CSA - Cloud Security Alliance CCSK Practice Test - Questions Answers, Page 9
List of questions
Question 81
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
Question 82
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
Question 83
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Question 84
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
Question 85
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Question 86
When designing an encryption system, you should start with a threat model.
Question 87
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
Question 88
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
Question 89
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
Question 90
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Question