Which type of application security testing involves manual activity that is not necessarily integrated into automated testing?
A. Code Review
B. Static Application Security Testing (SAST)
C. Unit Testing
D. Functional Testing
E. Dynamic Application Security Testing (DAST)
Which meta-phase does the Cloud Security Alliance use to focus on the security and testing activities when moving code from an isolated development environment to production?
A. Secure Networking
B. Secure Scaling
C. Secure Deployment
D. Secure Operations
E. Secure Design and Development
Even with immutable infrastructures, the production environment, should be actively monitored for changes and deviations from approved baselines.
A. False
B. True
Highly regulated industries such as finance and health care should consider the impact of cloud providers operating in diverse geographic locations and ______________.
A. Virtual environments
B. Sparsely populated areas
C. Without licenses
D. Legal jurisdictions
E. None of the above
The key concern of data location is:
A. Assurance that all data requested by legal authorities has been retrieved
B. Assurance that prohibited locations cannot access the data
C. Data is located only on redundant storage subsystems with high MTBF (mean time between failures)
D. Data is stored only in geographic locations permitted by regulations
E. Data should not be commingled with other customers
ENISA: Licensing Risks refer to:
A. Use of country-issued drivers licenses for user identification
B. Cloud provider employees not maintaining operating system license files
C. Risk that software company may go out of business, leading to expiration of licenses for mission critical software
D. A traditional software licensing scheme may lead to high costs or lack of compliance in cloud systems
E. Cloud provider may not have all appropriate government operating licenses
Which architecture for hybrid cloud connectivity allows you to connect multiple, different cloud networks to a data center using a single hybrid connection?
A. Dataconnect
B. Multiconnect
C. Transitional
D. Bastion
E. Hybrid
CCM: Which of the following statement about CSA's CCM and Security Guidance is False?
A. CSA's CCM provides a set of control objective against which an organization should assess cloud security
B. CSA's Security Guidance tells you WHAT to do, the CCM tells you HOW to do it
C. CSAs Security Guidance provides a set of best practices and recommendations
D. CSA's CCM tells you WHAT to do, the Guidance tells you HOW to do it
What are the barriers to developing full confidence in security as a service (SecaaS)?
A. Federation bridges, software compatibility, and implementation
B. Delegations, bipartisan tenancy, and implementation
C. Single tenancy and vendor lock-in
D. Provisioning, federation, and compliance
E. Compliance, multi-tenancy, and vendor lock-in
Of the choices below which option allows for the most interoperability in security authentication in a cloud environment?
A. XHTML
B. SAML
C. SCORM
D. WEP
E. WPA or WPA2
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cloud Security Alliance exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CCSK exam preparations and Cloud Security Alliance certification application, do not hesitate to visit our Vcedump.com to find your solutions here.