Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cloud Security Alliance CCSK Practice Exam with Questions & Answers | Set: 8

Questions 71

What of the following is NOT an essential characteristic of cloud computing?

Options:
A.

Broad Network Access

B.

Measured Service

C.

Third Party Service

D.

Rapid Elasticity

E.

Resource Pooling

Questions 72

ENISA: Which is a potential security benefit of cloud computing?

Options:
A.

More efficient and timely system updates

B.

ISO 27001 certification

C.

Provider can obfuscate system O/S and versions

D.

Greater compatibility with customer IT infrastructure

E.

Lock-In

Questions 73

The Software Defined Perimeter (SDP) includes which components?

Options:
A.

Client, Controller, and Gateway

B.

Client, Controller, Firewall, and Gateway

C.

Client, Firewall, and Gateway

D.

Controller, Firewall, and Gateway

E.

Client, Controller, and Firewall

Questions 74

In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?

Options:
A.

To encrypt data within VMs for secure storage

B.

To facilitate direct manual intervention in VM deployments

C.

To enable rapid scaling of virtual machines on demand

D.

To ensure consistency, security, and efficiency in VM image creation

Questions 75

A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.

Options:
A.

False

B.

True

Questions 76

Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?

Options:
A.

CSP firewall

B.

Virtual Appliance

C.

Web Application Firewall

D.

Intrusion Detection System

Questions 77

Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?

Options:
A.

The process of specifying and maintaining access policies

B.

Checking data storage to make sure it meets compliance requirements

C.

Giving a third party vendor permission to work on your cloud solution

D.

Establishing/asserting the identity to the application

E.

Enforcing the rules by which access is granted to the resources

Questions 78

What method can be utilized along with data fragmentation to enhance security?

Options:
A.

Encryption

B.

Organization

C.

Knowledge management

D.

IDS

E.

Insulation

Questions 79

Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?

Options:
A.

Intrusion Prevention System

B.

URL filters

C.

Data Loss Prevention

D.

Cloud Access and Security Brokers (CASB)

E.

Database Activity Monitoring

Questions 80

Which aspects are most important for ensuring security in a hybrid cloud environment?

Options:
A.

Use of encryption for all data at rest

B.

Implementation of robust IAM and network security practices

C.

Regular software updates and patch management

D.

Deployment of multi-factor authentication only