ExamGecko
Home / CSA / CCSK
Ask Question

CSA CCSK Practice Test - Questions Answers, Page 7

Question list
Search

Question 61

Report
Export
Collapse

A cloud deployment of two or more unique clouds is known as:

Infrastructures as a Service
Infrastructures as a Service
A Private Cloud
A Private Cloud
A Community Cloud
A Community Cloud
A Hybrid Cloud
A Hybrid Cloud
Jericho Cloud Cube Model
Jericho Cloud Cube Model
Suggested answer: C
asked 16/09/2024
Nicoleta Moglan
37 questions

Question 62

Report
Export
Collapse

ENISA: Which is not one of the five key legal issues common across all scenarios:

Data protection
Data protection
Professional negligence
Professional negligence
Globalization
Globalization
Intellectual property
Intellectual property
Outsourcing services and changes in control
Outsourcing services and changes in control
Suggested answer: C
asked 16/09/2024
Hristo Slaveev
25 questions

Question 63

Report
Export
Collapse

ENISA: An example high risk role for malicious insiders within a Cloud Provider includes

Sales
Sales
Marketing
Marketing
Legal counsel
Legal counsel
Auditors
Auditors
Accounting
Accounting
Suggested answer: D
asked 16/09/2024
James Younger
36 questions

Question 64

Report
Export
Collapse

What are the primary security responsibilities of the cloud provider in the management infrastructure?

Building and properly configuring a secure network infrastructure
Building and properly configuring a secure network infrastructure
Configuring second factor authentication across the network
Configuring second factor authentication across the network
Properly configuring the deployment of the virtual network, especially the firewalls
Properly configuring the deployment of the virtual network, especially the firewalls
Properly configuring the deployment of the virtual network, except the firewalls
Properly configuring the deployment of the virtual network, except the firewalls
Providing as many API endpoints as possible for custom access and configurations
Providing as many API endpoints as possible for custom access and configurations
Suggested answer: D
asked 16/09/2024
shafinaaz hossenny
39 questions

Question 65

Report
Export
Collapse

What is true of a workload?

It is a unit of processing that consumes memory
It is a unit of processing that consumes memory
It does not require a hardware stack
It does not require a hardware stack
It is always a virtual machine
It is always a virtual machine
It is configured for specific, established tasks
It is configured for specific, established tasks
It must be containerized
It must be containerized
Suggested answer: A
asked 16/09/2024
Frantisek Kohanyi Kohanyi
37 questions

Question 66

Report
Export
Collapse

ENISA: Which is a potential security benefit of cloud computing?

More efficient and timely system updates
More efficient and timely system updates
ISO 27001 certification
ISO 27001 certification
Provider can obfuscate system O/S and versions
Provider can obfuscate system O/S and versions
Greater compatibility with customer IT infrastructure
Greater compatibility with customer IT infrastructure
Lock-In
Lock-In
Suggested answer: A
asked 16/09/2024
Bob Xiong
38 questions

Question 67

Report
Export
Collapse

The Software Defined Perimeter (SDP) includes which components?

Client, Controller, and Gateway
Client, Controller, and Gateway
Client, Controller, Firewall, and Gateway
Client, Controller, Firewall, and Gateway
Client, Firewall, and Gateway
Client, Firewall, and Gateway
Controller, Firewall, and Gateway
Controller, Firewall, and Gateway
Client, Controller, and Firewall
Client, Controller, and Firewall
Suggested answer: A
asked 16/09/2024
Rene Claassen
38 questions

Question 68

Report
Export
Collapse

Which cloud security model type provides generalized templates for helping implement cloud security?

Conceptual models or frameworks
Conceptual models or frameworks
Design patterns
Design patterns
Controls models or frameworks
Controls models or frameworks
Reference architectures
Reference architectures
Cloud Controls Matrix (CCM)
Cloud Controls Matrix (CCM)
Suggested answer: D
asked 16/09/2024
Leandro Zaneratto
46 questions

Question 69

Report
Export
Collapse

Select the statement below which best describes the relationship between identities and attributes

Attributes belong to entities and identities belong to attributes. Each attribute can have multiple identities but only one entity.
Attributes belong to entities and identities belong to attributes. Each attribute can have multiple identities but only one entity.
An attribute is a unique object within a database. Each attribute it has a number of identities which help define its parameters.
An attribute is a unique object within a database. Each attribute it has a number of identities which help define its parameters.
An identity is a distinct and unique object within a particular namespace. Attributes are properties which belong to an identity. Each identity can have multiple attributes.
An identity is a distinct and unique object within a particular namespace. Attributes are properties which belong to an identity. Each identity can have multiple attributes.
Attributes are made unique by their identities.
Attributes are made unique by their identities.
Identities are the network names given to servers. Attributes are the characteristics of each server.
Identities are the network names given to servers. Attributes are the characteristics of each server.
Suggested answer: D
asked 16/09/2024
Hicham Jellab
44 questions

Question 70

Report
Export
Collapse

What is a potential concern of using Security-as-a-Service (SecaaS)?

Lack of visibility
Lack of visibility
Deployment flexibility
Deployment flexibility
Scaling and costs
Scaling and costs
Intelligence sharing
Intelligence sharing
Insulation of clients
Insulation of clients
Suggested answer: A
asked 16/09/2024
ME BOX
30 questions
Total 117 questions
Go to page: of 12