Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CCSK Exam Dumps - Certificate of Cloud Security Knowledge (CCSKv5.0)

Go to page:
Question # 17

To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?

A.

Provider documentation

B.

Provider run audits and reports

C.

Third-party attestations

D.

Provider and consumer contracts

E.

EDiscovery tools

Full Access
Question # 18

How can web security as a service be deployed for a cloud consumer?

A.

By proxying or redirecting web traffic to the cloud provider

B.

By utilizing a partitioned network drive

C.

On the premise through a software or appliance installation

D.

Both A and C

E.

None of the above

Full Access
Question # 19

CCM: The following list of controls belong to which domain of the CCM?

GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework

A.

Governance and Retention Management

B.

Governance and Risk Management

C.

Governing and Risk Metrics

Full Access
Question # 20

Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.

A.

False

B.

True

Full Access
Question # 21

Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?

A.

The process of specifying and maintaining access policies

B.

Checking data storage to make sure it meets compliance requirements

C.

Giving a third party vendor permission to work on your cloud solution

D.

Establishing/asserting the identity to the application

E.

Enforcing the rules by which access is granted to the resources

Full Access
Question # 22

How can virtual machine communications bypass network security controls?

A.

VM communications may use a virtual network on the same hardware host

B.

The guest OS can invoke stealth mode

C.

Hypervisors depend upon multiple network interfaces

D.

VM images can contain rootkits programmed to bypass firewalls

E.

Most network security systems do not recognize encrypted VM traffic

Full Access
Question # 23

What is true of a workload?

A.

It is a unit of processing that consumes memory

B.

It does not require a hardware stack

C.

It is always a virtual machine

D.

It is configured for specific, established tasks

E.

It must be containerized

Full Access
Question # 24

Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?

A.

Planned Outages

B.

Resiliency Planning

C.

Expected Engineering

D.

Chaos Engineering

E.

Organized Downtime

Full Access
Go to page: