CSA - Pre .CCSK .By .VCEplus.60q
CSA - Pre .CCSK .By .VCEplus.60q
60q
Number: CCSK
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
Website: https://vceplus.com
VCE to PDF Converter: https://vceplus.com/vce-to-pdf/
Facebook: https://www.facebook.com/VCE.For.All.VN/
Twitter : https://twitter.com/VCE_Plus
CCSK
Version 1.0
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Exam A
QUESTION 1
A. False
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. Nothing. There are simply limitations around the data that can be logged in the cloud.
B. Ask the cloud provider to open more ports.
C. You can instrument the technology stack with your own logging.
D. Ask the cloud provider to close more ports.
E. Nothing. The cloud provider must make the information available.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
A. Risk Impact
B. Domain
C. Control Specification
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4 Who is responsible for the security of the physical infrastructure and
virtualization platform?
Correct Answer: E
Section: (none)
Explanation
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Explanation/Reference:
QUESTION 5 What factors should you understand about the data specifically due to legal, regulatory, and
jurisdictional factors?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
A. Platform-as-a-service (PaaS)
B. Desktop-as-a-service (DaaS)
C. Infrastructure-as-a-service (IaaS)
D. Identity-as-a-service (IDaaS)
E. Software-as-a-service (SaaS)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. The hypervisor
B. Virtualization management components apart from the hypervisor
C. Configuration and VM sprawl issues
D. All of the above
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
A. False
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10 Which of the following is NOT a cloud computing characteristic that impacts
incidence response?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. False
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards.
Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
A. The CCM columns are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered ad a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining
controls.This approach will save time.
B. The CCM domain controls are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered as a result of their compliance with HIPPA/HITECH Act. They could then assess the
remainingcontrols thoroughly. This approach saves time while being able to assess the company’s overall security posture in an efficient manner.
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
C. The CCM domains are not mapped to HIPAA/HITECH Act. Therefore Health4Sure should assess the security posture of their cloud service against each and every control in the CCM. This approach will allow a thorough assessment
ofthe security posture.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13 A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources
is called what?
A. An entitlement matrix
B. A support table
C. An entry log
D. A validation process
E. An access log
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
A. False
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15 Your cloud and on-premises infrastructures should always use the same network
address ranges.
A. False
B. True
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
A. Infrastructure
B. Datastructure
C. Infostructure
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
D. Applistructure E. Metastructure
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Which governance domain deals with evaluating how cloud computing affects compliance with internal security policies and various legal requirements, such as regulatory and legislative?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision
computing capabilities such as server time and network storage as needed.
A. Rapid elasticity
B. Resource pooling
C. Broad network access
D. Measured service
E. On-demand self-service
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
A. False
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
A. Inspect and account for risks inherited from other members of the cloud supply chain and take active measures to mitigate and contain risks through operational resiliency.
B. Respect the interdependency of the risks inherent in the cloud supply chain and communicate the corporate risk posture and readiness to consumers and dependent parties.
C. Negotiate long-term contracts with companies who use well-vetted software application to avoid the transient nature of the cloud environment.
D. Provide transparency to stakeholders and shareholders demonstrating fiscal solvency and organizational transparency.
E. Both B and C.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
A. Discovery
B. Custody
C. Subpoena
D. Risk Assessment
E. Scope
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Explanation/Reference:
QUESTION 24 What item below allows disparate directory services and independent security domains to be
interconnected?
A. Coalition
B. Cloud
C. Intersection
D. Union
E. Federation
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
A. False
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26 To understand their compliance alignments and gaps with a cloud provider, what must cloud
customers rely on?
A. Provider documentation
B. Provider run audits and reports
C. Third-party attestations
D. Provider and consumer contracts
E. EDiscovery tools
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27 Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud
deployments?
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Section: (none)
Explanation
Explanation/Reference:
A. Application logic
B. Access controls
C. Encryption solutions
D. Physical destruction
E. Asset management and tracking
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30 What is the newer application development methodology and philosophy focused on automation of application development
and deployment?
A. Agile
B. BusOps
C. DevOps
D. SecDevOps
E. Scrum
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
A. False
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. You might not have the ability or administrative rights to search or access all hosted data.
