Certificate of Cloud Security Knowledge v1.0 (CCSK)

Page:    1 / 15   
Total 228 questions

A cloud deployment of two or more unique clouds is known as:

  • A. Infrastructures as a Service
  • B. A Private Cloud
  • C. A Community Cloud
  • D. A Hybrid Cloud
  • E. Jericho Cloud Cube Model


Answer : C

ENISA: Which is not one of the five key legal issues common across all scenarios:

  • A. Data protection
  • B. Professional negligence
  • C. Globalization
  • D. Intellectual property
  • E. Outsourcing services and changes in control


Answer : C

ENISA: An example high risk role for malicious insiders within a Cloud Provider includes

  • A. Sales
  • B. Marketing
  • C. Legal counsel
  • D. Auditors
  • E. Accounting


Answer : D

What are the primary security responsibilities of the cloud provider in the management infrastructure?

  • A. Building and properly configuring a secure network infrastructure
  • B. Configuring second factor authentication across the network
  • C. Properly configuring the deployment of the virtual network, especially the firewalls
  • D. Properly configuring the deployment of the virtual network, except the firewalls
  • E. Providing as many API endpoints as possible for custom access and configurations


Answer : D

What is true of a workload?

  • A. It is a unit of processing that consumes memory
  • B. It does not require a hardware stack
  • C. It is always a virtual machine
  • D. It is configured for specific, established tasks
  • E. It must be containerized


Answer : A

ENISA: Which is a potential security benefit of cloud computing?

  • A. More efficient and timely system updates
  • B. ISO 27001 certification
  • C. Provider can obfuscate system O/S and versions
  • D. Greater compatibility with customer IT infrastructure
  • E. Lock-In


Answer : A

The Software Defined Perimeter (SDP) includes which components?

  • A. Client, Controller, and Gateway
  • B. Client, Controller, Firewall, and Gateway
  • C. Client, Firewall, and Gateway
  • D. Controller, Firewall, and Gateway
  • E. Client, Controller, and Firewall


Answer : A

Which cloud security model type provides generalized templates for helping implement cloud security?

  • A. Conceptual models or frameworks
  • B. Design patterns
  • C. Controls models or frameworks
  • D. Reference architectures
  • E. Cloud Controls Matrix (CCM)


Answer : D

Select the statement below which best describes the relationship between identities and attributes

  • A. Attributes belong to entities and identities belong to attributes. Each attribute can have multiple identities but only one entity.
  • B. An attribute is a unique object within a database. Each attribute it has a number of identities which help define its parameters.
  • C. An identity is a distinct and unique object within a particular namespace. Attributes are properties which belong to an identity. Each identity can have multiple attributes.
  • D. Attributes are made unique by their identities.
  • E. Identities are the network names given to servers. Attributes are the characteristics of each server.


Answer : D

What is a potential concern of using Security-as-a-Service (SecaaS)?

  • A. Lack of visibility
  • B. Deployment flexibility
  • C. Scaling and costs
  • D. Intelligence sharing
  • E. Insulation of clients


Answer : A

How should an SDLC be modified to address application security in a Cloud Computing environment?

  • A. Integrated development environments
  • B. Updated threat and trust models
  • C. No modification is needed
  • D. Just-in-time compilers
  • E. Both B and C


Answer : A

Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?

  • A. Data Security and Encryption
  • B. Information Governance
  • C. Incident Response, Notification and Remediation
  • D. Compliance and Audit Management
  • E. Infrastructure Security


Answer : C

Which opportunity helps reduce common application security issues?

  • A. Elastic infrastructure
  • B. Default deny
  • C. Decreased use of micro-services
  • D. Segregation by default
  • E. Fewer serverless configurations


Answer : A

What is the most significant security difference between traditional infrastructure and cloud computing?

  • A. Management plane
  • B. Intrusion detection options
  • C. Secondary authentication factors
  • D. Network access points
  • E. Mobile security configuration options


Answer : A

A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.

  • A. False
  • B. True


Answer : A

Page:    1 / 15   
Total 228 questions