Free Certification Practice Questions

CSA-CCSK

Loading…
Without virtualization, there is no cloud.
#31
All assets require the same continuity in the cloud.
#32
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
#33
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
#34
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
#35
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
#36
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
#37
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
#38
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
#39
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
#40
What are the NIST defined essential characteristics of cloud computing?
#41
Generally speaking, in the United States, a party is obligated to take reasonable steps to prevent the destruction or modification of data in its possession that it reasonably should know, is relevant to an anticipated litigation or government investigation.
#42
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
#43
Which of the following is NOT a common storage option with Infrastructure as a Service?
#44
What best describes the tradeoff of Infrastructure as a Service as compared to other cloud service models?
#45
What are the barriers to developing full confidence in security as a service (SecaaS)?
#46
CCM: A hypothetical company called: `Health4Sure` is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients. Which of the following approach would be most suitable to assess the overall security posture of Health4Sure's cloud service?
#47
Of the choices below which option allows for the most interoperability in security authentication in a cloud environment?
#48
The key concern of data backup and recovery schemes is:
#49
Which regulation affects data controllers with business in Japan?
#50
When configuring SDN firewalls, after adding all assets, what is typically the first configuration you must address?
#51
Identified issues, risks, and recommended remediations are included when determining compliance.
#52
Which common component of big data is focused on the mechanisms used to ingest large volumes of data, often of a streaming nature?
#53
Which statement best describes a data (information) dispersion fragmentation scheme?
#54
To increase network isolation, you should use SDN capabilities for multiple networks and cloud accounts or segments.
#55
Which component is a key part of software container systems?
#56
CCM: What is the role of the Scope Applicability column in the CCM?
#57
When considering business continuity and disaster recovery with a cloud provider, which layer of the logical stack includes code and message queues?
#58
What factor(s), if any, allows for more efficient and effective containment and recovery in a cloud environment than in a non-cloud environment.
#59
What is true of cloud built-in firewalls?
#60