Professional Documents
Culture Documents
CCSK_Practice_Questions
CCSK_Practice_Questions
CCSK_Practice_Questions
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties that belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: C
B. Information Governance
E. Infrastructure Security
Correct Answer: C
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
Correct Answer: B
B. Default deny
D. Segregation by default
Correct Answer: A
Correct Answer: A
A security failure at the root network of a cloud provider will not compromise
the security of all customers because of multitenancy configuration.
A. False
B. True
Correct Answer: A
C. Private
D. IaaS
E. Hybrid
Correct Answer: E
B. Measured Service
D. Rapid Elasticity
E. Resource Pooling
Correct Answer: C
When configured properly, logs can track every code, infrastructure, and
configuration change and connect it back to the submitter and approver,
including the test results.
A. False
B. True
Correct Answer: B
Correct Answer: A
For third-party audits or attestations, what is critical for providers to publish
and customers to evaluate?
A. Scope of the assessment and the exact included features and services for the assessment
C. Network or architecture diagrams including all end point security devices in use
Correct Answer: C
E. Lock-In
Correct Answer: A
E. It must be containerized
Correct Answer: A
What are the primary security responsibilities of the cloud provider in the
management infrastructure?
A. Building and properly configuring a secure network infrastructure
C. Properly configuring the deployment of the virtual network, especially the firewalls
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
Correct Answer: D
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
Which of the following leverages virtual network topologies to run smaller, and
more isolated networks without incurring additional hardware costs?
A. Microsegmentation
B. VLANs
C. Converged networking
Correct Answer: A
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
D. Reference architectures
Correct Answer: D
Which governance domain focuses on proper and adequate incident detection,
response, notification, and remediation?
A. Data Security and Encryption
B. Information Governance
E. Infrastructure Security
Correct Answer: C
D. Both A and C
Correct Answer: A
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
D. Reference architectures
Correct Answer: D
Select the statement below which best describes the relationship between
identities and attributes:
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
B. An attribute is a unique object within a database. Each attribute has a number of
identities which help define its parameters.
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties that belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: C
B. Default deny
D. Segregation by default
Correct Answer: A
Which cloud service model involves the provider supplying the hardware,
storage, and network components?
A. Infrastructure as a Service (IaaS)
Correct Answer: A
B. Network segmentation
C. Encryption
D. Regular audits
Correct Answer: C
Correct Answer: B
Correct Answer: A
B. SMTP
C. FTP
D. HTTPS
Correct Answer: D
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: B
Correct Answer: B
B. GDPR
C. PCI DSS
D. ISO 27001
Correct Answer: C
B. Tokenization
C. SSL/TLS
D. Hardening
Correct Answer: C
B. HIPAA
C. Sarbanes-Oxley Act
D. GDPR
Correct Answer: B
What aspect of cloud computing can help reduce capital expenses?
A. Scalability
B. Multi-tenancy
C. Pay-as-you-go pricing
D. High availability
Correct Answer: C
Which disaster recovery strategy involves data mirroring between two cloud
data centers?
A. Pilot light
B. Warm standby
C. Hot site
D. Multi-site
Correct Answer: D
What tool or technology would you use to isolate network traffic in the cloud?
A. Firewalls
B. VLANs
D. Load balancer
Correct Answer: B
Correct Answer: A
Which AWS service is primarily used for identity and access management?
A. Amazon Cognito
B. AWS IAM
C. AWS Shield
D. Amazon Inspector
Correct Answer: B
C. To host websites
Correct Answer: A
B. Firewall
C. SIEM
D. Load balancer
Correct Answer: C
B. By converting data into a secure format that can only be read with a key
Correct Answer: B
What strategy involves spreading cloud assets across multiple providers to
avoid vendor lock-in?
A. Multi-cloud
B. Hybrid cloud
C. Scalable deployment
D. Single cloud
Correct Answer: A
B. Compliance checking
C. Penetration testing
D. Threat modeling
Correct Answer: A
B. It mandates that all security responsibilities are handled by the cloud provider
Correct Answer: A
B. It decreases the physical distance between the server and the user
Correct Answer: D
What is the main benefit of using managed cloud services?
A. It eliminates the need for IT staff
Correct Answer: B
Correct Answer: B
B. Manual patching
C. Automated scaling
D. Periodic audits
Correct Answer: A
Which cloud deployment model combines public and private clouds to allow
data and applications to be shared between them?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: C
What is the purpose of identity and access management (IAM) in cloud
security?
A. To manage virtual machines
Correct Answer: B
What does the term 'sandboxing' refer to in the context of cloud security?
