Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cloud Security Alliance CCSK Practice Exam with Questions & Answers | Set: 2

Questions 11

Containers are highly portable code execution environments.

Options:
A.

False

B.

True

Questions 12

What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?

Options:
A.

Allowing the cloud provider to manage your keys so that they have the ability to access and delete the data from the main and back-up storage.

B.

Maintaining customer managed key management and revoking or deleting keys from the key management system to prevent the data from being accessed again.

C.

Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data.

D.

Keep the keys stored on the client side so that they are secure and so that the users have the ability to delete their own data.

E.

Both B and D.

Questions 13

Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?

Options:
A.

Continuous Build, Integration, and Testing

B.

Continuous Delivery and Deployment

C.

Secure Design and Architecture

D.

Secure Coding

Questions 14

What does orchestration automate within a cloud environment?

Options:
A.

Monitoring application performance

B.

Manual configuration of security policies

C.

Installation of operating systems

D.

Provisioning of VMs, networking and other resources

Questions 15

When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?

Options:
A.

Network Attached Storage (NAS)

B.

Block storage

C.

File storage

D.

Object storage

Questions 16

What is the primary focus during the Preparation phase of the Cloud Incident Response framework?

Options:
A.

Developing a cloud service provider evaluation criterion

B.

Deploying automated security monitoring tools across cloud services

C.

Establishing a Cloud Incident Response Team and response plans

D.

Conducting regular vulnerability assessments on cloud infrastructure

Questions 17

What is defined as the process by which an opposing party may obtain private documents for use in litigation?

Options:
A.

Discovery

B.

Custody

C.

Subpoena

D.

Risk Assessment

E.

Scope

Questions 18

Which of the following is NOT a cloud computing characteristic that impacts incidence response?

Options:
A.

The on demand self-service nature of cloud computing environments.

B.

Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident.

C.

The possibility of data crossing geographic or jurisdictional boundaries.

D.

Object-based storage in a private cloud.

E.

The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures.

Questions 19

What is a common characteristic of default encryption provided by cloud providers for data at rest?

Options:
A.

It is not available without an additional premium service

B.

It always requires the customer's own encryption keys

C.

It uses the cloud provider's keys, often at no additional cost

D.

It does not support encryption for data at rest

Questions 20

What is a key benefit of using customer-managed encryption keys with cloud key management service (KMS)?

Options:
A.

Customers can bypass the need for encryption

B.

Customers retain control over their encryption keys

C.

Customers can share their encryption keys more easily

D.

It reduces the computational load on the cloud service provider