CCSK EXAM SIMULATOR

1. Which of the following ensures that the consumers only use what they are allotted, and are charged for it?

 
 
 
 
 

2. Installing traditional agents designed for physical servers will not result in the same amount of efficiency and performance on a virtualized server.

 
 

3. Exiting from an activity giving rise to more risk is called as?

 
 
 
 
 

4. ENISA: The lack of use of standards technologies and solutions by the cloud provider may lead to-

 
 
 
 
 

5. Which of the following best describes the data protection when it moves to the cloud?

 
 
 
 
 

6. If a cloud service provider receives a request to provide client information in the form of a subpoena or a court order, how can client have the ability to fight the request?

 
 
 
 

7. ENISA: The risks identified can be classified into which of the following three categories?

 
 
 
 
 

8. Which of the following frameworks is used in the industry to describe a series of security activities during all phases of application development, deployment, and operations?

 
 
 
 
 

9. Which of the following gives the customers ability to audit the cloud provider?

 
 
 
 
 

10. Which of the following statements regarding cloud platform architecture is true?

 
 
 
 

11. Inability to provide sufficient capacity to a customer can lead to which of the following?

 
 
 
 
 

12. “Cloud Provider Acquisition” is which form of risk?

 
 
 
 

13. Which of the following will not prevent you from moving unapproved data to cloud services?

 
 
 
 
 

14. ENISA: Whose responsibility is it to choose a data processor that provides sufficient guarantees with respect to the technical security measures and organisational measures governing the processing to be carried out, and ensuring compliance with those measures?

 
 
 
 
 

15. Which of the following defines the amount of risk that the leadership and stakeholders of an organization are willing to accept?

 
 
 
 

16. Which of the following is one of the challenges of application security in a cloud environment?

 
 
 
 
 

17. Which of the following is a preferred model for cloud-based access management?

 
 
 
 

18. Which of the following encryption will be used when object storage is used as the back-end for an application?

 
 
 
 
 

19. CI/CD pipelines can enhance security through support of which of the following?

 
 
 
 

20. Containers provide full security isolation and task segregation.

 
 

21. Which of the following is the most important aspects of incident response for cloud-based resources?

 
 
 
 
 

22. Which of the following statements regarding SDN (Software Defined Networking) is not true?

 
 
 
 
 

23. Private Cloud operated solely for a single organization can be located at-

 
 
 
 

24. CSA’s Software Defined Perimeter includes:

 
 
 
 

25. ENISA: Which of the following is the natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data?

 
 
 
 
 

26. Which of the following is one of the most common open standards to enable federation in the cloud?

 
 
 
 
 

27. Which of the following provides “Storage as a Service” as a sub-offering?

 
 
 
 

28. Which of the following clauses in the agreement between customer and cloud provider can provide customers in highly regulated industries with the required information?

 
 
 
 
 

29. Role-Based Access Control (RBAC) model for IAM offers greater flexibility and security than the Attribute-Based Access Control (ABAC) model.

 
 

30. You do not trust your SaaS provider and have chosen to encrypt all of your data. Which of the following is true is this situation?

 
 
 
 

31. In a multi-tenant environment, if customers can access and modify each other’s assets which of the following has caused this issue?

 
 
 
 
 

32. Why Hardware Security Modules (HSM) are difficult to distribute in multiple locations used in cloud architectures?

 
 
 
 

33. Which of the following is the most obvious form of provider lock-in?

 
 
 
 

34. Customers should view cloud services and security as –

 
 
 
 
 

35. Which of the following statement related to direct “lift and shift” of existing application to a cloud environment is true?

 
 
 
 

36. ENISA: Lock-in is under which category of risk?

 
 
 
 

37. Which of the following regarding customer managed keys is true?

 
 
 
 
 

38. Which of the following essential characteristics of a cloud allows customers to closely match resource consumption with demand?

 
 
 
 
 

39. ENISA: Password-based authentication should be sufficient for accessing cloud resources.

 
 

40. Which of the following characteristics of cloud allows a consumer to unilaterally provision computing capabilities such server time and network storage as needed?

 
 
 
 
 

41. Resource pooling practiced by the cloud services may especially complicate which part of the IR process?

 
 
 
 
 

42. For which of the following SecaaS concerns, providers should be held to the highest standards of multi-tenant isolation and segregation?

 
 
 
 

43. Which technique is used in the cloud to coordinate carving out and delivering a set of resources from the pools to the consumers?

 
 
 
 

44. Which of the following is a responsibility of a cloud user?

 
 
 
 
 

45. Which of the following encrypts and prevents the unauthorized copying or changing of the content?

 
 
 
 
 

46. Infrastructure in the cloud cannot be defined and implemented through templates and automation.

 
 

47. In addition to providing better server utilization, and data center consolidation, virtualization also reduces the security threats significantly.

 
 

48. The most fundamental security control for any multi-tenant network is-

 
 
 
 

49. Which of the following comes immediately after the data creation in the data security lifecycle?

 
 
 
 
 

50. Cloud based Web Application Firewalls (WAFs) also include anti-DDoS capabilities.

 
 

51. Which of the following includes all the documentation on a provider’s internal and external compliance assessments?

 
 
 
 
 

52. In Federation which party makes assertions to which party?

 
 
 
 

53. Which of the following encryption methods is utilized when object storage is used as the back-end for an application?

 
 
 
 
 

54. Which of the following is a permission to do something like access a file, network, or perform a certain function like an API call on a particular resource?

 
 
 
 
 

55. How can you prevent cloud providers from inappropriately accessing customer data?

 
 
 
 
 

56. Which of the following are the most commonly seen networks that are isolated onto dedicated hardware since there is no functional or traffic overlap?

 
 
 
 

57. As per GDPR company must report the breach in what amount of time?

 
 
 
 
 

58. ENISA: Which of the following statement is true regarding the risk of natural disasters in cloud?

 
 
 
 

59. Virtualization security in cloud computing is the responsibility of cloud provider.

 
 

60. Point-in-time activities like compliance, audit, and assurance should be conducted by cloud providers to avoid creating any gaps, and thus exposures, for their customers.

 
 

Question 1 of 60