CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 10
List of questions
Question 91
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
Question 92
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Question 93
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution.
They are growing rapidly and therefore need to put controls in place in order to manage any changes in their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
Question 94
Containers are highly portable code execution environments.
Question 95
Which statement best describes the Data Security Lifecycle?
Question 96
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
Question 97
In the Software-as-a-service relationship, who is responsible for the majority of the security?
Question 98
What method can be utilized along with data fragmentation to enhance security?
Question 99
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
Question 100
How can web security as a service be deployed for a cloud consumer?
Question