ENISA: Which of the following is among the vulnerabilities contributing to a high risk ranking for Network Management?
A. User provisioning vulnerabilities
B. AAA vulnerabilities
C. System or O/S vulnerabilities
D. Hypervisor vulnerabilities
E. Inadequate physical security procedures
When Configuring SDN firewalls, after adding all assets, what is typically the rst configuration you must address?
A. Creating update rules
B. Configuring additional access
C. Disconnecting previous firewalls
D. Opening connections
E. Configuring logging
Identified issues, risks, and recommended remediations are included when determining compliance.
A. True
B. False
Which common component of big data is focused on the mechanisms used to ingest large volumes of data, often of a streaming nature?
A. Distributed processing
B. Distributed storage
C. Distributed attribution
D. Distributed data collection
E. Distributed information
Which statement best describes a data (information) dispersion fragmentation scheme?
A. A network is split into nodes; all of the nodes store only certain types of files.
B. Fragmented files are signed and stored together on a local server; data retrieval is arbitrary.
C. File fragments are sequentially placed on servers based on the physical location of the data user.
D. A cloud is split into cloudlets; each cloudlet stores a portion of the files based on an encryption algorithm.
E. A file is split into fragments; all of the fragments are sent to multiple physical storage repositories.
To increase network isolation, you should use SDN capabilities for multiple networks and cloud accounts or segments.
A. False
B. True
Installing security software designed for physical servers onto a virtualized server can result in severe degradation in performance.
A. False
B. True
CCM: A hypothetical company called "lnfrastructure4Sure" provides Infrastructure as a Service (IaaS) to its clients. A customer wants to review Infrastructure4Sure's hypervisor security implementation measures. Which of the following measures should Infrastructure4Sure implement?
A. Choose a hypervisor with a smaller footprint for a reduced attack surface.
B. Harden the hypervisor's configuration to increase areas of vulnerability (e.g., disabling memory sharing between VMs running within the same hypervisor hosts).
C. Connect unused physical hardware devices and enable clipboard or le-sharing services.
D. Monitor for signs of compromise by analyzing hypervisor logs on an ongoing basis.
E. A and D
CCM: What security requirements does the Identity and Access Management domain in the CCM address?
A. The requirement to ensure that all files are properly backed up.
B. The requirement to ensure inappropriate access to resources and to enable the right individuals to access the right resources.
C. There is no such domain as Identity and Access Management in the CCM.
D. The requirement to ensure appropriate access to resources and to enable the right individuals to access the right resources at the right times for the right reasons.
Which of the following cloud deployment models represents a composition of two or more clouds that remain unique identities but are bound together by standardized or proprietary technology that enables data and application portability?
A. Public cloud
B. Hybrid cloud
C. Community cloud
D. Segregated cloud
E. None of the above
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cloud Security Alliance exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CCSK exam preparations and Cloud Security Alliance certification application, do not hesitate to visit our Vcedump.com to find your solutions here.