Free Certification Practice Questions

CSA-CCSK

Loading…
You should disable remote access when working with immutable workloads.
#181
Which security advantage considers that CI/CD pipelines can track everything, down to individual character changes in source files tied to the person submitting the change, with the entire application stack history?
#182
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
#183
The hub and spoke architecture uses internal identity providers or sources connected directly to cloud providers.
#184
Who is responsible for the proper rights management and configuration of exposed controls in the management plane?
#185
How can cloud providers support a secure use of virtualization for cloud consumers?
#186
Which SDP component terminates network traffic and enforces communication policies?
#187
ENISA: Which is a potential security benefit of cloud computing?
#188
The Software Defined Perimeter (SDP) includes which components?
#189
Which cloud security model type provides generalized templates for helping implement cloud security?
#190
Select the statement below which best describes the relationship between identities and attributes
#191
CCM: The following list of controls belong to which domain of the CCM? GRM 06 `" Policy GRM 07 `" Policy Enforcement GRM 08 `" Policy Impact on Risk Assessments GRM 09 `" Policy Reviews GRM 10 `" Risk Assessments GRM 11 `" Risk Management Framework
#192
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
#193
Containers are highly portable code execution environments.
#194
Which statement best describes the Data Security Lifecycle?
#195
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
#196
In the Software-as-a-service relationship, who is responsible for the majority of the security?
#197
Which attack surfaces, if any, does virtualization technology introduce?
#198
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
#199
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
#200
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
#201
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
#202
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
#203
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
#204
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
#205
The containment phase of the incident response lifecycle requires taking systems offline.
#206
What are the primary security responsibilities of the cloud provider in compute virtualizations?
#207