Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CCSK Exam Dumps - Certificate of Cloud Security Knowledge (CCSKv5.0)

Go to page:
Question # 9

In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?

A.

Post-Incident Activity

B.

Detection and Analysis

C.

Preparation

D.

Containment, Eradication, and Recovery

Full Access
Question # 10

According to NIST, what is cloud computing defined as?

A.

A shared set of resources delivered over the Internet

B.

A model for more-efficient use of network-based resources

C.

A model for on-demand network access to a shared pool of configurable resources

D.

Services that are delivered over the Internet to customers

Full Access
Question # 11

Which of the following is a common security issue associated with serverless computing environments?

A.

High operational costs

B.

Misconfigurations

C.

Limited scalability

D.

Complex deployment pipelines

Full Access
Question # 12

When establishing a cloud incident response program, what access do responders need to effectively analyze incidents?

A.

Access limited to log events for incident analysis

B.

Unlimited write access for all responders at all times

C.

Full-read access without any approval process

D.

Persistent read access and controlled write access for critical situations

Full Access
Question # 13

Without virtualization, there is no cloud.

A.

False

B.

True

Full Access
Question # 14

If there are gaps in network logging data, what can you do?

A.

Nothing. There are simply limitations around the data that can be logged in the cloud.

B.

Ask the cloud provider to open more ports.

C.

You can instrument the technology stack with your own logging.

D.

Ask the cloud provider to close more ports.

E.

Nothing. The cloud provider must make the information available.

Full Access
Question # 15

CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.

A.

Risk Impact

B.

Domain

C.

Control Specification

Full Access
Question # 16

A cloud deployment of two or more unique clouds is known as:

A.

Infrastructures as a Service

B.

A Private Cloud

C.

A Community Cloud

D.

A Hybrid Cloud

E.

Jericho Cloud Cube Model

Full Access
Go to page: