Virtual appliances can become bottlenecks because they cannot fail open and must intercept all traffic .
A. False
B. True
In the cloud provider and consumer relationship, which entity manages the virtual or abstracted infrastructure?
A. Only the cloud provider
B. It is determined in the agreement between the entities
C. Only the cloud consumer
D. Both the cloud provider and consumer
E. It is outsourced as per the entity agreement
If a provider's infrastructure is not in scope, who is responsible for building compliant applications and services?
A. The customer is responsible for compliant applications and services.
B. It is up to the customer and provider to negotiate the solution.
C. The provider must update or x whatever is not in compliance.
D. No one. It is an accepted risk that is written into the terms and conditions with customers.
E. The provider must create a separate tenant for each customer based on the various compliance regulations.
ENISA: As it relates to public cloud computing, in the European Data Protection law, the customer is considered to be the:
A. Data controller
B. Data owner
C. Certificate holder
D. Data processor
E. Data manager
Immutable workloads make it faster to roll out updated versions because applications must be designed to handle individual nodes going down.
A. False
B. True
Which technique uses the management plane to detect various activities, such as file uploads or configuration changes?
A. Event-driven security
B. Static Application Security Testing (SAST)
C. Action security
D. Auditing and logging
E. Dynamic Application Security Testing (DAST)
Which phase of the incident response lifecycle includes creating and validating alerts?
A. Preparation
B. Containment, Eradication, Recovery
C. Detection and Analysis
D. Auditing and Logging
E. Post-mortem
ENISA: To mitigate credential compromise or theft, cloud provider can implement:
A. HR background checks
B. Hardening of virtual machines according to industry standard guidelines
C. Data-at-rest encryption
D. Portable applications using open APIs
E. Anomaly detection capabilities
Why, in the event that an enterprise seeks a new provider for Security as a Service, must they concern themselves with the problems of translating and transporting existing data and log files in a forensically sound manner?
A. The logging and reporting files are often heavily encrypted
B. Providers may operate in foreign languages
C. Providers don't want to lose business so they do not help the customer move out
D. Logging and reporting is often treated haphazardly
E. Providers often have proprietary standards for logging and reporting
In which layer is the management plane?
A. Infrastructure layer
B. Applistructure layer
C. Metastructure layer
D. Infostructure layer
E. Overstructure layer
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cloud Security Alliance exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CCSK exam preparations and Cloud Security Alliance certification application, do not hesitate to visit our Vcedump.com to find your solutions here.