Free Certification Practice Questions

CSA-CCSK

Loading…
Installing security software designed for physical servers onto a virtualized server can result in severe degradation in performance.
#1
CCM: A hypothetical company called "lnfrastructure4Sure" provides Infrastructure as a Service (IaaS) to its clients. A customer wants to review Infrastructure4Sure's hypervisor security implementation measures. Which of the following measures should Infrastructure4Sure implement?
#2
Which governance domain deals with evaluating how cloud computing affects compliance with internal security policies and various legal requirements, such as regulatory and legislative?
#3
Which of the following cloud deployment models represents a composition of two or more clouds that remain unique identities but are bound together by standardized or proprietary technology that enables data and application portability?
#4
What are six phases of the Data Security Lifecycle?
#5
Prominent recommended standards to enable federation of identity in cloud environments include:
#6
How can you reduce the blast radius if an attacker compromises one system?
#7
What are the three valid options for protecting data as it moves to and within the cloud?
#8
To what extent does the CSA Guidance document suffice for legal advice in setting up relationships with cloud service providers?
#9
ENISA: A key area of controls for cloud provider network architecture is
#10
Which meta-phase does the Cloud Security Alliance use to focus on the security and testing activities when moving code from an isolated development environment to production?
#11
Even with immutable infrastructures, the production environment, should be actively monitored for changes and deviations from approved baselines.
#12
ENISA: Licensing Risks refer to:
#13
Which architecture for hybrid cloud connectivity allows you to connect multiple, different cloud networks to a data center using a single hybrid connection?
#14
CCM: Which of the following statement about CSA's CCM and Security Guidance is False?
#15
A cloud deployment of two or more unique clouds is known as:
#16
ENISA: Which is not one of the five key legal issues common across all scenarios:
#17
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
#18
What are the primary security responsibilities of the cloud provider in the management infrastructure?
#19
What is true of a workload?
#20
Which type of application security testing should incorporate checks on API calls to the cloud service?
#21
Which facet is focused on protecting the management plane components, such as web and API servers, from attacks?
#22
What is it called when a customer's information and/or processes are compromised by the actions of another customer in a multi-tenancy environment?
#23
What are the three main aspects for data security controls?
#24
Which SDP component is used for authentication and authorization?
#25
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
#26
What is known as the interface used to connect with the metastructure and configure the cloud environment?
#27
Big data includes high volume, high variety, and high velocity.
#28
What does it mean if the system or environment is built automatically from a template?
#29
Which type of application security testing involves manual activity that is not necessarily integrated into automated testing?
#30