New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cloud Security Alliance CCSK Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?

Options:
A.

Multi-tenancy

B.

Nation-state boundaries

C.

Measured service

D.

Unlimited bandwidth

E.

Hybrid clouds

Questions 22

What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?

Options:
A.

The physical location of the data and how it is accessed

B.

The fragmentation and encryption algorithms employed

C.

The language of the data and how it affects the user

D.

The implications of storing complex information on simple storage systems

E.

The actual size of the data and the storage format

Questions 23

What is a potential concern of using Security-as-a-Service (SecaaS)?

Options:
A.

Lack of visibility

B.

Deployment flexibility

C.

Scaling and costs

D.

Intelligence sharing

E.

Insulation of clients

Questions 24

Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?

Options:
A.

Management Console

B.

Management plane

C.

Orchestrators

D.

Abstraction layer

Questions 25

Select the statement below which best describes the relationship between identities and attributes

Options:
A.

Attributes belong to entities and identities belong to attributes. Each attribute can have multiple identities but only one entity.

B.

An attribute is a unique object within a database. Each attribute it has a number of identities which help define its parameters.

C.

An identity is a distinct and unique object within a particular namespace. Attributes are properties which belong to an identity. Each identity can have multiple attributes.

D.

Attributes are made unique by their identities.

E.

Identities are the network names given to servers. Attributes are the characteristics of each server.

Questions 26

Network logs from cloud providers are typically flow records, not full packet captures.

Options:
A.

False

B.

True

Questions 27

When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?

Options:
A.

All CSPs use the same organizational structure and terminology

B.

Different CSPs may have similar structures but use varying terminology

C.

CSPs have vastly different organizational structures and identical terminology

D.

Terminology difference in CSPs does not affect cybersecurity practices.

Questions 28

If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.

Options:
A.

False

B.

True

Questions 29

What tool allows teams to easily locate and integrate with approved cloud services?

Options:
A.

Contracts

B.

Shared Responsibility Model

C.

Service Registry

D.

Risk Register

Questions 30

Without virtualization, there is no cloud.

Options:
A.

False

B.

True