ExamGecko
Home / CSA / CCSK / List of questions
Ask Question

CSA CCSK Practice Test - Questions Answers, Page 9

Question list
Search

Question 81

Report
Export
Collapse

Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?

Auditors working in the interest of the cloud customer
Auditors working in the interest of the cloud customer
Independent auditors
Independent auditors
Certified by CSA
Certified by CSA
Auditors working in the interest of the cloud provider
Auditors working in the interest of the cloud provider
None of the above
None of the above
Suggested answer: B
asked 16/09/2024
BETTE SLETTER
35 questions

Question 82

Report
Export
Collapse

Which of the following statements is true in regards to Data Loss Prevention (DLP)?

DLP can provide options for quickly deleting all of the data stored in a cloud environment.
DLP can provide options for quickly deleting all of the data stored in a cloud environment.
DLP can classify all data in a storage repository.
DLP can classify all data in a storage repository.
DLP never provides options for how data found in violation of a policy can be handled.
DLP never provides options for how data found in violation of a policy can be handled.
DLP can provide options for where data is stored.
DLP can provide options for where data is stored.
DLP can provide options for how data found in violation of a policy can be handled.
DLP can provide options for how data found in violation of a policy can be handled.
Suggested answer: E
asked 16/09/2024
Nipunika Jayasundara
36 questions

Question 83

Report
Export
Collapse

CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?

Service Provider or Tenant/Consumer
Service Provider or Tenant/Consumer
Physical, Network, Compute, Storage, Application or Data
Physical, Network, Compute, Storage, Application or Data
SaaS, PaaS or IaaS
SaaS, PaaS or IaaS
Suggested answer: C
asked 16/09/2024
Russell Ang
34 questions

Question 84

Report
Export
Collapse

For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?

Scope of the assessment and the exact included features and services for the assessment
Scope of the assessment and the exact included features and services for the assessment
Provider infrastructure information including maintenance windows and contracts
Provider infrastructure information including maintenance windows and contracts
Network or architecture diagrams including all end point security devices in use
Network or architecture diagrams including all end point security devices in use
Service-level agreements between all parties
Service-level agreements between all parties
Full API access to all required services
Full API access to all required services
Suggested answer: C
asked 16/09/2024
Sandeep Ramakrishnan
49 questions

Question 85

Report
Export
Collapse

When mapping functions to lifecycle phases, which functions are required to successfully process data?

Create, Store, Use, and Share
Create, Store, Use, and Share
Create and Store
Create and Store
Create and Use
Create and Use
Create, Store, and Use
Create, Store, and Use
Create, Use, Store, and Delete
Create, Use, Store, and Delete
Suggested answer: A
asked 16/09/2024
Rahul Chugh
38 questions

Question 86

Report
Export
Collapse

When designing an encryption system, you should start with a threat model.

False
False
True
True
Suggested answer: B
asked 16/09/2024
Georgescu Andrei
39 questions

Question 87

Report
Export
Collapse

Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?

Become a Premium Member for full access
  Unlock Premium Member

Question 88

Report
Export
Collapse

What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?

Become a Premium Member for full access
  Unlock Premium Member

Question 89

Report
Export
Collapse

Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.

Become a Premium Member for full access
  Unlock Premium Member

Question 90

Report
Export
Collapse

How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?

Become a Premium Member for full access
  Unlock Premium Member
Total 117 questions
Go to page: of 12