A. A testing environment that isolates untested code changes
Correct Answer: A
B. CISM
C. CCSK
D. CEH
Correct Answer: C
Correct Answer: B
What does DDoS stand for in the context of cloud security threats?
A. Distributed Denial of Service
Correct Answer: A
Correct Answer: B
Correct Answer: A
B. HTTP
C. SFTP
D. SMTP
Correct Answer: C
What is the principle of defense in depth?
A. Using multiple layers of security controls
Correct Answer: A
Which cloud service model provides the highest level of control over the cloud
environment?
A. IaaS
B. PaaS
C. SaaS
D. FaaS
Correct Answer: A
Correct Answer: B
Correct Answer: B
What is the role of a Data Protection Officer (DPO) in cloud compliance?
A. Managing cloud infrastructure
Correct Answer: B
Correct Answer: A
C. An on-premises database
Correct Answer: B
Correct Answer: C
What is the main advantage of using serverless computing in the cloud?
A. Reduced server costs
B. Improved security
Correct Answer: C
Correct Answer: B
Correct Answer: B
Which type of cloud service allows users to develop, run, and manage
applications without dealing with the underlying infrastructure?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: B
What is a major benefit of using multi-factor authentication (MFA) in cloud
security?
A. Increased ease of access
Correct Answer: B
Which cloud service model is typically used for deploying virtual machines and
storage?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: A
Correct Answer: A
Which of the following practices helps ensure the integrity of data stored in the
cloud?
A. Data replication
B. Data encryption
C. Data deduplication
D. Data masking
Correct Answer: B
Which of the following reflects the claim of an individual to have certain data
deleted so that third persons can no longer trace them?
A. Right to be deleted
B. Right to be erased
C. Right to non-disclosure
D. Right to be forgotten
E. Right to privacy
Correct Answer: D
When entrusting a third party to process the data on its behalf, who remains
responsible for the collection and processing of the data?
A. Data Processor
B. Data Controller
C. Data Analyzer
D. Data Protector
Correct Answer: B
B. Pass-through Audit
D. Compliance Audit
Correct Answer: B
Correct Answer: C
Which of the following leverages virtual network topologies to run smaller, and
more isolated networks without incurring additional hardware costs?
A. Microsegmentation
B. VLANs
C. Converged networking
Correct Answer: A
What are the primary security responsibilities of the cloud provider in the
management infrastructure?
A. Building and properly configuring a secure network infrastructure
C. Properly configuring the deployment of the virtual network, especially the firewalls
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
Correct Answer: D
E. It must be containerized
Correct Answer: A
E. Lock-In
Correct Answer: A
Correct Answer: A
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
D. Reference architectures
Correct Answer: D
Select the statement below which best describes the relationship between
identities and attributes
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
B. An attribute is a unique object within a database. Each attribute has a number of
identities which help define its parameters.
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties which belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: D
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
Correct Answer: B
B. Information Governance
E. Infrastructure Security
Correct Answer: C
B. Default deny
D. Segregation by default
Correct Answer: A
Correct Answer: A
A security failure at the root network of a cloud provider will not compromise
the security of all customers because of multitenancy configuration.
A. False
B. True
Correct Answer: A
C. Private
D. IaaS
E. Hybrid
Correct Answer: E
B. Measured Service
D. Rapid Elasticity
E. Resource Pooling
Correct Answer: C
When configured properly, logs can track every code, infrastructure, and
configuration change and connect it back to the submitter and approver,
including the test results.
A. False
B. True
Correct Answer: B
Correct Answer: A
For third-party audits or attestations, what is critical for providers to publish
and customers to evaluate?
A. Scope of the assessment and the exact included features and services for the assessment
C. Network or architecture diagrams including all end point security devices in use
Correct Answer: C
Which cloud service model involves the provider supplying the hardware,
storage, and network components?
A. Infrastructure as a Service (IaaS)
Correct Answer: A
B. Network segmentation
C. Encryption
D. Regular audits
Correct Answer: C
Which of the following best describes the relationship between identities and
attributes?
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: C
B. Information Governance
E. Infrastructure Security
Correct Answer: C
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
Correct Answer: B
Correct Answer: A
Which of the following leverages virtual network topologies to run smaller, and
more isolated networks without incurring additional hardware costs?
A. Microsegmentation
B. VLANs
C. Converged networking
Correct Answer: A
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
D. Both A and C
Correct Answer: A
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
D. Reference architectures
Correct Answer: D
Select the statement below which best describes the relationship between
identities and attributes:
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties which belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: C
B. Information Governance
E. Infrastructure Security
Correct Answer: C
What is a potential concern of using Security-as-a-Service (SecaaS)?
