Free Certification Practice Questions

CSA-CCSK

Loading…
Use elastic servers when possible and move workloads to new instances.
#121
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
#122
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
#123
Which data security control is the LEAST likely to be assigned to an IaaS provider?
#124
How does virtualized storage help avoid data loss if a drive fails?
#125
Which statement best describes the impact of Cloud Computing on business continuity management?
#126
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
#127
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
#128
What is true of companies considering a cloud computing business relationship?
#129
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
#130
What is a potential concern of using Security-as-a-Service (SecaaS)?
#131
How should an SDLC be modified to address application security in a Cloud Computing environment?
#132
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
#133
Which opportunity helps reduce common application security issues?
#134
What is the most significant security difference between traditional infrastructure and cloud computing?
#135
What makes single cloud assets less resilient compared with a traditional infrastructure?
#136
ENISA: In Infrastructure as a Service (IaaS), who is responsible for guest systems monitoring?
#137
What are the components of an encryption system?
#138
What is the main data source for detection and analysis of an incident?
#139
Which cloud storage technology would include a content delivery network (CON), files stored in SaaS, and caching?
#140
What is a benefit of application security in a cloud environment?
#141
You have a business relationship with a cloud provider for all sales management functionality. Through the APIs and SDKs, you have customized the interface and some functionality, but the back end service is done through the cloud provider. In this relationship, which service is completed by the cloud provider?
#142
Absent other evidence, such as tampering or hacking, documents should not be considered more or less admissible or credible because they were created or stored in the cloud.
#143
What are the encryption options available for SaaS consumers?
#144
When the application components communicate directly with the cloud service, the management plane and metastructure might fall within the application security scope.
#145
How can you monitor and filter data in a virtual network when traffic might not cross the physical network?
#146
Which concept is defined as the unique expression of an entity within a given namespace?
#147
What is a method used to decouple the network control plane from the data plane?
#148
For cloud consumers to be able to properly configure and manage their network security, what must cloud providers do?
#149
What is true of Software Defined Network firewalls?
#150