Download Certificate of Cloud Security Knowledge.CCSK.VCEplus.2020-05-04.60q.vcex

Vendor: CSA
Exam Code: CCSK
Exam Name: Certificate of Cloud Security Knowledge
Date: May 04, 2020
File Size: 31 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
All cloud services utilize virtualization technologies.
  1. False
  2. True
Correct answer: B
Question 2
If there are gaps in network logging data, what can you do?
  1. Nothing. There are simply limitations around the data that can be logged in the cloud.
  2. Ask the cloud provider to open more ports.
  3. You can instrument the technology stack with your own logging.
  4. Ask the cloud provider to close more ports.
  5. Nothing. The cloud provider must make the information available.
Correct answer: C
Question 3
CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
  1. Risk Impact
  2. Domain
  3. Control Specification
Correct answer: C
Question 4
Who is responsible for the security of the physical infrastructure and virtualization platform?
  1. The cloud consumer
  2. The majority is covered by the consumer
  3. It depends on the agreement
  4. The responsibility is split equally
  5. The cloud provider
Correct answer: E
Question 5
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
  1. The physical location of the data and how it is accessed
  2. The fragmentation and encryption algorithms employed
  3. The language of the data and how it affects the user
  4. The implications of storing complex information on simple storage systems
  5. The actual size of the data and the storage format
Correct answer: D
Question 6
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
  1. Platform-as-a-service (PaaS)
  2. Desktop-as-a-service (DaaS)
  3. Infrastructure-as-a-service (IaaS)
  4. Identity-as-a-service (IDaaS)
  5. Software-as-a-service (SaaS)
Correct answer: A
Question 7
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 - Policy GRM 07 - Policy Enforcement GRM 08 - Policy Impact on Risk Assessments GRM 09 - Policy Reviews GRM 10 - Risk Assessments GRM 11 - Risk Management Framework
  1. Governance and Retention Management
  2. Governance and Risk Management
  3. Governing and Risk Metrics
Correct answer: B
Question 8
Which attack surfaces, if any, does virtualization technology introduce?
  1. The hypervisor
  2. Virtualization management components apart from the hypervisor
  3. Configuration and VM sprawl issues
  4. All of the above 
Correct answer: D
Question 9
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
  1. False
  2. True
Correct answer: B
Question 10
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
  1. The on demand self-service nature of cloud computing environments.
  2. Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident.
  3. The possibility of data crossing geographic or jurisdictional boundaries.
  4. Object-based storage in a private cloud.
  5. The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures.
Correct answer: B

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!