Pass the Cloud Security Alliance Cloud Security Knowledge CCSK Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?

Options:

A.

Use strong multi-factor authentication


B.

Secure backup processes for key management systems


C.

Segregate keys from the provider hosting data


D.

Stipulate encryption in contract language


E.

Select cloud providers within the same country as customer


Expert Solution
Questions # 22:

Which of the following is a common exploitation factor associated with serverless and container workloads?

Options:

A.

Poor Documentation


B.

Misconfiguration


C.

Insufficient Redundancy


D.

Low Availability


Expert Solution
Questions # 23:

What is the primary focus during the Preparation phase of the Cloud Incident Response framework?

Options:

A.

Developing a cloud service provider evaluation criterion


B.

Deploying automated security monitoring tools across cloud services


C.

Establishing a Cloud Incident Response Team and response plans


D.

Conducting regular vulnerability assessments on cloud infrastructure


Expert Solution
Questions # 24:

An important consideration when performing a remote vulnerability test of a cloud-based application is to

Options:

A.

Obtain provider permission for test


B.

Use techniques to evade cloud provider’s detection systems


C.

Use application layer testing tools exclusively


D.

Use network layer testing tools exclusively


E.

Schedule vulnerability test at night


Expert Solution
Questions # 25:

In the IaaS shared responsibility model, which responsibility typically falls on the Cloud Service Provider (CSP)?

Options:

A.

Encrypting data at rest


B.

Ensuring physical security of data centers


C.

Managing application code


D.

Configuring firewall rules


Expert Solution
Questions # 26:

Which opportunity helps reduce common application security issues?

Options:

A.

Elastic infrastructure


B.

Default deny


C.

Decreased use of micro-services


D.

Segregation by default


E.

Fewer serverless configurations


Expert Solution
Questions # 27:

What is the primary function of landing zones or account factories in cloud environments?

Options:

A.

Provide cost-saving recommendations for cloud resources


B.

Consistent configurations and policies for new deployments


C.

Enhance the performance of cloud applications


D.

Automate the deployment of microservices in the cloud


Expert Solution
Questions # 28:

What does Zero Trust Network Access (ZTNA) primarily use to control access to applications?

Options:

A.

Geolocation data exclusively


B.

Username and password


C.

IP address and port number


D.

Identity, device, and contextual factors


Expert Solution
Questions # 29:

CCM: The following list of controls belong to which domain of the CCM?

GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework

Options:

A.

Governance and Retention Management


B.

Governance and Risk Management


C.

Governing and Risk Metrics


Expert Solution
Questions # 30:

Which of the following best describes a key aspect of cloud risk management?

Options:

A.

A structured approach for performance optimization of cloud services


B.

A structured approach to identifying, assessing, and addressing risks


C.

A structured approach to establishing the different what/if scenarios for cloud vs on-premise decisions


D.

A structured approach to SWOT analysis


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions