CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 2
List of questions
Question 11

Big data includes high volume, high variety, and high velocity.
Question 12

CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients. Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
Question 13

A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Question 14

Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
Question 15

Your cloud and on-premises infrastructures should always use the same network address ranges.
Question 16

Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
Question 17

Why is a service type of network typically isolated on different hardware?
Question 18

Which governance domain deals with evaluating how cloud computing affects compliance with internal security policies and various legal requirements, such as regulatory and legislative?
Question 19

An important consideration when performing a remote vulnerability test of a cloud-based application is to
Question 20

Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
Question