New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cloud Security Alliance CCSK Practice Exam with Questions & Answers | Set: 4

Questions 31

What is an advantage of using Kubernetes for container orchestration?

Options:
A.

Limited deployment options

B.

Manual management of resources

C.

Automation of deployment and scaling

D.

Increased hardware dependency

Cloud Security Alliance CCSK Premium Access
Questions 32

Which approach creates a secure network, invisible to unauthorized users?

Options:
A.

Firewalls

B.

Software-Defined Perimeter (SDP)

C.

Virtual Private Network (VPN)

D.

Intrusion Detection System (IDS)

Questions 33

Which aspect of cybersecurity can AI enhance by reducing false positive alerts?

Options:
A.

Anomaly detection

B.

Assisting analysts

C.

Threat intelligence

D.

Automated responses

Questions 34

CCM: The following list of controls belong to which domain of the CCM?

GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework

Options:
A.

Governance and Retention Management

B.

Governance and Risk Management

C.

Governing and Risk Metrics

Questions 35

What is a key component of governance in the context of cybersecurity?

Options:
A.

Defining roles and responsibilities

B.

Standardizing technical specifications for security control

C.

Defining tools and technologies

D.

Enforcement of the Penetration Testing procedure

Questions 36

What is true of security as it relates to cloud network infrastructure?

Options:
A.

You should apply cloud firewalls on a per-network basis.

B.

You should deploy your cloud firewalls identical to the existing firewalls.

C.

You should always open traffic between workloads in the same virtual subnet for better visibility.

D.

You should implement a default allow with cloud firewalls and then restrict as necessary.

E.

You should implement a default deny with cloud firewalls.

Questions 37

When mapping functions to lifecycle phases, which functions are required to successfully process data?

Options:
A.

Create, Store, Use, and Share

B.

Create and Store

C.

Create and Use

D.

Create, Store, and Use

E.

Create, Use, Store, and Delete

Questions 38

What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?

Options:
A.

Allowing the cloud provider to manage your keys so that they have the ability to access and delete the data from the main and back-up storage.

B.

Maintaining customer managed key management and revoking or deleting keys from the key management system to prevent the data from being accessed again.

C.

Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data.

D.

Keep the keys stored on the client side so that they are secure and so that the users have the ability to delete their own data.

E.

Both B and D.

Questions 39

Who is responsible for the security of the physical infrastructure and virtualization platform?

Options:
A.

The cloud consumer

B.

The majority is covered by the consumer

C.

It depends on the agreement

D.

The responsibility is split equally

E.

The cloud provider

Questions 40

Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?

Options:
A.

Data Security and Encryption

B.

Information Governance

C.

Incident Response, Notification and Remediation

D.

Compliance and Audit Management

E.

Infrastructure Security