Professional Documents
Culture Documents
CCSK_Practice_Questions_Set2
CCSK_Practice_Questions_Set2
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties that belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: C
B. Information Governance
E. Infrastructure Security
Correct Answer: C
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
Correct Answer: B
B. Default deny
D. Segregation by default
Correct Answer: A
Correct Answer: A
A security failure at the root network of a cloud provider will not compromise
the security of all customers because of multitenancy configuration.
A. False
B. True
Correct Answer: A
C. Private
D. IaaS
E. Hybrid
Correct Answer: E
B. Measured Service
D. Rapid Elasticity
E. Resource Pooling
Correct Answer: C
When configured properly, logs can track every code, infrastructure, and
configuration change and connect it back to the submitter and approver,
including the test results.
A. False
B. True
Correct Answer: B
Correct Answer: A
For third-party audits or attestations, what is critical for providers to publish
and customers to evaluate?
A. Scope of the assessment and the exact included features and services for the assessment
C. Network or architecture diagrams including all end point security devices in use
Correct Answer: C
E. Lock-In
Correct Answer: A
E. It must be containerized
Correct Answer: A
What are the primary security responsibilities of the cloud provider in the
management infrastructure?
A. Building and properly configuring a secure network infrastructure
C. Properly configuring the deployment of the virtual network, especially the firewalls
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
Correct Answer: D
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
Which of the following leverages virtual network topologies to run smaller, and
more isolated networks without incurring additional hardware costs?
A. Microsegmentation
B. VLANs
C. Converged networking
Correct Answer: A
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
D. Reference architectures
Correct Answer: D
Which governance domain focuses on proper and adequate incident detection,
response, notification, and remediation?
A. Data Security and Encryption
B. Information Governance
E. Infrastructure Security
Correct Answer: C
D. Both A and C
Correct Answer: A
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
D. Reference architectures
Correct Answer: D
Select the statement below which best describes the relationship between
identities and attributes:
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
B. An attribute is a unique object within a database. Each attribute has a number of
identities which help define its parameters.
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties that belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: C
B. Default deny
D. Segregation by default
Correct Answer: A