A. Lack of visibility
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
Correct Answer: B
B. Default deny
D. Segregation by default
Correct Answer: A
Correct Answer: A
A security failure at the root network of a cloud provider will not compromise
the security of all customers because of multitenancy configuration.
A. False
B. True
Correct Answer: A
B. PaaS
C. Private
D. IaaS
E. Hybrid
Correct Answer: E
B. Measured Service
D. Rapid Elasticity
E. Resource Pooling
Correct Answer: C
When configured properly, logs can track every code, infrastructure, and
configuration change and connect it back to the submitter and approver,
including the test results.
A. False
B. True
Correct Answer: B
Correct Answer: A
C. Network or architecture diagrams including all end point security devices in use
Correct Answer: C
Which cloud service model involves the provider supplying the hardware,
storage, and network components?
A. Infrastructure as a Service (IaaS)
Correct Answer: A
B. Network segmentation
C. Encryption
D. Regular audits
Correct Answer: C
Correct Answer: B
Correct Answer: A
B. SMTP
C. FTP
D. HTTPS
Correct Answer: D
Correct Answer: B
What does DDoS stand for in the context of cloud security threats?
A. Distributed Denial of Service
Correct Answer: A
Correct Answer: B
B. HTTP
C. SFTP
D. SMTP
Correct Answer: C
Correct Answer: A
Which cloud service model provides the highest level of control over the cloud
environment?
A. IaaS
B. PaaS
C. SaaS
D. FaaS
Correct Answer: A
Correct Answer: B
Correct Answer: B
Correct Answer: A
C. An on-premises database
Correct Answer: B
What is the purpose of a security information and event management (SIEM)
system?
A. To store large amounts of data
Correct Answer: C
B. Improved security
Correct Answer: C
Correct Answer: B
Correct Answer: B
Which type of cloud service allows users to develop, run, and manage
applications without dealing with the underlying infrastructure?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: B
Correct Answer: B
Which cloud service model is typically used for deploying virtual machines and
storage?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: A
B. Manual patching
C. Automated scaling
D. Periodic audits
Correct Answer: A
Which cloud deployment model combines public and private clouds to allow
data and applications to be shared between them?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: C
Correct Answer: B
What does the term 'sandboxing' refer to in the context of cloud security?
A. A testing environment that isolates untested code changes
B. CISM
C. CCSK
D. CEH
Correct Answer: C
Correct Answer: B
What does DDoS stand for in the context of cloud security threats?
A. Distributed Denial of Service
Correct Answer: A
Correct Answer: B
What is the function of a web application firewall (WAF) in cloud security?
A. To monitor and block malicious HTTP/HTTPS traffic
Correct Answer: A
B. HTTP
C. SFTP
D. SMTP
Correct Answer: C
Correct Answer: A
Which cloud service model provides the highest level of control over the cloud
environment?
A. IaaS
B. PaaS
C. SaaS
D. FaaS
Correct Answer: A
What is the main purpose of encryption key management?
A. To reduce storage costs
Correct Answer: B
Correct Answer: B
Correct Answer: B
Correct Answer: A
Which of the following is an example of a cloud-native application?
A. A traditional desktop application
C. An on-premises database
Correct Answer: B
Correct Answer: C
B. Improved security
Correct Answer: C
Correct Answer: B
What does the term 'cloud governance' refer to?
A. The management of data centers
Correct Answer: B
Which type of cloud service allows users to develop, run, and manage
applications without dealing with the underlying infrastructure?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: B
Correct Answer: B
Which cloud service model is typically used for deploying virtual machines and
storage?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: A
What is the primary function of a cloud service level agreement (SLA)?
A. To define the terms of service and performance expectations between a cloud provider
and customer
Correct Answer: A
B. Manual patching
C. Automated scaling
D. Periodic audits
Correct Answer: A
Which cloud deployment model combines public and private clouds to allow
data and applications to be shared between them?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: C
What does the term 'sandboxing' refer to in the context of cloud security?
A. A testing environment that isolates untested code changes
Correct Answer: A
B. CISM
C. CCSK
D. CEH
Correct Answer: C
Which of the following reflects the claim of an individual to have certain data
deleted so that third persons can no longer trace them?
A. Right to be deleted
B. Right to be erased
C. Right to non-disclosure
D. Right to be forgotten
E. Right to privacy
Correct Answer: D
When entrusting a third party to process the data on its behalf, who remains
responsible for the collection and processing of the data?
A. Data Processor
B. Data Controller
C. Data Analyzer
D. Data Protector
Correct Answer: B
B. Pass-through Audit
D. Compliance Audit
Correct Answer: B
Correct Answer: C
Which of the following leverages virtual network topologies to run smaller, and
more isolated networks without incurring additional hardware costs?
A. Microsegmentation
B. VLANs
C. Converged networking
Correct Answer: A
What are the primary security responsibilities of the cloud provider in the
management infrastructure?
A. Building and properly configuring a secure network infrastructure
C. Properly configuring the deployment of the virtual network, especially the firewalls
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
Correct Answer: D
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
D. Both A and C
Correct Answer: A
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
Correct Answer: D
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
Correct Answer: B
B. Information Governance
E. Infrastructure Security
Correct Answer: C
B. Default deny
D. Segregation by default
Correct Answer: A
What is the most significant security difference between traditional
infrastructure and cloud computing?
A. Management plane
Correct Answer: A
A security failure at the root network of a cloud provider will not compromise
the security of all customers because of multitenancy configuration.
A. False
B. True
Correct Answer: A
B. PaaS
C. Private
D. IaaS
E. Hybrid
Correct Answer: E
B. Measured Service
D. Rapid Elasticity
E. Resource Pooling
Correct Answer: C
When configured properly, logs can track every code, infrastructure, and
configuration change and connect it back to the submitter and approver,
including the test results.
A. False
B. True
Correct Answer: B
Correct Answer: A
C. Network or architecture diagrams including all end point security devices in use
Correct Answer: C
E. Lock-In
Correct Answer: A
E. It must be containerized
Correct Answer: A
B. False
Correct Answer: B
What are the primary security responsibilities of the cloud provider in the
management infrastructure?
A. Building and properly configuring a secure network infrastructure
C. Properly configuring the deployment of the virtual network, especially the firewalls
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
Correct Answer: D
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
Which of the following leverages virtual network topologies to run smaller, and
more isolated networks without incurring additional hardware costs?
A. Microsegmentation
B. VLANs
C. Converged networking
Correct Answer: A
B. Pass-through Audit
D. Compliance Audit
Correct Answer: B
Which cloud service model involves the provider supplying the hardware,
storage, and network components?
A. Infrastructure as a Service (IaaS)
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: B
Which cloud security model type provides generalized templates for helping
implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
D. Reference architectures
Correct Answer: D
What are the primary security responsibilities of the cloud provider in the
management infrastructure?
A. Building and properly configuring a secure network infrastructure
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
Correct Answer: D
B. Deployment flexibility
D. Intelligence sharing
E. Insulation of clients
Correct Answer: A
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
Correct Answer: B
Correct Answer: B
What does DDoS stand for in the context of cloud security threats?
A. Distributed Denial of Service
Correct Answer: A
Correct Answer: B
Correct Answer: A
B. HTTP
C. SFTP
D. SMTP
Correct Answer: C
What is the principle of defense in depth?
A. Using multiple layers of security controls
Correct Answer: A
Which cloud service model provides the highest level of control over the cloud
environment?
A. IaaS
B. PaaS
C. SaaS
D. FaaS
Correct Answer: A
Correct Answer: B
Correct Answer: B
What is the role of a Data Protection Officer (DPO) in cloud compliance?
A. Managing cloud infrastructure
Correct Answer: B
B. CISM
C. CCSK
D. CEH
Correct Answer: C
Correct Answer: B
B. HTTP
C. SFTP
D. SMTP
Correct Answer: C
What is the role of a Data Protection Officer (DPO) in cloud compliance?
A. Managing cloud infrastructure
Correct Answer: B
Which cloud deployment model combines public and private clouds to allow
data and applications to be shared between them?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: C
B. Hybrid cloud
C. Scalable deployment
D. Single cloud
Correct Answer: A
What does the term 'sandboxing' refer to in the context of cloud security?
A. A testing environment that isolates untested code changes
Correct Answer: A
Which cloud security certification focuses on global cloud security standards?
A. CISSP
B. CISM
C. CCSK
D. CEH
Correct Answer: C
Correct Answer: B
B. HTTP
C. SFTP
D. SMTP
Correct Answer: C
Correct Answer: B
Which cloud deployment model combines public and private clouds to allow
data and applications to be shared between them?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: C
B. Hybrid cloud
C. Scalable deployment
D. Single cloud
Correct Answer: A
What does the term 'sandboxing' refer to in the context of cloud security?
A. A testing environment that isolates untested code changes
Correct Answer: A
Which cloud service model is typically used for deploying virtual machines and
storage?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: A
What does DDoS stand for in the context of cloud security threats?
A. Distributed Denial of Service
Correct Answer: A
Correct Answer: B
Correct Answer: A
B. It mandates that all security responsibilities are handled by the cloud provider
Correct Answer: A
Which process involves reviewing the security posture of cloud services on a
regular basis?
A. Security audit
B. Compliance checking
C. Penetration testing
D. Threat modeling
Correct Answer: A
Correct Answer: A
B. Improved security
Correct Answer: C
Correct Answer: C
What is the main purpose of encryption key management?
A. To reduce storage costs
Correct Answer: B
Correct Answer: B
C. To host websites
Correct Answer: A
Correct Answer: B
Which of the following best describes the relationship between identities and
attributes?
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties which belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: C
Correct Answer: A
B. By converting data into a secure format that can only be read with a key
Correct Answer: B
B. Network segmentation
C. Encryption
D. Regular audits
Correct Answer: C
B. HIPAA
C. Sarbanes-Oxley Act
D. GDPR
Correct Answer: B
B. Multi-tenancy
C. Pay-as-you-go pricing
D. High availability
Correct Answer: C
Which disaster recovery strategy involves data mirroring between two cloud
data centers?
A. Pilot light
B. Warm standby
C. Hot site
D. Multi-site
Correct Answer: D
What tool or technology would you use to isolate network traffic in the cloud?
A. Firewalls
B. VLANs
Correct Answer: B
Correct Answer: A
Which AWS service is primarily used for identity and access management?
A. Amazon Cognito
B. AWS IAM
C. AWS Shield
D. Amazon Inspector
Correct Answer: B
C. To host websites
Correct Answer: A
B. Firewall
C. SIEM
D. Load balancer
Correct Answer: C
B. By converting data into a secure format that can only be read with a key
Correct Answer: B
Correct Answer: B
B. Compliance checking
C. Penetration testing
D. Threat modeling
Correct Answer: A
Which type of cloud service allows users to develop, run, and manage
applications without dealing with the underlying infrastructure?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: B
Which cloud service model provides the highest level of control over the cloud
environment?
A. IaaS
B. PaaS
C. SaaS
D. FaaS
Correct Answer: A
Correct Answer: B
B. It decreases the physical distance between the server and the user
Correct Answer: D
Correct Answer: B
How do service level agreements (SLAs) benefit cloud computing customers?
A. They provide legal ownership of data
Correct Answer: B
B. Manual patching
C. Automated scaling
D. Periodic audits
Correct Answer: A
Correct Answer: B
Correct Answer: B
What does the term 'multi-tenancy' refer to in cloud computing?
A. Multiple customers using the same application
Correct Answer: A
B. SMTP
C. FTP
D. HTTPS
Correct Answer: D
Correct Answer: B
What does DDoS stand for in the context of cloud security threats?
A. Distributed Denial of Service
Correct Answer: A
Which of the following is a common cloud storage security practice?
A. Storing data in plaintext
Correct Answer: B
Which cloud service model allows users to develop, run, and manage
applications without dealing with the underlying infrastructure?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: B
Correct Answer: B
Correct Answer: A
Which of the following is a key characteristic of cloud elasticity?
A. Fixed resource allocation
Correct Answer: B
Correct Answer: B
B. HTTP
C. SFTP
D. SMTP
Correct Answer: C
Which cloud service model is typically used for deploying virtual machines and
storage?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Correct Answer: A
What is the role of a Data Protection Officer (DPO) in cloud compliance?
A. Managing cloud infrastructure
Correct Answer: B
C. An on-premises database
Correct Answer: B
Correct Answer: B
B. Improved security
Correct Answer: C
What is the purpose of identity and access management (IAM) in cloud
security?
A. To manage virtual machines
Correct Answer: B
Correct Answer: B
Correct Answer: A
What does DDoS stand for in the context of cloud security threats?
A. Distributed Denial of Service
Correct Answer: A
Which of the following best describes the relationship between identities and
attributes?
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties which belong to an identity. Each identity can have multiple attributes.
E. Identities are the network names given to servers. Attributes are the characteristics of
each server.
Correct Answer: C
Correct Answer: A
Correct Answer: B
Correct Answer: A
Which cloud deployment model combines public and private clouds to allow
data and applications to be shared between them?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: C
What does the term 'sandboxing' refer to in the context of cloud security?
A. A testing environment that isolates untested code changes
Correct Answer: A
B. CISM
C. CCSK
D. CEH
Correct Answer: C
Correct Answer: C
B. It mandates that all security responsibilities are handled by the cloud provider
Correct Answer: A
B. Hybrid cloud
C. Scalable deployment
D. Single cloud
Correct Answer: A