ExamGecko
Home / CSA - Cloud Security Alliance / CCSK / List of questions
Ask Question

CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report Export Collapse

In volume storage, what method is often used to support resiliency and security?

proxy encryption
proxy encryption
data rights management
data rights management
hypervisor agents
hypervisor agents
data dispersion
data dispersion
random placement
random placement
Suggested answer: D
asked 16/09/2024
Thijs van Ham
39 questions

Question 42

Report Export Collapse

What is true of security as it relates to cloud network infrastructure?

You should apply cloud firewalls on a per-network basis.
You should apply cloud firewalls on a per-network basis.
You should deploy your cloud firewalls identical to the existing firewalls.
You should deploy your cloud firewalls identical to the existing firewalls.
You should always open traffic between workloads in the same virtual subnet for better visibility.
You should always open traffic between workloads in the same virtual subnet for better visibility.
You should implement a default allow with cloud firewalls and then restrict as necessary.
You should implement a default allow with cloud firewalls and then restrict as necessary.
You should implement a default deny with cloud firewalls.
You should implement a default deny with cloud firewalls.
Suggested answer: E
asked 16/09/2024
Anne Grethe Knutsen
32 questions

Question 43

Report Export Collapse

Which statement best describes the impact of Cloud Computing on business continuity management?

A general lack of interoperability standards means that extra focus must be placed on the security aspects of migration between Cloud providers.
A general lack of interoperability standards means that extra focus must be placed on the security aspects of migration between Cloud providers.
The size of data sets hosted at a Cloud provider can present challenges if migration to another provider becomes necessary.
The size of data sets hosted at a Cloud provider can present challenges if migration to another provider becomes necessary.
Customers of SaaS providers in particular need to mitigate the risks of application lock-in.
Customers of SaaS providers in particular need to mitigate the risks of application lock-in.
Clients need to do business continuity planning due diligence in case they suddenly need to switch providers.
Clients need to do business continuity planning due diligence in case they suddenly need to switch providers.
Geographic redundancy ensures that Cloud Providers provide highly available services.
Geographic redundancy ensures that Cloud Providers provide highly available services.
Suggested answer: E
asked 16/09/2024
Andrew Vogel
42 questions

Question 44

Report Export Collapse

What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?

Platform-based Workload
Platform-based Workload
Pod
Pod
Abstraction
Abstraction
Container
Container
Virtual machine
Virtual machine
Suggested answer: D
asked 16/09/2024
Longin Winconek
45 questions

Question 45

Report Export Collapse

Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?

Planned Outages
Planned Outages
Resiliency Planning
Resiliency Planning
Expected Engineering
Expected Engineering
Chaos Engineering
Chaos Engineering
Organized Downtime
Organized Downtime
Suggested answer: D
asked 16/09/2024
marco damone
43 questions

Question 46

Report Export Collapse

What is true of companies considering a cloud computing business relationship?

The laws protecting customer data are based on the cloud provider and customer location only.
The laws protecting customer data are based on the cloud provider and customer location only.
The confidentiality agreements between companies using cloud computing services is limited legally to the company, not the provider.
The confidentiality agreements between companies using cloud computing services is limited legally to the company, not the provider.
The companies using the cloud providers are the custodians of the data entrusted to them.
The companies using the cloud providers are the custodians of the data entrusted to them.
The cloud computing companies are absolved of all data security and associated risks through contracts and data laws.
The cloud computing companies are absolved of all data security and associated risks through contracts and data laws.
The cloud computing companies own all customer data.
The cloud computing companies own all customer data.
Suggested answer: C
asked 16/09/2024
Christian Andrew TANAP
50 questions

Question 47

Report Export Collapse

Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.

False
False
True
True
Suggested answer: B
asked 16/09/2024
Herr Alexandre Fleider
46 questions

Question 48

Report Export Collapse

When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?

The metrics defining the service level required to achieve regulatory objectives.
The metrics defining the service level required to achieve regulatory objectives.
The duration of time that a security violation can occur before the client begins assessing regulatory fines.
The duration of time that a security violation can occur before the client begins assessing regulatory fines.
The cost per incident for security breaches of regulated information.
The cost per incident for security breaches of regulated information.
The regulations that are pertinent to the contract and how to circumvent them.
The regulations that are pertinent to the contract and how to circumvent them.
The type of security software which meets regulations and the number of licenses that will be needed.
The type of security software which meets regulations and the number of licenses that will be needed.
Suggested answer: A
asked 16/09/2024
Maria Telan
34 questions

Question 49

Report Export Collapse

Which cloud storage technology is basically a virtual hard drive for instanced or VMs?

Volume storage
Volume storage
Platform
Platform
Database
Database
Application
Application
Object storage
Object storage
Suggested answer: A
asked 16/09/2024
Mahendra Belgaonkar
41 questions

Question 50

Report Export Collapse

Which of the following items is NOT an example of Security as a Service (SecaaS)?

Spam filtering
Spam filtering
Authentication
Authentication
Provisioning
Provisioning
Web filtering
Web filtering
Intrusion detection
Intrusion detection
Suggested answer: C
asked 16/09/2024
Houshang Ardekani
41 questions
Total 260 questions
Go to page: of 26