Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSK Exam Dumps - Certificate of Cloud Security Knowledge (v5.0)

Go to page:
Question # 25

Which of the following is the MOST common cause of cloud-native security breaches?

A.

Inability to monitor cloud infrastructure for threats

B.

IAM failures

C.

Lack of encryption for data at rest

D.

Vulnerabilities in cloud provider's physical infrastructure

Full Access
Question # 26

What is the primary purpose of cloud governance in an organization?

A.

To increase data transfer speeds within the cloud environment

B.

To reduce the cost of cloud services

C.

To ensure compliance, security, and efficient management aligned with the organization's goals

D.

To eliminate the need for on-premises data centers

Full Access
Question # 27

Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?

A.

A single deployment for all applications

B.

Shared deployments for similar applications

C.

Randomized deployment configurations

D.

Multiple independent deployments for applications

Full Access
Question # 28

Network logs from cloud providers are typically flow records, not full packet captures.

A.

False

B.

True

Full Access
Question # 29

What can be implemented to help with account granularity and limit

blast radius with laaS an PaaS?

A.

Configuring secondary authentication

B.

Establishing multiple accounts

C.

Maintaining tight control of the primary account holder credentials

D.

Implementing least privilege accounts

E.

Configuring role-based authentication

Full Access
Question # 30

When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.

A.

False

B.

True

Full Access
Question # 31

Which of the following statements best describes an identity

federation?

A.

A library of data definitions

B.

A group of entities which have decided to exist together in a single

cloud

C.

Identities which share similar attributes

D.

Several countries which have agreed to define their identities with

similar attributes

E.

The connection of one identity repository to another

Full Access
Question # 32

Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?

A.

Database encryption

B.

Media encryption

C.

Asymmetric encryption

D.

Object encryption

E.

Client/application encryption

Full Access
Go to page: