Free Certification Practice Questions

CSA-CCSK

Loading…
What makes the metastructure layer of cloud computing so different from traditional computing?
#91
While a virtual machine is a full abstraction of an operating system, a container is a constrained place to run segregated processes while still using the kernel and other OS capabilities.
#92
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
#93
What are the main considerations for key management?
#94
A key element of the "Destroy" phase of the Data Security Lifecycle is:
#95
All cloud services utilize virtualization technologies.
#96
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
#97
How can web security as a service be deployed for a cloud consumer?
#98
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
#99
What of the following is NOT an essential characteristic of cloud computing?
#100
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
#101
When mapping functions to lifecycle phases, which functions are required to successfully process data?
#102
When designing an encryption system, you should start with a threat model.
#103
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
#104
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
#105
Which statement best describes why it is important to know how data is being accessed?
#106
What is resource pooling?
#107
Your SLA with your cloud provider ensures continuity for all services.
#108
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
#109
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
#110
Which deployment model is commonly used to describe a non-cloud data center bridged directly to a cloud provider?
#111
What is a core tenant of risk management?
#112
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
#113
Why do blind spots occur in a virtualized environment, where network-based security controls may not be able to monitor certain types of traffic?
#114
When associating the functions to an actor, what is used to restrict a list of possible actions dowr to allowed actions?
#115
Which tool is the primary tool between the cloud provider and consumer that extends governance into business partners and providers?
#116
ENISA: Because it is practically impossible to process data in encrypted form, customers should have the following expectation of cloud providers:
#117
Which statement best describes the options for PaaS encryption?
#118
What can be implemented to help with account granularity and limit blast radius with IaaS an PaaS?
#119
Which of the following statements best defines the "authentication" component of identity, entitlement, and access management (IdEA).
#120