Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Certificate of Cloud Security Knowledge (v4.0) Question and Answers

Certificate of Cloud Security Knowledge (v4.0)

Last Update May 1, 2024
Total Questions : 110

We are offering FREE CCSK Cloud Security Alliance exam questions. All you do is to just go and sign up. Give your details, prepare CCSK free exam questions and then go for complete pool of Certificate of Cloud Security Knowledge (v4.0) test questions that will help you more.

CCSK pdf

CCSK PDF

$35  $99.99
CCSK Engine

CCSK Testing Engine

$42  $119.99
CCSK PDF + Engine

CCSK PDF + Testing Engine

$56  $159.99
Questions 1

Who is responsible for the security of the physical infrastructure and virtualization platform?

Options:

A.  

The cloud consumer

B.  

The majority is covered by the consumer

C.  

It depends on the agreement

D.  

The responsibility is split equally

E.  

The cloud provider

Discussion 0
Questions 2

Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.

Options:

A.  

False

B.  

True

Discussion 0
Questions 3

Use elastic servers when possible and move workloads to new instances.

Options:

A.  

False

B.  

True

Discussion 0
Questions 4

How can virtual machine communications bypass network security controls?

Options:

A.  

VM communications may use a virtual network on the same hardware host

B.  

The guest OS can invoke stealth mode

C.  

Hypervisors depend upon multiple network interfaces

D.  

VM images can contain rootkits programmed to bypass firewalls

E.  

Most network security systems do not recognize encrypted VM traffic

Discussion 0
Questions 5

How can web security as a service be deployed for a cloud consumer?

Options:

A.  

By proxying or redirecting web traffic to the cloud provider

B.  

By utilizing a partitioned network drive

C.  

On the premise through a software or appliance installation

D.  

Both A and C

E.  

None of the above

Discussion 0
Questions 6

ENISA: A reason for risk concerns of a cloud provider being acquired is:

Options:

A.  

Arbitrary contract termination by acquiring company

B.  

Resource isolation may fail

C.  

Provider may change physical location

D.  

Mass layoffs may occur

E.  

Non-binding agreements put at risk

Discussion 0
Questions 7

Which concept provides the abstraction needed for resource pools?

Options:

A.  

Virtualization

B.  

Applistructure

C.  

Hypervisor

D.  

Metastructure

E.  

Orchestration

Discussion 0
Questions 8

Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?

Options:

A.  

The process of specifying and maintaining access policies

B.  

Checking data storage to make sure it meets compliance requirements

C.  

Giving a third party vendor permission to work on your cloud solution

D.  

Establishing/asserting the identity to the application

E.  

Enforcing the rules by which access is granted to the resources

Discussion 0
Questions 9

Which of the following is NOT a cloud computing characteristic that impacts incidence response?

Options:

A.  

The on demand self-service nature of cloud computing environments.

B.  

Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident.

C.  

The possibility of data crossing geographic or jurisdictional boundaries.

D.  

Object-based storage in a private cloud.

E.  

The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures.

Discussion 0
Questions 10

Which statement best describes why it is important to know how data is being accessed?

Options:

A.  

The devices used to access data have different storage formats.

B.  

The devices used to access data use a variety of operating systems and may have different programs installed on them.

C.  

The device may affect data dispersion.

D.  

The devices used to access data use a variety of applications or clients and may have different security characteristics.

E.  

The devices used to access data may have different ownership characteristics.

Discussion 0
Questions 11

Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?

Options:

A.  

Multi-tenancy

B.  

Nation-state boundaries

C.  

Measured service

D.  

Unlimited bandwidth

E.  

Hybrid clouds

Discussion 0
Questions 12

What is the most significant security difference between traditional infrastructure and cloud computing?

Options:

A.  

Management plane

B.  

Intrusion detection options

C.  

Secondary authentication factors

D.  

Network access points

E.  

Mobile security configuration options

Discussion 0
Questions 13

What is defined as the process by which an opposing party may obtain private documents for use in litigation?

Options:

A.  

Discovery

B.  

Custody

C.  

Subpoena

D.  

Risk Assessment

E.  

Scope

Discussion 0
Questions 14

Select the best definition of “compliance” from the options below.

Options:

A.  

The development of a routine that covers all necessary security measures.

B.  

The diligent habits of good security practices and recording of the same.

C.  

The timely and efficient filing of security reports.

D.  

The awareness and adherence to obligations, including the assessment and prioritization of corrective actions deemed necessary and appropriate.

E.  

The process of completing all forms and paperwork necessary to develop a defensible paper trail.

Discussion 0
Questions 15

In the Software-as-a-service relationship, who is responsible for the majority of the security?

Options:

A.  

Application Consumer

B.  

Database Manager

C.  

Application Developer

D.  

Cloud Provider

E.  

Web Application CISO

Discussion 0
Questions 16

Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?

Options:

A.  

Data Security and Encryption

B.  

Information Governance

C.  

Incident Response, Notification and Remediation

D.  

Compliance and Audit Management

E.  

Infrastructure Security

Discussion 0