Professional Documents
Culture Documents
CCSK_Even_More_Practice_Questions
CCSK_Even_More_Practice_Questions
B. Right to be erased
C. Right to non-disclosure
D. Right to be forgotten
E. Right to privacy
Correct Answer: D
When entrusting a third party to process the data on its behalf, who remains
responsible for the collection and processing of the data?
A. Data Processor
B. Data Controller
C. Data Analyzer
D. Data Protector
Correct Answer: B
B. Pass-through Audit
D. Compliance Audit
Correct Answer: B
Which of the following is not a security benefit of Immutable workloads?
A. Security testing can be managed during image creation
Correct Answer: C
Which of the following leverages virtual network topologies to run smaller, and
more isolated networks without incurring additional hardware costs?
A. Microsegmentation
B. VLANs
C. Converged networking
Correct Answer: A
What are the primary security responsibilities of the cloud provider in the
management infrastructure?
A. Building and properly configuring a secure network infrastructure
C. Properly configuring the deployment of the virtual network, especially the firewalls
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
Correct Answer: D
E. It must be containerized
Correct Answer: A
E. Lock-In
Correct Answer: A
Correct Answer: A
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
D. Reference architectures
Correct Answer: D
Select the statement below which best describes the relationship between
identities and attributes
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties which belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: D
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
Correct Answer: B
Which governance domain focuses on proper and adequate incident detection,
response, notification, and remediation?
A. Data Security and Encryption
B. Information Governance
E. Infrastructure Security
Correct Answer: C
B. Default deny
D. Segregation by default
Correct Answer: A
Correct Answer: A
A security failure at the root network of a cloud provider will not compromise
the security of all customers because of multitenancy configuration.
A. False
B. True
Correct Answer: A
B. PaaS
C. Private
D. IaaS
E. Hybrid
Correct Answer: E
B. Measured Service
D. Rapid Elasticity
E. Resource Pooling
Correct Answer: C
When configured properly, logs can track every code, infrastructure, and
configuration change and connect it back to the submitter and approver,
including the test results.
A. False
B. True
Correct Answer: B
Correct Answer: A
C. Network or architecture diagrams including all end point security devices in use
Correct Answer: C
Which cloud service model involves the provider supplying the hardware,
storage, and network components?
A. Infrastructure as a Service (IaaS)
Correct Answer: A
B. Network segmentation
C. Encryption
D. Regular audits
Correct Answer: C