What is resource pooling?
A. The provider's computing resources are pooled to serve multiple consumers.
B. Internet-based CPUs are pooled to enable multi-threading.
C. The dedicated computing resources of each client are pooled together in a colocation facility.
D. Placing Internet ( cloud ) data centers near multiple sources of energy, such as hydroelectric dams.
E. None of the above.
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
A. Volume storage
B. Platform
C. Database
D. Application
E. Object storage
Which of the following items is NOT an example of Security as a Service (SecaaS)?
A. Spam filtering
B. Authentication
C. Provisioning
D. Web filtering
E. Intrusion detection
How is encryption managed on multi-tenant storage?
A. Single key for all data owners
B. One key per data owner
C. Multiple keys per data owner
D. The answer could be A, B, or C depending on the provider
E. C for data subject to the EU Data Protection Directive; B for all others
Which statement best describes why it is important to know how data is being accessed?
A. The devices used to access data have different storage formats.
B. The devices used to access data use a variety of operating systems and may have different programs installed on them.
C. The device may affect data dispersion.
D. The devices used to access data use a variety of applications or clients and may have different security characteristics.
E. The devices used to access data may have different ownership characteristics.
What is true of companies considering a cloud computing business relationship?
A. The laws protecting customer data are based on the cloud provider and customer location only.
B. The con dentiality agreements between companies using cloud computing services is limited legally to the company, not the provider.
C. The companies using the cloud providers are the custodians of the data entrusted to them.
D. The cloud computing companies are absolved of all data security and associated risks through contracts and data laws.
E. The cloud computing companies own all customer data.
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
A. False
B. True
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
A. The metrics defining the service level required to achieve regulatory objectives.
B. The duration of time that a security violation can occur before the client begins assessing regulatory fines.
C. The cost per incident for security breaches of regulated information.
D. The regulations that are pertinent to the contract and how to circumvent them.
E. The type of security software which meets regulations and the number of licenses that will be needed.
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
A. Platform-based Workload
B. Pod
C. Abstraction
D. Container
E. Virtual machine
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
A. Planned Outages
B. Resiliency Planning
C. Expected Engineering
D. Chaos Engineering
E. Organized Downtime
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cloud Security Alliance exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CCSK exam preparations and Cloud Security Alliance certification application, do not hesitate to visit our Vcedump.com to find your solutions here.