image


CCSK Dumps CCSK Braindumps

CCSK Real Questions CCSK Practice Test CCSK dumps free


CSA


CCSK


Certificate of Cloud Security Knowledge


http://killexams.com/pass4sure/exam-detail/CCSK


QUESTION 51 How is encryption managed on multi- tenant storage?


  1. Single key for all data owners

  2. One key per data owner

  3. Multiple keys per data owner

  4. The answer could be A, B, or C depending on the provider

  5. C for data subject to the EU Data Protection Directive; B for all others


Correct Answer: B


QUESTION 52 Which statement best describes why it is important to know how data is being accessed?


  1. The devices used to access data have different storage formats.

  2. The devices used to access data use a variety of operating systems and may have different programs installed on them.

  3. The device may affect data dispersion.

  4. The devices used to access data use a variety of applications or clients and may have different security characteristics.

  5. The devices used to access data may have different ownership characteristics.


Correct Answer: D


QUESTION 53 What is resource pooling?


  1. The provider’s computing resources are pooled to serve multiple consumers.

  2. Internet-based CPUs are pooled to enable multi-threading.

  3. The dedicated computing resources of each client are pooled together in a colocation facility.

  4. Placing Internet (“cloud”) data centers near multiple sources of energy, such as hydroelectric dams.

  5. None of the above.

Correct Answer: A


QUESTION 54 Your SLA with your cloud provider ensures continuity for all services.


  1. False

  2. True


Correct Answer: A


QUESTION 55 Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?


  1. Intrusion Prevention System

  2. URL filters

  3. Data Loss Prevention

  4. Cloud Access and Security Brokers (CASB)

  5. Database Activity Monitoring


Correct Answer: A


QUESTION 56

In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?


  1. Multi-application, single tenant environments

  2. Long distance relationships

  3. Multi-tenant environments

  4. Distributed computing arrangements

  5. Single tenant environments


Correct Answer: C


QUESTION 57 ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:


  1. Lack of completeness and transparency in terms of use

  2. Lack of information on jurisdictions

  3. No source escrow agreement

  4. Unclear asset ownership

  5. Audit or certification not available to customers


Correct Answer: A


QUESTION 58

What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?


  1. Allowing the cloud provider to manage your keys so that they have the ability to access and delete the data from the main and back-up storage.

  2. Maintaining customer managed key management and revoking or deleting keys from the key management system to prevent the data from being accessed again.

  3. Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data.

  4. Keep the keys stored on the client side so that they are secure and so that the users have the ability to delete their own data.

  5. Both B and D. Correct Answer: B Explanation


QUESTION 59 ENISA: A reason for risk concerns of a cloud provider being acquired is:


  1. Arbitrary contract termination by acquiring company

  2. Resource isolation may fail

  3. Provider may change physical location

  4. Mass layoffs may occur

  5. Non-binding agreements put at risk


Correct Answer: E


QUESTION 60

Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?


  1. Software Development Kits (SDKs)

  2. Resource Description Framework (RDF)

  3. Extensible Markup Language (XML)

  4. Application Binary Interface (ABI)

  5. Application Programming Interface (API)


Correct Answer: E


/Refere nce:


For More exams visit https://killexams.com/vendors-exam-list


image