Big 11.11 Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cloud Security Alliance CCSK Practice Exam with Questions & Answers | Set: 9

Questions 81

Why is identity management at the organization level considered a key aspect in cybersecurity?

Options:
A.

It replaces the need to enforce the principles of the need to know

B.

It ensures only authorized users have access to resources

C.

It automates and streamlines security processes in the organization

D.

It reduces the need for regular security training and auditing, and frees up cybersecurity budget

Cloud Security Alliance CCSK Premium Access
Questions 82

What is a core tenant of risk management?

Options:
A.

The provider is accountable for all risk management.

B.

You can manage, transfer, accept, or avoid risks.

C.

The consumers are completely responsible for all risk.

D.

If there is still residual risk after assessments and controls are inplace, you must accept the risk.

E.

Risk insurance covers all financial losses, including loss ofcustomers.

Questions 83

Which of the following is NOT a cloud computing characteristic that impacts incidence response?

Options:
A.

The on demand self-service nature of cloud computing environments.

B.

Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident.

C.

The possibility of data crossing geographic or jurisdictional boundaries.

D.

Object-based storage in a private cloud.

E.

The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures.

Questions 84

ENISA: An example high risk role for malicious insiders within a Cloud Provider includes

Options:
A.

Sales

B.

Marketing

C.

Legal counsel

D.

Auditors

E.

Accounting

Questions 85

Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?

Options:
A.

CSP firewall

B.

Virtual Appliance

C.

Web Application Firewall

D.

Intrusion Detection System

Questions 86

What is an essential security characteristic required when using multi-tenanttechnologies?

Options:
A.

Segmented and segregated customer environments

B.

Limited resource allocation

C.

Resource pooling

D.

Abstraction and automation

Questions 87

CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?

Options:
A.

Submit the CCM on behalf of the CSP to CSA Security, Trust & Assurance Registry (STAR), a free, publicly accessible registry that documents the security controls provided by CSPs

B.

Use CCM to build a detailed list of requirements and controls that they want their CSP to implement

C.

Use CCM to help assess the risk associated with the CSP

D.

None of the above

Questions 88

What primary purpose does object storage encryption serve in cloud services?

Options:
A.

It compresses data to save space

B.

It speeds up data retrieval times

C.

It monitors unauthorized access attempts

D.

It secures data stored as objects

Questions 89

Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?

Options:
A.

Hybrid cloud

B.

Public cloud

C.

Multi-cloud

D.

Private cloud

Questions 90

The containment phase of the incident response lifecycle requires taking systems offline.

Options:
A.

False

B.

True