ExamGecko

CSA CCSK Practice Test - Questions Answers, Page 5

Question list
Search
Search

Question 41

Report
Export
Collapse

In volume storage, what method is often used to support resiliency and security?

A.
proxy encryption
A.
proxy encryption
Answers
B.
data rights management
B.
data rights management
Answers
C.
hypervisor agents
C.
hypervisor agents
Answers
D.
data dispersion
D.
data dispersion
Answers
E.
random placement
E.
random placement
Answers
Suggested answer: D
asked 16/09/2024
Thijs van Ham
36 questions

Question 42

Report
Export
Collapse

What is true of security as it relates to cloud network infrastructure?

A.
You should apply cloud firewalls on a per-network basis.
A.
You should apply cloud firewalls on a per-network basis.
Answers
B.
You should deploy your cloud firewalls identical to the existing firewalls.
B.
You should deploy your cloud firewalls identical to the existing firewalls.
Answers
C.
You should always open traffic between workloads in the same virtual subnet for better visibility.
C.
You should always open traffic between workloads in the same virtual subnet for better visibility.
Answers
D.
You should implement a default allow with cloud firewalls and then restrict as necessary.
D.
You should implement a default allow with cloud firewalls and then restrict as necessary.
Answers
E.
You should implement a default deny with cloud firewalls.
E.
You should implement a default deny with cloud firewalls.
Answers
Suggested answer: E
asked 16/09/2024
Anne Grethe Knutsen
30 questions

Question 43

Report
Export
Collapse

Which statement best describes the impact of Cloud Computing on business continuity management?

A.
A general lack of interoperability standards means that extra focus must be placed on the security aspects of migration between Cloud providers.
A.
A general lack of interoperability standards means that extra focus must be placed on the security aspects of migration between Cloud providers.
Answers
B.
The size of data sets hosted at a Cloud provider can present challenges if migration to another provider becomes necessary.
B.
The size of data sets hosted at a Cloud provider can present challenges if migration to another provider becomes necessary.
Answers
C.
Customers of SaaS providers in particular need to mitigate the risks of application lock-in.
C.
Customers of SaaS providers in particular need to mitigate the risks of application lock-in.
Answers
D.
Clients need to do business continuity planning due diligence in case they suddenly need to switch providers.
D.
Clients need to do business continuity planning due diligence in case they suddenly need to switch providers.
Answers
E.
Geographic redundancy ensures that Cloud Providers provide highly available services.
E.
Geographic redundancy ensures that Cloud Providers provide highly available services.
Answers
Suggested answer: E
asked 16/09/2024
Andrew Vogel
40 questions

Question 44

Report
Export
Collapse

What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?

A.
Platform-based Workload
A.
Platform-based Workload
Answers
B.
Pod
B.
Pod
Answers
C.
Abstraction
C.
Abstraction
Answers
D.
Container
D.
Container
Answers
E.
Virtual machine
E.
Virtual machine
Answers
Suggested answer: D
asked 16/09/2024
Longin Winconek
39 questions

Question 45

Report
Export
Collapse

Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?

A.
Planned Outages
A.
Planned Outages
Answers
B.
Resiliency Planning
B.
Resiliency Planning
Answers
C.
Expected Engineering
C.
Expected Engineering
Answers
D.
Chaos Engineering
D.
Chaos Engineering
Answers
E.
Organized Downtime
E.
Organized Downtime
Answers
Suggested answer: D
asked 16/09/2024
marco damone
41 questions

Question 46

Report
Export
Collapse

What is true of companies considering a cloud computing business relationship?

A.
The laws protecting customer data are based on the cloud provider and customer location only.
A.
The laws protecting customer data are based on the cloud provider and customer location only.
Answers
B.
The confidentiality agreements between companies using cloud computing services is limited legally to the company, not the provider.
B.
The confidentiality agreements between companies using cloud computing services is limited legally to the company, not the provider.
Answers
C.
The companies using the cloud providers are the custodians of the data entrusted to them.
C.
The companies using the cloud providers are the custodians of the data entrusted to them.
Answers
D.
The cloud computing companies are absolved of all data security and associated risks through contracts and data laws.
D.
The cloud computing companies are absolved of all data security and associated risks through contracts and data laws.
Answers
E.
The cloud computing companies own all customer data.
E.
The cloud computing companies own all customer data.
Answers
Suggested answer: C
asked 16/09/2024
Christian Andrew TANAP
41 questions

Question 47

Report
Export
Collapse

Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.

A.
False
A.
False
Answers
B.
True
B.
True
Answers
Suggested answer: B
asked 16/09/2024
Herr Alexandre Fleider
39 questions

Question 48

Report
Export
Collapse

When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?

A.
The metrics defining the service level required to achieve regulatory objectives.
A.
The metrics defining the service level required to achieve regulatory objectives.
Answers
B.
The duration of time that a security violation can occur before the client begins assessing regulatory fines.
B.
The duration of time that a security violation can occur before the client begins assessing regulatory fines.
Answers
C.
The cost per incident for security breaches of regulated information.
C.
The cost per incident for security breaches of regulated information.
Answers
D.
The regulations that are pertinent to the contract and how to circumvent them.
D.
The regulations that are pertinent to the contract and how to circumvent them.
Answers
E.
The type of security software which meets regulations and the number of licenses that will be needed.
E.
The type of security software which meets regulations and the number of licenses that will be needed.
Answers
Suggested answer: A
asked 16/09/2024
Maria Telan
32 questions

Question 49

Report
Export
Collapse

Which cloud storage technology is basically a virtual hard drive for instanced or VMs?

A.
Volume storage
A.
Volume storage
Answers
B.
Platform
B.
Platform
Answers
C.
Database
C.
Database
Answers
D.
Application
D.
Application
Answers
E.
Object storage
E.
Object storage
Answers
Suggested answer: A
asked 16/09/2024
Mahendra Belgaonkar
36 questions

Question 50

Report
Export
Collapse

Which of the following items is NOT an example of Security as a Service (SecaaS)?

A.
Spam filtering
A.
Spam filtering
Answers
B.
Authentication
B.
Authentication
Answers
C.
Provisioning
C.
Provisioning
Answers
D.
Web filtering
D.
Web filtering
Answers
E.
Intrusion detection
E.
Intrusion detection
Answers
Suggested answer: C
asked 16/09/2024
Houshang Ardekani
39 questions
Total 117 questions
Go to page: of 12