Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cloud Security Alliance CCSK - Certificate of Cloud Security Knowledge (CCSKv5.0)

Page: 4 / 10
Total 305 questions

What is the primary purpose of Cloud Infrastructure Entitlement Management (CIEM) in cloud environments?

A.

Monitoring network traffic

B.

Deploying cloud services

C.

Governing access to cloud resources

D.

Managing software licensing

What can be implemented to help with account granularity and limit

blast radius with laaS an PaaS?

A.

Configuring secondary authentication

B.

Establishing multiple accounts

C.

Maintaining tight control of the primary account holder credentials

D.

Implementing least privilege accounts

E.

Configuring role-based authentication

What primary aspects should effective cloud governance address to ensure security and compliance?

A.

Service availability, disaster recovery, load balancing, and latency

B.

Decision making, prioritization, monitoring, and transparency

C.

Encryption, redundancy, data integrity, and scalability

D.

Authentication, authorization, accounting, and auditing

What is true of security as it relates to cloud network infrastructure?

A.

You should apply cloud firewalls on a per-network basis.

B.

You should deploy your cloud firewalls identical to the existing firewalls.

C.

You should always open traffic between workloads in the same virtual subnet for better visibility.

D.

You should implement a default allow with cloud firewalls and then restrict as necessary.

E.

You should implement a default deny with cloud firewalls.

When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.

A.

False

B.

True

Which of the following is the MOST common cause of cloud-native security breaches?

A.

Inability to monitor cloud infrastructure for threats

B.

IAM failures

C.

Lack of encryption for data at rest

D.

Vulnerabilities in cloud provider's physical infrastructure

What primary purpose does object storage encryption serve in cloud services?

A.

It compresses data to save space

B.

It speeds up data retrieval times

C.

It monitors unauthorized access attempts

D.

It secures data stored as objects

Which of the following statements best reflects the responsibility of organizations regarding cloud security and data ownership?

A.

Cloud providers are responsible for everything under the 'limited O responsibilities clauses.' The customer and the provider have joint accountability.

B.

Cloud providers assume full responsibility for the security obligations, and cloud customers are accountable for overall compliance.

C.

Data ownership rights are solely determined by the cloud provider, leaving organizations with no control or accountability over their data.

D.

Organizations are accountable for the security and compliance of their data and systems, even though they may lack full visibility into their cloud provider's infrastructure.

In the cloud provider and consumer relationship, which entity

manages the virtual or abstracted infrastructure?

A.

Only the cloud consumer

B.

Only the cloud provider

C.

Both the cloud provider and consumer

D.

It is determined in the agreement between the entities

E.

It is outsourced as per the entity agreement

ENISA: Which is a potential security benefit of cloud computing?

A.

More efficient and timely system updates

B.

ISO 27001 certification

C.

Provider can obfuscate system O/S and versions

D.

Greater compatibility with customer IT infrastructure

E.

Lock-In