ExamGecko
Home / CSA - Cloud Security Alliance / CCSK / List of questions
Ask Question

CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

Big data includes high volume, high variety, and high velocity.

False
False
True
True
Suggested answer: B
asked 16/09/2024
lawrence Ajibolade
53 questions

Question 12

Report Export Collapse

CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients. Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?

The CCM columns are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered ad a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining controls. This approach will save time.
The CCM columns are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered ad a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining controls. This approach will save time.
The CCM domain controls are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered as a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining controls thoroughly. This approach saves time while being able to assess the company’s overall security posture in an efficient manner.
The CCM domain controls are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered as a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining controls thoroughly. This approach saves time while being able to assess the company’s overall security posture in an efficient manner.
The CCM domains are not mapped to HIPAA/HITECH Act. Therefore Health4Sure should assess the security posture of their cloud service against each and every control in the CCM. This approach will allow a thorough assessment of the security posture.
The CCM domains are not mapped to HIPAA/HITECH Act. Therefore Health4Sure should assess the security posture of their cloud service against each and every control in the CCM. This approach will allow a thorough assessment of the security posture.
Suggested answer: C
asked 16/09/2024
Clive Roberts
50 questions

Question 13

Report Export Collapse

A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?

An entitlement matrix
An entitlement matrix
A support table
A support table
An entry log
An entry log
A validation process
A validation process
An access log
An access log
Suggested answer: D
asked 16/09/2024
Oren Dahan
49 questions

Question 14

Report Export Collapse

Cloud applications can use virtual networks and other structures, for hyper-segregated environments.

False
False
True
True
Suggested answer: B
asked 16/09/2024
Sunila Chugh
43 questions

Question 15

Report Export Collapse

Your cloud and on-premises infrastructures should always use the same network address ranges.

False
False
True
True
Suggested answer: A
asked 16/09/2024
Joe Evanchak
46 questions

Question 16

Report Export Collapse

Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?

Infrastructure
Infrastructure
Datastructure
Datastructure
Infostructure
Infostructure
Applistructure
Applistructure
Metastructure
Metastructure
Suggested answer: A
asked 16/09/2024
Georgescu Andrei
49 questions

Question 17

Report Export Collapse

Why is a service type of network typically isolated on different hardware?

It requires distinct access controls
It requires distinct access controls
It manages resource pools for cloud consumers
It manages resource pools for cloud consumers
It has distinct functions from other networks
It has distinct functions from other networks
It manages the traffic between other networks
It manages the traffic between other networks
It requires unique security
It requires unique security
Suggested answer: D
asked 16/09/2024
Robert Smith
40 questions

Question 18

Report Export Collapse

Which governance domain deals with evaluating how cloud computing affects compliance with internal security policies and various legal requirements, such as regulatory and legislative?

Legal Issues: Contracts and Electronic Discovery
Legal Issues: Contracts and Electronic Discovery
Infrastructure Security
Infrastructure Security
Compliance and Audit Management
Compliance and Audit Management
Information Governance
Information Governance
Governance and Enterprise Risk Management
Governance and Enterprise Risk Management
Suggested answer: C
asked 16/09/2024
Tomasz Kusmierek
34 questions

Question 19

Report Export Collapse

An important consideration when performing a remote vulnerability test of a cloud-based application is to

Obtain provider permission for test
Obtain provider permission for test
Use techniques to evade cloud provider’s detection systems
Use techniques to evade cloud provider’s detection systems
Use application layer testing tools exclusively
Use application layer testing tools exclusively
Use network layer testing tools exclusively
Use network layer testing tools exclusively
Schedule vulnerability test at night
Schedule vulnerability test at night
Suggested answer: A
asked 16/09/2024
Miguel Tuimil Galdo
43 questions

Question 20

Report Export Collapse

Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.

Rapid elasticity
Rapid elasticity
Resource pooling
Resource pooling
Broad network access
Broad network access
Measured service
Measured service
On-demand self-service
On-demand self-service
Suggested answer: E
asked 16/09/2024
Mary Andreou
49 questions
Total 260 questions
Go to page: of 26
Search