Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cloud Security Alliance CCSK - Certificate of Cloud Security Knowledge v5 (CCSKv5.0)

Page: 10 / 10
Total 332 questions

Which Identity and Access Management (IAM) component verifies the identity of a user, process, or device, as a prerequisite to allowing access?

A.

Assertion

B.

Entitlement

C.

Authorization

D.

Authentication

To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?

A.

Provider documentation

B.

Provider run audits and reports

C.

Third-party attestations

D.

Provider and consumer contracts

E.

EDiscovery tools

Containers are highly portable code execution environments.

A.

False

B.

True

Which aspect of cybersecurity can AI enhance by reducing false positive alerts?

A.

Anomaly detection

B.

Assisting analysts

C.

Threat intelligence

D.

Automated responses

What is a core tenant of risk management?

A.

The provider is accountable for all risk management.

B.

You can manage, transfer, accept, or avoid risks.

C.

The consumers are completely responsible for all risk.

D.

If there is still residual risk after assessments and controls are inplace, you must accept the risk.

E.

Risk insurance covers all financial losses, including loss ofcustomers.

When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.

A.

False

B.

True

In volume storage, what method is often used to support resiliency and security?

A.

proxy encryption

B.

data rights management

C.

hypervisor agents

D.

data dispersion

E.

random placement

Cloud applications can use virtual networks and other structures, for hyper-segregated environments.

A.

False

B.

True

What is the newer application development methodology and philosophy focused on automation of application development and deployment?

A.

Agile

B.

BusOps

C.

DevOps

D.

SecDevOps

E.

Scrum