Pass the Cloud Security Alliance Cloud Security Knowledge CCSK Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?

Options:

A.

The process of specifying and maintaining access policies


B.

Checking data storage to make sure it meets compliance requirements


C.

Giving a third party vendor permission to work on your cloud solution


D.

Establishing/asserting the identity to the application


E.

Enforcing the rules by which access is granted to the resources


Expert Solution
Questions # 82:

In the context of cloud workload security, which feature directly contributes to enhanced performance and resource utilization without incurring excess costs?

Options:

A.

Fixed resource allocations


B.

Unlimited data storage capacity


C.

Increased on-premise hardware


D.

Elasticity of cloud resources


Expert Solution
Questions # 83:

What primary aspects should effective cloud governance address to ensure security and compliance?

Options:

A.

Service availability, disaster recovery, load balancing, and latency


B.

Decision making, prioritization, monitoring, and transparency


C.

Encryption, redundancy, data integrity, and scalability


D.

Authentication, authorization, accounting, and auditing


Expert Solution
Questions # 84:

What are the essential characteristics of cloud computing as defined by the NIST model?

Options:

A.

Resource sharing, automated recovery, universal connectivity, distributed costs, fair pricing


B.

High availability, geographical distribution, scaled tenancy, continuous resourcing, market pricing


C.

On-demand self-service, broad network access, resource pooling, rapid elasticity, measured service


D.

Equal access to dedicated hosting, isolated networks, scalability resources, and automated continuous provisioning


Expert Solution
Questions # 85:

Your cloud and on-premises infrastructures should always use the same network address ranges.

Options:

A.

False


B.

True


Expert Solution
Questions # 86:

In a cloud computing incident, what should be the initial focus of analysis due to the ephemeral nature of resources and centralized control mechanisms?

Options:

A.

Management plane activity logs


B.

Network perimeter monitoring


C.

Endpoint protection status


D.

Physical hardware access


Expert Solution
Questions # 87:

What is a primary benefit of consolidating traffic through a central bastion/transit network in a hybrid cloud environment?

Options:

A.

It minimizes hybrid cloud sprawl and consolidates security.


B.

It reduces the need for physical network hardware.


C.

It increases network redundancy and fault tolerance.


D.

It decreases the latency of data transfers across the cloud network.


Expert Solution
Questions # 88:

A cloud deployment of two or more unique clouds is known as:

Options:

A.

Infrastructures as a Service


B.

A Private Cloud


C.

A Community Cloud


D.

A Hybrid Cloud


E.

Jericho Cloud Cube Model


Expert Solution
Questions # 89:

Which aspect is most important for effective cloud governance?

Options:

A.

Formalizing cloud security policies


B.

Implementing best-practice cloud security control objectives


C.

Negotiating SLAs with cloud providers


D.

Establishing a governance hierarchy


Expert Solution
Questions # 90:

Your SLA with your cloud provider ensures continuity for all services.

Options:

A.

False


B.

True


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions