Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cloud Security Alliance CCSK - Certificate of Cloud Security Knowledge v5 (CCSKv5.0)

Page: 1 / 10
Total 332 questions

Which principle reduces security risk by granting users only the permissions essential for their role?

A.

Role-Based Access Control

B.

Unlimited Access

C.

Mandatory Access Control

D.

Least-Privileged Access

Which aspect is most important for effective cloud governance?

A.

Formalizing cloud security policies

B.

Implementing best-practice cloud security control objectives

C.

Negotiating SLAs with cloud providers

D.

Establishing a governance hierarchy

What is the primary role of Identity and Access Management (IAM)?

A.

To encrypt data at rest and in transit

B.

Ensure only authorized entities access resources

C.

To monitor and log all user activities and traffic

D.

Ensure all users have the same level of access

What are the essential characteristics of cloud computing as defined by the NIST model?

A.

Resource sharing, automated recovery, universal connectivity, distributed costs, fair pricing

B.

High availability, geographical distribution, scaled tenancy, continuous resourcing, market pricing

C.

On-demand self-service, broad network access, resource pooling, rapid elasticity, measured service

D.

Equal access to dedicated hosting, isolated networks, scalability resources, and automated continuous provisioning

What type of logs record interactions with specific services in a system?

A.

(Service and Application Logs

B.

Security Logs

C.

Network Logs

D.

Debug Logs

Which of the following best describes the multi-tenant nature of cloud computing?

A.

Cloud customers operate independently without sharing resources

B.

Cloud customers share a common pool of resources but are segregated and isolated from each other

C.

Multiple cloud customers are allocated a set of dedicated resources via a common web interface

D.

Cloud customers share resources without any segregation or isolation

Which two key capabilities are required for technology to be considered cloud computing?

A.

Abstraction and orchestration

B.

Abstraction and resource pooling

C.

Multi-tenancy and isolation

D.

Virtualization and multi-tenancy

What is a key component of governance in the context of cybersecurity?

A.

Defining roles and responsibilities

B.

Standardizing technical specifications for security control

C.

Defining tools and technologies

D.

Enforcement of the Penetration Testing procedure

What method can be utilized along with data fragmentation to enhance security?

A.

Encryption

B.

Organization

C.

Knowledge management

D.

IDS

E.

Insulation

What is a common characteristic of Platform as a Service (PaaS)?

A.

Satisfies compliance and security requirements

B.

Integration with application development frameworks and middleware capabilities

C.

Limited configuration options increases security risks

D.

Fully hosted application stack