ExamGecko

CSA CCSK Practice Test - Questions Answers, Page 8

Question list
Search
Search

Question 71

Report
Export
Collapse

How should an SDLC be modified to address application security in a Cloud Computing environment?

A.
Integrated development environments
A.
Integrated development environments
Answers
B.
Updated threat and trust models
B.
Updated threat and trust models
Answers
C.
No modification is needed
C.
No modification is needed
Answers
D.
Just-in-time compilers
D.
Just-in-time compilers
Answers
E.
Both B and C
E.
Both B and C
Answers
Suggested answer: A
asked 16/09/2024
John Kaye
29 questions

Question 72

Report
Export
Collapse

Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?

A.
Data Security and Encryption
A.
Data Security and Encryption
Answers
B.
Information Governance
B.
Information Governance
Answers
C.
Incident Response, Notification and Remediation
C.
Incident Response, Notification and Remediation
Answers
D.
Compliance and Audit Management
D.
Compliance and Audit Management
Answers
E.
Infrastructure Security
E.
Infrastructure Security
Answers
Suggested answer: C
asked 16/09/2024
louishn vn
33 questions

Question 73

Report
Export
Collapse

Which opportunity helps reduce common application security issues?

A.
Elastic infrastructure
A.
Elastic infrastructure
Answers
B.
Default deny
B.
Default deny
Answers
C.
Decreased use of micro-services
C.
Decreased use of micro-services
Answers
D.
Segregation by default
D.
Segregation by default
Answers
E.
Fewer serverless configurations
E.
Fewer serverless configurations
Answers
Suggested answer: A
asked 16/09/2024
DOMINIC FERNANDEZ
40 questions

Question 74

Report
Export
Collapse

What is the most significant security difference between traditional infrastructure and cloud computing?

A.
Management plane
A.
Management plane
Answers
B.
Intrusion detection options
B.
Intrusion detection options
Answers
C.
Secondary authentication factors
C.
Secondary authentication factors
Answers
D.
Network access points
D.
Network access points
Answers
E.
Mobile security configuration options
E.
Mobile security configuration options
Answers
Suggested answer: A
asked 16/09/2024
Thomas Spring
28 questions

Question 75

Report
Export
Collapse

A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.

A.
False
A.
False
Answers
B.
True
B.
True
Answers
Suggested answer: A
asked 16/09/2024
Florence Li
39 questions

Question 76

Report
Export
Collapse

When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?

A.
The CSP server facility
A.
The CSP server facility
Answers
B.
The logs of all customers in a multi-tenant cloud
B.
The logs of all customers in a multi-tenant cloud
Answers
C.
The network components controlled by the CSP
C.
The network components controlled by the CSP
Answers
D.
The CSP office spaces
D.
The CSP office spaces
Answers
E.
Their own virtual instances in the cloud
E.
Their own virtual instances in the cloud
Answers
Suggested answer: E
asked 16/09/2024
Peter Klaffehn
45 questions

Question 77

Report
Export
Collapse

If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?

A.
It may require a subpoena of the provider directly
A.
It may require a subpoena of the provider directly
Answers
B.
It would require a previous access agreement
B.
It would require a previous access agreement
Answers
C.
It would require an act of war
C.
It would require an act of war
Answers
D.
It would require a previous contractual agreement to obtain the application or access to the environment
D.
It would require a previous contractual agreement to obtain the application or access to the environment
Answers
E.
It would never be obtained in this situation
E.
It would never be obtained in this situation
Answers
Suggested answer: D
asked 16/09/2024
Paul Beugelsdijk
40 questions

Question 78

Report
Export
Collapse

The containment phase of the incident response lifecycle requires taking systems offline.

A.
False
A.
False
Answers
B.
True
B.
True
Answers
Suggested answer: B
asked 16/09/2024
Mohand TIMSILINE
41 questions

Question 79

Report
Export
Collapse

What are the primary security responsibilities of the cloud provider in compute virtualizations?

A.
Enforce isolation and maintain a secure virtualization infrastructure
A.
Enforce isolation and maintain a secure virtualization infrastructure
Answers
B.
Monitor and log workloads and configure the security settings
B.
Monitor and log workloads and configure the security settings
Answers
C.
Enforce isolation and configure the security settings
C.
Enforce isolation and configure the security settings
Answers
D.
Maintain a secure virtualization infrastructure and configure the security settings
D.
Maintain a secure virtualization infrastructure and configure the security settings
Answers
E.
Enforce isolation and monitor and log workloads
E.
Enforce isolation and monitor and log workloads
Answers
Suggested answer: A
asked 16/09/2024
Eduardo Bravo
38 questions

Question 80

Report
Export
Collapse

What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?

A.
A data destruction plan
A.
A data destruction plan
Answers
B.
A communication plan
B.
A communication plan
Answers
C.
A back-up website
C.
A back-up website
Answers
D.
A spill remediation kit
D.
A spill remediation kit
Answers
E.
A rainy day fund
E.
A rainy day fund
Answers
Suggested answer: B
asked 16/09/2024
Frantisek Kohanyi Kohanyi
37 questions
Total 117 questions
Go to page: of 12