Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
CCSK
Free trial
Verified
Question 26
Which component is a key part of software container systems?
- A: Operating system
- B: Workload tools
- C: An automated controller.
- D: The execution environment
- E: A client
Question 27
CCM: What is the role of the Scope Applicability column in the CCM?
- A: It show which architectural elements are related to a given control
- B: It describes the applicability of the overall domain
- C: It maps the existing industry standards to the controls in the domains
- D: It describes the applicability of the controls in the domains
- E: None of the above
Question 28
When considering business continuity and disaster recovery with a cloud provider, which layer of the logical stack includes code and message queues?
- A: Applistructure
- B: Datastructure
- C: Infostructure
- D: Infrastructure
- E: Metastructure
Question 29
What factor(s), if any, allows for more efficient and effective containment and recovery in a cloud environment than in a non-cloud environment.
- A: encrypted data files
- B: no part of incident response is easier in a cloud environment
- C: frequent backup routines
- D: multitenancy and software as a service models
- E: Virtualization technologies, and the elasticity inherent in cloud computing platforms
Question 30
What is true of cloud built-in firewalls?
- A: They operate exclusively outside of the hypervisor
- B: Whichever features are not provided in the firewall, the cloud provider has an alternative
- C: They operate exclusively outside of the SDN
- D: They typically offer fewer features that newer physical firewalls
- E: They provide identical configurations to physical firewalls
Question 31
What are the NIST defined essential characteristics of cloud computing?
- A: Rapid elasticity, compliance readiness, and resource pooling
- B: Broad network access, measured service, multifactor configurability, and resource pooling
- C: Broad network access, automatic patching, compliance readiness, and resource pooling
- D: Broad network access, rapid elasticity, measured service, on-demand self-service, and resource pooling
- E: Broad network access, rapid elasticity, automatic patching, and resource pooling
Question 32
Generally speaking, in the United States, a party is obligated to take reasonable steps to prevent the destruction or modification of data in its possession that it reasonably should know, is relevant to an anticipated litigation or government investigation.
- A: False
- B: True
Question 33
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
- A: An entitlement matrix
- B: A support table
- C: An entry log
- D: A validation process
- E: An access log
Question 34
Which of the following is NOT a common storage option with Infrastructure as a Service?
- A: Object Storage
- B: Volume Storage
- C: Content Delivery Network
- D: Big Data as a Service
- E: SSD based volume storage
Question 35
What best describes the tradeoff of Infrastructure as a Service as compared to other cloud service models?
- A: Less security features and greater extensibility
- B: Greater initial costs and greater security features
- C: Lower initial costs and greater long terms costs
- D: Greater security features and less extensibility
- E: Lower initial cost and greater security features
Question 36
How can you monitor and filter data in a virtual network when traffic might not cross the physical network?
- A: Route traffic to the physical network for capturing
- B: Route traffic to a virtual appliance on the same virtual network
- C: Route traffic to a virtual network monitoring or filtering tool on the same hardware
- D: A and B
- E: B and C
Question 37
Which concept is defined as the unique expression of an entity within a given namespace?
- A: Persona
- B: Role
- C: Attribute
- D: Identifier
- E: Identity
Question 38
What is a method used to decouple the network control plane from the data plane?
- A: Information Management Policies
- B: Multitenancy
- C: Network Intrusion Detect on Systems (NIDS)
- D: Software Defined Networking (SDN)
- E: Virtual LANs (VLANs)
Question 39
For cloud consumers to be able to properly configure and manage their network security, what must cloud providers do?
- A: Expose security controls
- B: Provide security templates
- C: Configure a default deny and enable controls as requested
- D: Provide administrator access to the tenant
- E: Provide API access
Question 40
What is true of Software Defined Network firewalls?
- A: They are policy sets that can only be applied to similar grouped assets
- B: They require the use of static IP addresses
- C: They are more difficult to manage
- D: They are limited based on physical topology
- E: They are not limited based on physical topology
Question 41
Which deployment model is commonly used to describe a non-cloud data center bridged directly to a cloud provider?
- A: Hosted Cloud
- B: Hybrid Cloud
- C: Community Cloud
- D: Private Cloud
- E: Public Cloud
Question 42
What is a core tenant of risk management?
- A: If there is still residual risk after assessments and controls are in place, you must accept the risk.
- B: Risk insurance covers all financial losses, including loss of customers.
- C: The consumers are completely responsible for all risk.
- D: The provider is accountable for all risk management.
- E: You can manage, transfer, accept, or avoid risks.
That’s the end of your free questions
You’ve reached the preview limit for CCSKConsider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!