ExamGecko
Home / CSA - Cloud Security Alliance / CCSK / List of questions
Ask Question

CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?

Become a Premium Member for full access
  Unlock Premium Member

Question 92

Report Export Collapse

If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution.

They are growing rapidly and therefore need to put controls in place in order to manage any changes in their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

Containers are highly portable code execution environments.

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

Which statement best describes the Data Security Lifecycle?

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

In the Software-as-a-service relationship, who is responsible for the majority of the security?

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

What method can be utilized along with data fragmentation to enhance security?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

How can web security as a service be deployed for a cloud consumer?

Become a Premium Member for full access
  Unlock Premium Member
Total 288 questions
Go to page: of 29