Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cloud Security Alliance CCSK - Certificate of Cloud Security Knowledge v5 (CCSKv5.0)

Page: 3 / 10
Total 332 questions

CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?

A.

Submit the CCM on behalf of the CSP to CSA Security, Trust & Assurance Registry (STAR), a free, publicly accessible registry that documents the security controls provided by CSPs

B.

Use CCM to build a detailed list of requirements and controls that they want their CSP to implement

C.

Use CCM to help assess the risk associated with the CSP

D.

None of the above

What is the primary purpose of cloud governance in an organization?

A.

To increase data transfer speeds within the cloud environment

B.

To reduce the cost of cloud services

C.

To ensure compliance, security, and efficient management aligned with the organization's goals

D.

To eliminate the need for on-premises data centers

Which AI workload mitigation strategy best addresses model inversion attacks that threaten data confidentiality?

A.

Secure multi-party computation

B.

Differential privacy

C.

Encryption

D.

Model hardening

Which technique is most effective for preserving digital evidence in a cloud environment?

A.

Analyzing management plane logs

B.

Regularly backing up data

C.

Isolating the compromised system

D.

Taking snapshots of virtual machines

Which concept provides the abstraction needed for resource pools?

A.

Virtualization

B.

Applistructure

C.

Hypervisor

D.

Metastructure

E.

Orchestration

What is known as the interface used to connect with the metastructure and configure the cloud environment?

A.

Administrative access

B.

Management plane

C.

Identity and Access Management

D.

Single sign-on

E.

Cloud dashboard

In the context of FaaS, what is primarily defined in addition to functions?

A.

Data storage

B.

Network configurations

C.

User permissions

D.

Trigger events

In the context of cloud workload security, which feature directly contributes to enhanced performance and resource utilization without incurring excess costs?

A.

Fixed resource allocations

B.

Unlimited data storage capacity

C.

Increased on-premise hardware

D.

Elasticity of cloud resources

In the cloud provider and consumer relationship, which entity

manages the virtual or abstracted infrastructure?

A.

Only the cloud consumer

B.

Only the cloud provider

C.

Both the cloud provider and consumer

D.

It is determined in the agreement between the entities

E.

It is outsourced as per the entity agreement

What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?

A.

Platform-based Workload

B.

Pod

C.

Abstraction

D.

Container

E.

Virtual machine