ExamGecko
Home / CSA - Cloud Security Alliance / CCSK / List of questions
Ask Question

CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

REST APIs are the standard for web-based services because they run over HTTPS and work wellacross diverse environments.

False
False
True
True
Suggested answer: B
asked 16/09/2024
Higher System Consultancy
48 questions

Question 22

Report Export Collapse

Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?

Inspect and account for risks inherited from other members of the cloud supply chain and take active measures to mitigate and contain risks through operational resiliency.
Inspect and account for risks inherited from other members of the cloud supply chain and take active measures to mitigate and contain risks through operational resiliency.
Respect the interdependency of the risks inherent in the cloud supply chain and communicate the corporate risk posture and readiness to consumers and dependent parties.
Respect the interdependency of the risks inherent in the cloud supply chain and communicate the corporate risk posture and readiness to consumers and dependent parties.
Negotiate long-term contracts with companies who use well-vetted software application to avoid the transient nature of the cloud environment.
Negotiate long-term contracts with companies who use well-vetted software application to avoid the transient nature of the cloud environment.
Provide transparency to stakeholders and shareholders demonstrating fiscal solvency and organizational transparency.
Provide transparency to stakeholders and shareholders demonstrating fiscal solvency and organizational transparency.
Both B and C.
Both B and C.
Suggested answer: C
asked 16/09/2024
Cintron, Rigoberto
42 questions

Question 23

Report Export Collapse

What is defined as the process by which an opposing party may obtain private documents for use in litigation?

Discovery
Discovery
Custody
Custody
Subpoena
Subpoena
Risk Assessment
Risk Assessment
Scope
Scope
Suggested answer: A
asked 16/09/2024
Madhankumar Rathinakumar
41 questions

Question 24

Report Export Collapse

What item below allows disparate directory services and independent security domains to be interconnected?

Coalition
Coalition
Cloud
Cloud
Intersection
Intersection
Union
Union
Federation
Federation
Suggested answer: E
asked 16/09/2024
Ramzi Smair
39 questions

Question 25

Report Export Collapse

Use elastic servers when possible and move workloads to new instances.

False
False
True
True
Suggested answer: B
asked 16/09/2024
Ken Mak
47 questions

Question 26

Report Export Collapse

To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?

Provider documentation
Provider documentation
Provider run audits and reports
Provider run audits and reports
Third-party attestations
Third-party attestations
Provider and consumer contracts
Provider and consumer contracts
EDiscovery tools
EDiscovery tools
Suggested answer: C
asked 16/09/2024
j j
35 questions

Question 27

Report Export Collapse

Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?

More physical control over assets and processes.
More physical control over assets and processes.
Greater reliance on contracts, audits, and assessments due to lack of visibility or management.
Greater reliance on contracts, audits, and assessments due to lack of visibility or management.
Decreased requirement for proactive management of relationship and adherence to contracts.
Decreased requirement for proactive management of relationship and adherence to contracts.
Increased need, but reduction in costs, for managing risks accepted by the cloud provider.
Increased need, but reduction in costs, for managing risks accepted by the cloud provider.
None of the above.
None of the above.
Suggested answer: B
asked 16/09/2024
Ibrahim mazou Ismael
52 questions

Question 28

Report Export Collapse

Which data security control is the LEAST likely to be assigned to an IaaS provider?

Application logic
Application logic
Access controls
Access controls
Encryption solutions
Encryption solutions
Physical destruction
Physical destruction
Asset management and tracking
Asset management and tracking
Suggested answer: A
asked 16/09/2024
Jahcorey Howze
40 questions

Question 29

Report Export Collapse

How does virtualized storage help avoid data loss if a drive fails?

Multiple copies in different locations
Multiple copies in different locations
Drives are backed up, swapped, and archived constantly
Drives are backed up, swapped, and archived constantly
Full back ups weekly
Full back ups weekly
Data loss is unavoidable with drive failures
Data loss is unavoidable with drive failures
Incremental backups daily
Incremental backups daily
Suggested answer: A
asked 16/09/2024
Assane SENE
44 questions

Question 30

Report Export Collapse

What is the newer application development methodology and philosophy focused on automation of application development and deployment?

Agile
Agile
BusOps
BusOps
DevOps
DevOps
SecDevOps
SecDevOps
Scrum
Scrum
Suggested answer: C
asked 16/09/2024
Gufran Dalwai
52 questions
Total 260 questions
Go to page: of 26