What are major factors to building and managing a secure management plane?
A. Perimeter security; customer authentication; internal authentication and credential passing; authorization and entitlements; and logging, monitoring, and alerting
B. API management; end point security; logging; and authentication and authorization
C. Device patching and maintenance; internal authentication and credential passing; access management and logging, monitoring, and alerting
D. Perimeter security; customer authentication; internal authentication and credential passing; authorization and entitlements; and governance auditing
E. Perimeter patching; log authentication; external entitlement passing; credential alerting and customer security
Cloud storage will most often utilize the same types of data storage used in traditional data storage technologies.
A. True
B. False
Prominent recommended standards to enable federation of identity in cloud environments include:
A. FIDO
B. Kerberos
C. SSO
D. SAML
E. X 509
How can you reduce the blast radius if an attacker compromises one system?
A. Configure distinct firewall rules
B. Configure applications on distinct virtual networks only connecting where needed
C. Configure role-based access controls
D. Configure a default deny
E. Use different cloud providers
What are the three valid options for protecting data as it moves to and within the cloud?
A. Client/Application Encryption, Link/Network Encryption, Proxy-Based Encryption
B. Client/Application Encryption, Link/Network Encryption, Hypervisor Encryption
C. Client/Application Bundling, Link/Network Bundling, Proxy-Based Bundling
D. Password Encryption, Link/Network Encryption, Proxy-Based Encryption
E. Client/Application Encryption, Cloud Encoding, Proxy-Based Encryption
To what extent does the CSA Guidance document suffice for legal advice in setting up relationships with cloud service providers?
A. The CSA Guidance document provides adequate legal advice under certain circumstances.
B. The CSA Guidance document provides an overview of selected issues and it is not a substitute for obtaining legal advice.
C. The CSA Guidance document provides copious amounts of relevant case law to enable legal inferences to be developed.
D. The CSA Guidance document does not discuss any legal issues at all.
E. The CSA Guidance document provides sufficient guidance to substitute for legal advice.
ENISA: A key area of controls for cloud provider network architecture is
A. Patch management
B. SAFECode software assurance
C. Hardening of virtual machines according to industry standard guidelines
D. Distributed Denial of Service mitigation
E. Antivirus
What makes the metastructure layer of cloud computing so different from traditional computing?
A. It includes the management plane components, which are network enabled and remotely accessible
B. It is automatically patch and scalable
C. It includes the data and information components
D. It includes the underlying application services
E. It eliminates the need for the Infostructure layer
While a virtual machine is a full abstraction of an operating system, a container is a constrained place to run segregated processes while still using the kernel and other OS capabilities.
A. True
B. False
What are the main considerations for key management?
A. Performance, control, immutability, and security
B. Performance, accessibility, immutability, and security
C. Performance, control, accessibility, and security
D. Performance, accessibility, latency, and security
E. Accessibility, control, latency, and security
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cloud Security Alliance exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CCSK exam preparations and Cloud Security Alliance certification application, do not hesitate to visit our Vcedump.com to find your solutions here.