CSA CCSK Practice Test - Questions Answers, Page 10
List of questions
Question 91

CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
Question 92

If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Question 93

CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution.
They are growing rapidly and therefore need to put controls in place in order to manage any changes in their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
Question 94

Containers are highly portable code execution environments.
Question 95

Which statement best describes the Data Security Lifecycle?
Question 96

Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
Question 97

In the Software-as-a-service relationship, who is responsible for the majority of the security?
Question 98

What method can be utilized along with data fragmentation to enhance security?
Question 99

Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
Question 100

How can web security as a service be deployed for a cloud consumer?
Question