Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSK Exam Dumps - Certificate of Cloud Security Knowledge (v5.0)

Go to page:
Question # 33

How does running applications on distinct virtual networks and only connecting networks as needed help?

A.

It reduces hardware costs

B.

It provides dynamic and granular policies with less management overhead

C.

It locks down access and provides stronger data security

D.

It reduces the blast radius of a compromised system

E.

It enables you to configure applications around business groups

Full Access
Question # 34

Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?

A.

Access control

B.

Federated Identity Management

C.

Authoritative source

D.

Entitlement

E.

Authentication

Full Access
Question # 35

What are the encryption options available for SaaS consumers?

A.

Any encryption option that is available for volume storage, object storage, or PaaS

B.

Provider-managed and (sometimes) proxy encryption

C.

Client/application and file/folder encryption

D.

Object encryption Volume storage encryption

Full Access
Question # 36

When designing an encryption system, you should start with a threat model.

A.

False

B.

True

Full Access
Question # 37

Which statement best describes why it is important to know how data is being accessed?

A.

The devices used to access data have different storage formats.

B.

The devices used to access data use a variety of operating systems and may have different programs installed on them.

C.

The device may affect data dispersion.

D.

The devices used to access data use a variety of applications or clients and may have different security characteristics.

E.

The devices used to access data may have different ownership characteristics.

Full Access
Question # 38

When mapping functions to lifecycle phases, which functions are required to successfully process data?

A.

Create, Store, Use, and Share

B.

Create and Store

C.

Create and Use

D.

Create, Store, and Use

E.

Create, Use, Store, and Delete

Full Access
Question # 39

All cloud services utilize virtualization technologies.

A.

False

B.

True

Full Access
Question # 40

Which cloud storage technology is basically a virtual hard drive for instanced or VMs?

A.

Volume storage

B.

Platform

C.

Database

D.

Application

E.

Object storage

Full Access
Go to page: