Download Certificate of Cloud Security Knowledge.CCSK.Pass4Sure.2020-05-04.24q.vcex

Vendor: CSA
Exam Code: CCSK
Exam Name: Certificate of Cloud Security Knowledge
Date: May 04, 2020
File Size: 16 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
All cloud services utilize virtualization technologies.
  1. False
  2. True
Correct answer: B
Question 2
If there are gaps in network logging data, what can you do?
  1. Nothing. There are simply limitations around the data that can be logged in the cloud.
  2. Ask the cloud provider to open more ports.
  3. You can instrument the technology stack with your own logging.
  4. Ask the cloud provider to close more ports.
  5. Nothing. The cloud provider must make the information available.
Correct answer: C
Question 3
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
  1. The physical location of the data and how it is accessed
  2. The fragmentation and encryption algorithms employed
  3. The language of the data and how it affects the user
  4. The implications of storing complex information on simple storage systems
  5. The actual size of the data and the storage format
Correct answer: D
Question 4
CCM: The following list of controls belong to which domain of the CCM? 
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
  1. Governance and Retention Management
  2. Governance and Risk Management
  3. Governing and Risk Metrics
Correct answer: B
Question 5
Big data includes high volume, high variety, and high velocity.
  1. False
  2. True
Correct answer: B
Question 6
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
  1. False
  2. True
Correct answer: B
Question 7
An important consideration when performing a remote vulnerability test of a cloud-based application is to
  1. Obtain provider permission for test
  2. Use techniques to evade cloud provider’s detection systems
  3. Use application layer testing tools exclusively
  4. Use network layer testing tools exclusively
  5. Schedule vulnerability test at night
Correct answer: A
Question 8
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
  1. Rapid elasticity
  2. Resource pooling
  3. Broad network access
  4. Measured service
  5. On-demand self-service
Correct answer: E
Question 9
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
  1. False
  2. True
Correct answer: B
Question 10
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
  1. Inspect and account for risks inherited from other members of the cloud supply chain and take active measures to mitigate and contain risks through operational resiliency.
  2. Respect the interdependency of the risks inherent in the cloud supply chain and communicate the corporate risk posture and readiness to consumers and dependent parties.
  3. Negotiate long-term contracts with companies who use well-vetted software application to avoid the transient nature of the cloud environment.
  4. Provide transparency to stakeholders and shareholders demonstrating fiscal solvency and organizational transparency.
  5. Both B and C.
Correct answer: C

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!