CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 12
List of questions
Question 111

CCM: Cloud Controls Matrix (CCM) is a completely independent cloud assessment toolkit that does not map any existing standards.
Question 112

What are the encryption options available for SaaS consumers?
Question 113

In the cloud provider and consumer relationship, which entity manages the virtual or abstracted infrastructure?
Question 114

Which term describes any situation where the cloud consumer does not manage any of the underlying hardware or virtual machines?
Question 115

Which of the following statements best describes an identity federation?
Question 116

What is a core tenant of risk management?
Question 117

What can be implemented to help with account granularity and limit blast radius with laaS an PaaS?
Question 118

How does cloud sprawl complicate security monitoring in an enterprise environment?
Cloud sprawl disperses assets, making it harder to monitor assets.
Cloud sprawl centralizes assets, simplifying security monitoring.
Cloud sprawl reduces the number of assets, easing security efforts.
Cloud sprawl has no impact on security monitoring.
Cloud sprawl leads to the distribution of assets across multiple locations, making it challenging to maintain visibility and security control over all resources.
Reference: [Security Guidance v5, Domain 4 - Organization Management]
Question 119

In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
Post-Incident Activity
Detection and Analysis
Preparation
Containment, Eradication, and Recovery
The Detection and Analysis phase involves identifying incidents and determining their impact. It is crucial to validate events to understand if they constitute a security incident.
Reference: [Security Guidance v5, Domain 11 - Incident Response]
Question 120

How does centralized logging simplify security monitoring and compliance?
It consolidates logs into a single location.
It decreases the amount of data that needs to be reviewed.
It encrypts all logs to prevent unauthorized access.
It automatically resolves all detected security threats.
Centralized logging aggregates logs in one location, making it easier to monitor, analyze, and comply with regulatory requirements.
Reference: [Security Guidance v5, Domain 6 - Security Monitoring]
Question