ExamGecko
Home / CSA - Cloud Security Alliance / CCSK / List of questions
Ask Question

CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

How is encryption managed on multi-tenant storage?

Single key for all data owners
Single key for all data owners
One key per data owner
One key per data owner
Multiple keys per data owner
Multiple keys per data owner
The answer could be A, B, or C depending on the provider
The answer could be A, B, or C depending on the provider
C for data subject to the EU Data Protection Directive; B for all others
C for data subject to the EU Data Protection Directive; B for all others
Suggested answer: B
asked 16/09/2024
Christian Walet
43 questions

Question 52

Report Export Collapse

Which statement best describes why it is important to know how data is being accessed?

The devices used to access data have different storage formats.
The devices used to access data have different storage formats.
The devices used to access data use a variety of operating systems and may have different programs installed on them.
The devices used to access data use a variety of operating systems and may have different programs installed on them.
The device may affect data dispersion.
The device may affect data dispersion.
The devices used to access data use a variety of applications or clients and may have different security characteristics.
The devices used to access data use a variety of applications or clients and may have different security characteristics.
The devices used to access data may have different ownership characteristics.
The devices used to access data may have different ownership characteristics.
Suggested answer: D
asked 16/09/2024
DAVID STAATZ
49 questions

Question 53

Report Export Collapse

What is resource pooling?

The provider’s computing resources are pooled to serve multiple consumers.
The provider’s computing resources are pooled to serve multiple consumers.
Internet-based CPUs are pooled to enable multi-threading.
Internet-based CPUs are pooled to enable multi-threading.
The dedicated computing resources of each client are pooled together in a colocation facility.
The dedicated computing resources of each client are pooled together in a colocation facility.
Placing Internet (β€œcloud”) data centers near multiple sources of energy, such as hydroelectric dams.
Placing Internet (β€œcloud”) data centers near multiple sources of energy, such as hydroelectric dams.
None of the above.
None of the above.
Suggested answer: A
asked 16/09/2024
Aviv Beck
46 questions

Question 54

Report Export Collapse

Your SLA with your cloud provider ensures continuity for all services.

False
False
True
True
Suggested answer: A
asked 16/09/2024
Jonathan McGurgan
39 questions

Question 55

Report Export Collapse

Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?

Intrusion Prevention System
Intrusion Prevention System
URL filters
URL filters
Data Loss Prevention
Data Loss Prevention
Cloud Access and Security Brokers (CASB)
Cloud Access and Security Brokers (CASB)
Database Activity Monitoring
Database Activity Monitoring
Suggested answer: A
asked 16/09/2024
Ehsan Ali
46 questions

Question 56

Report Export Collapse

In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?

Multi-application, single tenant environments
Multi-application, single tenant environments
Long distance relationships
Long distance relationships
Multi-tenant environments
Multi-tenant environments
Distributed computing arrangements
Distributed computing arrangements
Single tenant environments
Single tenant environments
Suggested answer: C
asked 16/09/2024
Derrick Roberson
38 questions

Question 57

Report Export Collapse

ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:

Become a Premium Member for full access
  Unlock Premium Member

Question 58

Report Export Collapse

What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?

Become a Premium Member for full access
  Unlock Premium Member

Question 59

Report Export Collapse

ENISA: A reason for risk concerns of a cloud provider being acquired is:

Become a Premium Member for full access
  Unlock Premium Member

Question 60

Report Export Collapse

Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?

Become a Premium Member for full access
  Unlock Premium Member
Total 288 questions
Go to page: of 29