CSA CCSK - Certificate of Cloud Security Knowledge Exam

Page:    1 / 47   
Total 232 questions

All cloud services utilize virtualization technologies.

  • A. False
  • B. True


Answer : B

If there are gaps in network logging data, what can you do?

  • A. Nothing. There are simply limitations around the data that can be logged in the cloud.
  • B. Ask the cloud provider to open more ports.
  • C. You can instrument the technology stack with your own logging.
  • D. Ask the cloud provider to close more ports.
  • E. Nothing. The cloud provider must make the information available.


Answer : C

CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.

  • A. Risk Impact
  • B. Domain
  • C. Control Specification


Answer : C

Who is responsible for the security of the physical infrastructure and virtualization platform?

  • A. The cloud consumer
  • B. The majority is covered by the consumer
  • C. It depends on the agreement
  • D. The responsibility is split equally
  • E. The cloud provider


Answer : E

What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?

  • A. The physical location of the data and how it is accessed
  • B. The fragmentation and encryption algorithms employed
  • C. The language of the data and how it affects the user
  • D. The implications of storing complex information on simple storage systems
  • E. The actual size of the data and the storage format


Answer : A

Page:    1 / 47   
Total 232 questions