ExamGecko

CSA CCSK Practice Test - Questions Answers, Page 4

Question list
Search
Search

Question 31

Report
Export
Collapse

Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider

A.
False
A.
False
Answers
B.
True
B.
True
Answers
Suggested answer: B
asked 16/09/2024
Brad Mateski
40 questions

Question 32

Report
Export
Collapse

What is true of searching data across cloud environments?

A.
You might not have the ability or administrative rights to search or access all hosted data.
A.
You might not have the ability or administrative rights to search or access all hosted data.
Answers
B.
The cloud provider must conduct the search with the full administrative controls.
B.
The cloud provider must conduct the search with the full administrative controls.
Answers
C.
All cloud-hosted email accounts are easily searchable.
C.
All cloud-hosted email accounts are easily searchable.
Answers
D.
Search and discovery time is always factored into a contract between the consumer and provider.
D.
Search and discovery time is always factored into a contract between the consumer and provider.
Answers
E.
You can easily search across your environment using any E-Discovery tool.
E.
You can easily search across your environment using any E-Discovery tool.
Answers
Suggested answer: A
asked 16/09/2024
Aleksandar Jovasevic
45 questions

Question 33

Report
Export
Collapse

How does running applications on distinct virtual networks and only connecting networks as needed help?

A.
It reduces hardware costs
A.
It reduces hardware costs
Answers
B.
It provides dynamic and granular policies with less management overhead
B.
It provides dynamic and granular policies with less management overhead
Answers
C.
It locks down access and provides stronger data security
C.
It locks down access and provides stronger data security
Answers
D.
It reduces the blast radius of a compromised system
D.
It reduces the blast radius of a compromised system
Answers
E.
It enables you to configure applications around business groups
E.
It enables you to configure applications around business groups
Answers
Suggested answer: D
asked 16/09/2024
Derek Steven Schulte
41 questions

Question 34

Report
Export
Collapse

How can virtual machine communications bypass network security controls?

A.
VM communications may use a virtual network on the same hardware host
A.
VM communications may use a virtual network on the same hardware host
Answers
B.
The guest OS can invoke stealth mode
B.
The guest OS can invoke stealth mode
Answers
C.
Hypervisors depend upon multiple network interfaces
C.
Hypervisors depend upon multiple network interfaces
Answers
D.
VM images can contain rootkits programmed to bypass firewalls
D.
VM images can contain rootkits programmed to bypass firewalls
Answers
E.
Most network security systems do not recognize encrypted VM traffic
E.
Most network security systems do not recognize encrypted VM traffic
Answers
Suggested answer: A
asked 16/09/2024
Adriano Costa
36 questions

Question 35

Report
Export
Collapse

ENISA: “VM hopping” is:

A.
Improper management of VM instances, causing customer VMs to be commingled with other customer systems.
A.
Improper management of VM instances, causing customer VMs to be commingled with other customer systems.
Answers
B.
Looping within virtualized routing systems.
B.
Looping within virtualized routing systems.
Answers
C.
Lack of vulnerability management standards.
C.
Lack of vulnerability management standards.
Answers
D.
Using a compromised VM to exploit a hypervisor, used to take control of other VMs.
D.
Using a compromised VM to exploit a hypervisor, used to take control of other VMs.
Answers
E.
Instability in VM patch management causing VM routing errors.
E.
Instability in VM patch management causing VM routing errors.
Answers
Suggested answer: D
asked 16/09/2024
Fakhruddin Abbas
32 questions

Question 36

Report
Export
Collapse

Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?

A.
Access control
A.
Access control
Answers
B.
Federated Identity Management
B.
Federated Identity Management
Answers
C.
Authoritative source
C.
Authoritative source
Answers
D.
Entitlement
D.
Entitlement
Answers
E.
Authentication
E.
Authentication
Answers
Suggested answer: D
asked 16/09/2024
Trevore Agee
25 questions

Question 37

Report
Export
Collapse

Which concept provides the abstraction needed for resource pools?

A.
Virtualization
A.
Virtualization
Answers
B.
Applistructure
B.
Applistructure
Answers
C.
Hypervisor
C.
Hypervisor
Answers
D.
Metastructure
D.
Metastructure
Answers
E.
Orchestration
E.
Orchestration
Answers
Suggested answer: A
asked 16/09/2024
Karthika Aravinth
33 questions

Question 38

Report
Export
Collapse

Network logs from cloud providers are typically flow records, not full packet captures.

A.
False
A.
False
Answers
B.
True
B.
True
Answers
Suggested answer: B
asked 16/09/2024
Vinayak H
35 questions

Question 39

Report
Export
Collapse

Select the best definition of “compliance” from the options below.

A.
The development of a routine that covers all necessary security measures.
A.
The development of a routine that covers all necessary security measures.
Answers
B.
The diligent habits of good security practices and recording of the same.
B.
The diligent habits of good security practices and recording of the same.
Answers
C.
The timely and efficient filing of security reports.
C.
The timely and efficient filing of security reports.
Answers
D.
The awareness and adherence to obligations, including the assessment and prioritization of corrective actions deemed necessary and appropriate.
D.
The awareness and adherence to obligations, including the assessment and prioritization of corrective actions deemed necessary and appropriate.
Answers
E.
The process of completing all forms and paperwork necessary to develop a defensible paper trail.
E.
The process of completing all forms and paperwork necessary to develop a defensible paper trail.
Answers
Suggested answer: D
asked 16/09/2024
Kris Dayananda
36 questions

Question 40

Report
Export
Collapse

CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?

A.
Risk Impact
A.
Risk Impact
Answers
B.
Domain
B.
Domain
Answers
C.
Control Specification
C.
Control Specification
Answers
Suggested answer: B
asked 16/09/2024
Rehan Malik
51 questions
Total 117 questions
Go to page: of 12