Which part of the incident response process is greatly complicated by the resource pooling and rapid elasticity of cloud infrastructure?
A. Recovery
B. Ballistics
C. Detection
D. Forensics
E. Preparation
What best describes the tradeoff of Infrastructure as a Service as compared to other cloud service models?
A. Less security features and greater extensibility
B. Greater initial costs and greater security features
C. Lower initial costs and greater long terms costs
D. Greater security features and less extensibility
E. Lower initial cost and greater security features
How can you monitor and filter data in a virtual network when traffic might not cross the physical network?
A. Route traffic to the physical network for capturing
B. Route traffic to a virtual appliance on the same virtual network
C. Route traffic to a virtual network monitoring or filtering tool on the same hardware
D. A and B
E. B and C
Which concept is defined as the unique expression of an entity within a given namespace?
A. Persona
B. Role
C. Attribute
D. Identifier
E. Identity
What is a method used to decouple the network control plane from the data plane?
A. Information Management Policies
B. Multitenancy
C. Network Intrusion Detect on Systems (NIDS)
D. Software defined Networking (SDN)
E. Virtual LANs (VLANs)
For cloud consumers to be able to properly configure and manage their network security, what must cloud providers do?
A. Expose security controls
B. Provide security templates
C. Configure a default deny and enable controls as requested
D. Provide administrator access to the tenant
E. Provide API access
What is true of Software defined Network firewalls?
A. They are policy sets that can only be applied to similar grouped assets
B. They require the use of static IP addresses
C. They are more difficult to manage
D. They are limited based on physical topology
E. They are not limited based on physical topology
Which deployment model is commonly used to describe a non-cloud data center bridged directly to a cloud provider?
A. Hosted Cloud
B. Hybrid Cloud
C. Community Cloud
D. Private Cloud
E. Public Cloud
What is a core tenant of risk management?
A. If there is still residual risk after assessments and controls are in place, you must accept the risk.
B. Risk insurance covers all financial losses, including loss of customers.
C. The consumers are completely responsible for all risk.
D. The provider is accountable for all risk management.
E. You can manage, transfer, accept, or avoid risks.
The level of attention and scrutiny paid to enterprise risk assessments should be directly related to what?
A. The size of the cloud computing environment
B. The value of the information at risk
C. The operating system and firewall type
D. Whether the cloud is IaaS, PaaS, or SaaS
E. Both A and C
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cloud Security Alliance exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CCSK exam preparations and Cloud Security Alliance certification application, do not hesitate to visit our Vcedump.com to find your solutions here.