Big 11.11 Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cloud Security Alliance CCSK Practice Exam with Questions & Answers | Set: 7

Questions 61

Which technique is most effective for preserving digital evidence in a cloud environment?

Options:
A.

Analyzing management plane logs

B.

Regularly backing up data

C.

Isolating the compromised system

D.

Taking snapshots of virtual machines

Cloud Security Alliance CCSK Premium Access
Questions 62

What is the primary purpose of volume storage encryption in a cloud environment?

Options:
A.

To simplify data backup procedures

B.

To secure data on virtual disks

C.

To improve virtual disk performance

D.

To reduce storage costs

Questions 63

ENISA: Which is a potential security benefit of cloud computing?

Options:
A.

More efficient and timely system updates

B.

ISO 27001 certification

C.

Provider can obfuscate system O/S and versions

D.

Greater compatibility with customer IT infrastructure

E.

Lock-In

Questions 64

How does serverless computing impact infrastructure management responsibility?

Options:
A.

Requires extensive on-premises infrastructure

B.

Shifts more responsibility to cloud service providers

C.

Increases workload for developers

D.

Eliminates need for cloud service providers

Questions 65

Which data security control is the LEAST likely to be assigned to an IaaS provider?

Options:
A.

Application logic

B.

Access controls

C.

Encryption solutions

D.

Physical destruction

E.

Asset management and tracking

Questions 66

What is the most significant security difference between traditional infrastructure and cloud computing?

Options:
A.

Management plane

B.

Intrusion detection options

C.

Secondary authentication factors

D.

Network access points

E.

Mobile security configuration options

Questions 67

Which attack surfaces, if any, does virtualization technology introduce?

Options:
A.

The hypervisor

B.

Virtualization management components apart from the hypervisor

C.

Configuration and VM sprawl issues

D.

All of the above

Questions 68

In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?

Options:
A.

The division of security responsibilities between cloud providers and customers

B.

The relationships between IaaS, PaaS, and SaaS providers

C.

The compliance with geographical data residency and sovereignty

D.

The guidance for the cloud compliance framework

Questions 69

An important consideration when performing a remote vulnerability test of a cloud-based application is to

Options:
A.

Obtain provider permission for test

B.

Use techniques to evade cloud provider’s detection systems

C.

Use application layer testing tools exclusively

D.

Use network layer testing tools exclusively

E.

Schedule vulnerability test at night

Questions 70

Which resilience tool helps distribute network or application traffic across multiple servers to ensure reliability and availability?

Options:
A.

Redundancy

B.

Auto-scaling

C.

Load balancing

D.

Failover