Free Certification Practice Questions

CSA-CCSK

Loading…
What must the monitoring scope cover in addition to the deployed assets?
#61
Regardless of the technology platform, container security includes properly securing the image repository.
#62
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
#63
ENISA: Which is not identified as a top security risk in ENISA research?
#64
What item below allows disparate directory services and independent security domains to be interconnected?
#65
CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
#66
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
#67
Sending data to a provider's storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
#68
What is true of searching data across cloud environments?
#69
How does running applications on distinct virtual networks and only connecting networks as needed help?
#70
ENISA: As it relates to public cloud computing, in the European Data Protection law, the customer is considered to be the:
#71
Immutable workloads make it faster to roll out updated versions because applications must be designed to handle individual nodes going down.
#72
Which technique uses the management plane to detect various activities, such as file uploads or configuration changes?
#73
Which phase of the incident response lifecycle includes creating and validating alerts?
#74
ENISA: To mitigate credential compromise or theft, cloud provider can implement:
#75
While the cloud consumer is responsible for implementing the security controls, the cloud provider implements the security of the workload.
#76
Your cloud and on-premises infrastructures should always use the same network address ranges.
#77
Which of the following items is one of the major regulatory compliance problems associated with cloud environments?
#78
What are major factors to building and managing a secure management plane?
#79
Cloud storage will most often utilize the same types of data storage used in traditional data storage technologies.
#80
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
#81
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
#82
ENISA: A reason for risk concerns of a cloud provider being acquired is:
#83
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
#84
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
#85
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
#86
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
#87
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
#88
Which of the following items is NOT an example of Security as a Service (SecaaS)?
#89
How is encryption managed on multi-tenant storage?
#90