Download CSA.CCSK.VCEplus.2020-05-04.60q.vcex

Download Exam

File Info

Exam Certificate of Cloud Security Knowledge
Number CCSK
File Name CSA.CCSK.VCEplus.2020-05-04.60q.vcex
Size 31 KB
Posted May 04, 2020
Download CSA.CCSK.VCEplus.2020-05-04.60q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

All cloud services utilize virtualization technologies.


  1. False
  2. True
Correct answer: B



Question 2

If there are gaps in network logging data, what can you do?


  1. Nothing. There are simply limitations around the data that can be logged in the cloud.
  2. Ask the cloud provider to open more ports.
  3. You can instrument the technology stack with your own logging.
  4. Ask the cloud provider to close more ports.
  5. Nothing. The cloud provider must make the information available.
Correct answer: C



Question 3

CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.


  1. Risk Impact
  2. Domain
  3. Control Specification
Correct answer: C



Question 4

Who is responsible for the security of the physical infrastructure and virtualization platform?


  1. The cloud consumer
  2. The majority is covered by the consumer
  3. It depends on the agreement
  4. The responsibility is split equally
  5. The cloud provider
Correct answer: E



Question 5

What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?


  1. The physical location of the data and how it is accessed
  2. The fragmentation and encryption algorithms employed
  3. The language of the data and how it affects the user
  4. The implications of storing complex information on simple storage systems
  5. The actual size of the data and the storage format
Correct answer: D



Question 6

Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?


  1. Platform-as-a-service (PaaS)
  2. Desktop-as-a-service (DaaS)
  3. Infrastructure-as-a-service (IaaS)
  4. Identity-as-a-service (IDaaS)
  5. Software-as-a-service (SaaS)
Correct answer: A



Question 7

CCM: The following list of controls belong to which domain of the CCM?
GRM 06 - Policy GRM 07 - Policy Enforcement GRM 08 - Policy Impact on Risk Assessments GRM 09 - Policy Reviews GRM 10 - Risk Assessments GRM 11 - Risk Management Framework


  1. Governance and Retention Management
  2. Governance and Risk Management
  3. Governing and Risk Metrics
Correct answer: B



Question 8

Which attack surfaces, if any, does virtualization technology introduce?


  1. The hypervisor
  2. Virtualization management components apart from the hypervisor
  3. Configuration and VM sprawl issues
  4. All of the above 
Correct answer: D



Question 9

APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.


  1. False
  2. True
Correct answer: B



Question 10

Which of the following is NOT a cloud computing characteristic that impacts incidence response?


  1. The on demand self-service nature of cloud computing environments.
  2. Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident.
  3. The possibility of data crossing geographic or jurisdictional boundaries.
  4. Object-based storage in a private cloud.
  5. The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures.
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files