Professional Documents
Culture Documents
CCSK_Additional_Practice_Questions
CCSK_Additional_Practice_Questions
Correct Answer: A
B. Network segmentation
C. Encryption
D. Regular audits
Correct Answer: C
Correct Answer: B
Correct Answer: A
B. SMTP
C. FTP
D. HTTPS
Correct Answer: D
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: B
Correct Answer: B
B. GDPR
C. PCI DSS
D. ISO 27001
Correct Answer: C
B. Tokenization
C. SSL/TLS
D. Hardening
Correct Answer: C
B. HIPAA
C. Sarbanes-Oxley Act
D. GDPR
Correct Answer: B
B. Multi-tenancy
C. Pay-as-you-go pricing
D. High availability
Correct Answer: C
Which disaster recovery strategy involves data mirroring between two cloud
data centers?
A. Pilot light
B. Warm standby
C. Hot site
D. Multi-site
Correct Answer: D
What tool or technology would you use to isolate network traffic in the cloud?
A. Firewalls
B. VLANs
D. Load balancer
Correct Answer: B
Correct Answer: A
Which AWS service is primarily used for identity and access management?
A. Amazon Cognito
B. AWS IAM
C. AWS Shield
D. Amazon Inspector
Correct Answer: B
C. To host websites
B. Firewall
C. SIEM
D. Load balancer
Correct Answer: C
B. By converting data into a secure format that can only be read with a key
Correct Answer: B
B. Hybrid cloud
C. Scalable deployment
D. Single cloud
Correct Answer: A
B. Compliance checking
C. Penetration testing
D. Threat modeling
Correct Answer: A
B. It mandates that all security responsibilities are handled by the cloud provider
Correct Answer: A
B. It decreases the physical distance between the server and the user
Correct Answer: D
Correct Answer: B
Correct Answer: B
Which technique is used to detect and mitigate threats in real-time in the
cloud?
A. Machine learning algorithms
B. Manual patching
C. Automated scaling
D. Periodic audits
Correct Answer: A