B. The cloud provider must conduct the search with the full administrative controls.
C. All cloud-hosted email accounts are easily searchable.
D. Search and discovery time is always factored into a contract between the consumer and provider.
E. You can easily search across your environment using any E-Discovery tool.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33 How does running applications on distinct virtual networks and only connecting networks
as needed help?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35 ENISA:
“VM hopping” is:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. Improper management of VM instances, causing customer VMs to be commingled with other customer systems.
B. Looping within virtualized routing systems.
C. Lack of vulnerability management standards.
D. Using a compromised VM to exploit a hypervisor, used to take control of other VMs.
E. Instability in VM patch management causing VM routing errors.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36 Which concept is a mapping of an identity, including roles, personas, and attributes, to an
authorization?
A. Access control
B. Federated Identity Management
C. Authoritative source
D. Entitlement
E. Authentication
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
A. Virtualization
B. ApplistructureC. Hypervisor
D. Metastructure
E. Orchestration
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38 Network logs from cloud providers are typically flow records, not full
packet captures.
A. False
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. The development of a routine that covers all necessary security measures.
B. The diligent habits of good security practices and recording of the same.
C. The timely and efficient filing of security reports.
D. The awareness and adherence to obligations, including the assessment and prioritization of corrective actions deemed necessary and appropriate.
E. The process of completing all forms and paperwork necessary to develop a defensible paper trail.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40 CCM: In the CCM tool, “Encryption and Key Management” is an example of which
of the following?
A. Risk Impact
B. Domain
C. Control Specification
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. proxy encryption
B. data rights management
C. hypervisor agents
D. data dispersion
E. random placement
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 43 Which statement best describes the impact of Cloud Computing on business continuity
management?
A. A general lack of interoperability standards means that extra focus must be placed on the security aspects of migration between Cloud providers.
B. The size of data sets hosted at a Cloud provider can present challenges if migration to another provider becomes necessary.
C. Customers of SaaS providers in particular need to mitigate the risks of application lock-in.
D. Clients need to do business continuity planning due diligence in case they suddenly need to switch providers.
E. Geographic redundancy ensures that Cloud Providers provide highly available services.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44 What is known as a code execution environment running within an operating system that shares and uses the resources of the
operating system?
A. Platform-based Workload
B. Pod
C. Abstraction
D. Container
E. Virtual machine
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45 Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test
business continuity?
A. Planned Outages
B. Resiliency Planning
C. Expected Engineering
D. Chaos Engineering
E. Organized Downtime
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
What is true of companies considering a cloud computing business relationship?
A. The laws protecting customer data are based on the cloud provider and customer location only.
B. The confidentiality agreements between companies using cloud computing services is limited legally to the company, not the provider.
C. The companies using the cloud providers are the custodians of the data entrusted to them.
D. The cloud computing companies are absolved of all data security and associated risks through contracts and data laws.
E. The cloud computing companies own all customer data.
Correct Answer: C
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47 Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission
from the provider.
A. False
B. True
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
A. The metrics defining the service level required to achieve regulatory objectives.
B. The duration of time that a security violation can occur before the client begins assessing regulatory fines.
C. The cost per incident for security breaches of regulated information.
D. The regulations that are pertinent to the contract and how to circumvent them.
E. The type of security software which meets regulations and the number of licenses that will be needed.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49 Which cloud storage technology is basically a virtual hard drive for
instanced or VMs?
A. Volume storage
B. Platform
C. Database
D. Application
E. Object storage
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50 Which of the following items is NOT an example of Security as a
Service (SecaaS)?
A. Spam filtering
B. Authentication
C. Provisioning
D. Web filtering
E. Intrusion detection
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52 Which statement best describes why it is important to know how data is
being accessed?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53 What is
resource pooling?
Explanation/Reference:
A. False
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
B. True
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55 Which of the following is NOT normally a method for detecting and preventing data migration
into the cloud?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57 ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability
causing lock in is:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
A. Allowing the cloud provider to manage your keys so that they have the ability to access and delete the data from the main and back-up storage.
B. Maintaining customer managed key management and revoking or deleting keys from the key management system to prevent the data from being accessed again.
C. Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data.
D. Keep the keys stored on the client side so that they are secure and so that the users have the ability to delete their own data.
E. Both B and D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 60
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com