ExamGecko
Home / CSA / CCSK / List of questions
Ask Question

CSA CCSK Practice Test - Questions Answers, Page 6

Question list
Search

Question 51

Report
Export
Collapse

How is encryption managed on multi-tenant storage?

Single key for all data owners
Single key for all data owners
One key per data owner
One key per data owner
Multiple keys per data owner
Multiple keys per data owner
The answer could be A, B, or C depending on the provider
The answer could be A, B, or C depending on the provider
C for data subject to the EU Data Protection Directive; B for all others
C for data subject to the EU Data Protection Directive; B for all others
Suggested answer: B
asked 16/09/2024
Christian Walet
35 questions

Question 52

Report
Export
Collapse

Which statement best describes why it is important to know how data is being accessed?

The devices used to access data have different storage formats.
The devices used to access data have different storage formats.
The devices used to access data use a variety of operating systems and may have different programs installed on them.
The devices used to access data use a variety of operating systems and may have different programs installed on them.
The device may affect data dispersion.
The device may affect data dispersion.
The devices used to access data use a variety of applications or clients and may have different security characteristics.
The devices used to access data use a variety of applications or clients and may have different security characteristics.
The devices used to access data may have different ownership characteristics.
The devices used to access data may have different ownership characteristics.
Suggested answer: D
asked 16/09/2024
DAVID STAATZ
40 questions

Question 53

Report
Export
Collapse

What is resource pooling?

The provider’s computing resources are pooled to serve multiple consumers.
The provider’s computing resources are pooled to serve multiple consumers.
Internet-based CPUs are pooled to enable multi-threading.
Internet-based CPUs are pooled to enable multi-threading.
The dedicated computing resources of each client are pooled together in a colocation facility.
The dedicated computing resources of each client are pooled together in a colocation facility.
Placing Internet (“cloud”) data centers near multiple sources of energy, such as hydroelectric dams.
Placing Internet (“cloud”) data centers near multiple sources of energy, such as hydroelectric dams.
None of the above.
None of the above.
Suggested answer: A
asked 16/09/2024
Aviv Beck
41 questions

Question 54

Report
Export
Collapse

Your SLA with your cloud provider ensures continuity for all services.

False
False
True
True
Suggested answer: A
asked 16/09/2024
Jonathan McGurgan
34 questions

Question 55

Report
Export
Collapse

Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?

Intrusion Prevention System
Intrusion Prevention System
URL filters
URL filters
Data Loss Prevention
Data Loss Prevention
Cloud Access and Security Brokers (CASB)
Cloud Access and Security Brokers (CASB)
Database Activity Monitoring
Database Activity Monitoring
Suggested answer: A
asked 16/09/2024
Ehsan Ali
40 questions

Question 56

Report
Export
Collapse

In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?

Multi-application, single tenant environments
Multi-application, single tenant environments
Long distance relationships
Long distance relationships
Multi-tenant environments
Multi-tenant environments
Distributed computing arrangements
Distributed computing arrangements
Single tenant environments
Single tenant environments
Suggested answer: C
asked 16/09/2024
Derrick Roberson
35 questions

Question 57

Report
Export
Collapse

ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:

Lack of completeness and transparency in terms of use
Lack of completeness and transparency in terms of use
Lack of information on jurisdictions
Lack of information on jurisdictions
No source escrow agreement
No source escrow agreement
Unclear asset ownership
Unclear asset ownership
Audit or certification not available to customers
Audit or certification not available to customers
Suggested answer: A
asked 16/09/2024
Shirish Astagikar
39 questions

Question 58

Report
Export
Collapse

What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?

Allowing the cloud provider to manage your keys so that they have the ability to access and delete the data from the main and back-up storage.
Allowing the cloud provider to manage your keys so that they have the ability to access and delete the data from the main and back-up storage.
Maintaining customer managed key management and revoking or deleting keys from the key management system to prevent the data from being accessed again.
Maintaining customer managed key management and revoking or deleting keys from the key management system to prevent the data from being accessed again.
Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data.
Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data.
Keep the keys stored on the client side so that they are secure and so that the users have the ability to delete their own data.
Keep the keys stored on the client side so that they are secure and so that the users have the ability to delete their own data.
Both B and D.
Both B and D.
Suggested answer: B
asked 16/09/2024
Sam Krupesh
38 questions

Question 59

Report
Export
Collapse

ENISA: A reason for risk concerns of a cloud provider being acquired is:

Arbitrary contract termination by acquiring company
Arbitrary contract termination by acquiring company
Resource isolation may fail
Resource isolation may fail
Provider may change physical location
Provider may change physical location
Mass layoffs may occur
Mass layoffs may occur
Non-binding agreements put at risk
Non-binding agreements put at risk
Suggested answer: E
asked 16/09/2024
Carlos Eduardo Araujo Fonseca
38 questions

Question 60

Report
Export
Collapse

Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?

Software Development Kits (SDKs)
Software Development Kits (SDKs)
Resource Description Framework (RDF)
Resource Description Framework (RDF)
Extensible Markup Language (XML)
Extensible Markup Language (XML)
Application Binary Interface (ABI)
Application Binary Interface (ABI)
Application Programming Interface (API)
Application Programming Interface (API)
Suggested answer: E
asked 16/09/2024
Hans Walter Katzengruber
27 questions
Total 117 questions
Go to page: of 12