructure-as-a-service (IaaS)
Answers
D.
Identity-as-a-service (IDaaS)
D.
Identity-as-a-service (IDaaS)
Answers
E.
Software-as-a-service (SaaS)
E.
Software-as-a-service (SaaS)
Answers
Suggested answer: A
asked 16/09/2024
Johan Wu
27 questions

Question 7

Report
Export
Collapse

CCM: The following list of controls belong to which domain of the CCM?

GRM 06 – Policy

GRM 07 – Policy Enforcement

GRM 08 – Policy Impact on Risk Assessments

GRM 09 – Policy Reviews

GRM 10 – Risk Assessments

GRM 11 – Risk Management Framework

A.
Governance and Retention Management
A.
Governance and Retention Management
Answers
B.
Governance and Risk Management
B.
Governance and Risk Management
Answers
C.
Governing and Risk Metrics
C.
Governing and Risk Metrics
Answers
Suggested answer: B
asked 16/09/2024
Jarod Simmons
41 questions

Question 8

Report
Export
Collapse

Which attack surfaces, if any, does virtualization technology introduce?

A.
The hypervisor
A.
The hypervisor
Answers
B.
Virtualization management components apart from the hypervisor
B.
Virtualization management components apart from the hypervisor
Answers
C.
Configuration and VM sprawl issues
C.
Configuration and VM sprawl issues
Answers
D.
All of the above
D.
All of the above
Answers
Suggested answer: D
asked 16/09/2024
Krzysztof Dyrdal
48 questions

Question 9

Report
Export
Collapse

APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.

A.
False
A.
False
Answers
B.
True
B.
True
Answers
Suggested answer: B
asked 16/09/2024
Ali Alaqoul
34 questions

Question 10

Report
Export
Collapse

Which of the following is NOT a cloud computing characteristic that impacts incidence response?

A.
The on demand self-service nature of cloud computing environments.
A.
The on demand self-service nature of cloud computing environments.
Answers
B.
Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident.
B.
Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident.
Answers
C.
The possibility of data crossing geographic or jurisdictional boundaries.
C.
The possibility of data crossing geographic or jurisdictional boundaries.
Answers
D.
Object-based storage in a private cloud.
D.
Object-based storage in a private cloud.
Answers
E.
The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures.
E.
The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures.
Answers
Suggested answer: B
asked 16/09/2024
Aung Aung Myo Myint
39 questions
Total 117 questions
Go to page: of 12