Exam Code : CCSK
Exam Name : Certificate of Cloud Security Knowledge 2024
Vendor Name :
"CSA"
CCSK Dumps CCSK Braindumps
CCSK Real Questions CCSK Practice Test CCSK Actual Questions
killexams.com
Certificate of Cloud Security Knowledge
https://killexams.com/pass4sure/exam-detail/CCSK
Single key for all data owners
One key per data owner
Multiple keys per data owner
The answer could be A, B, or C depending on the provider
C for data subject to the EU Data Protection Directive; B for all others
The devices used to access data have different storage formats.
The devices used to access data use a variety of operating systems and may have different programs installed on them.
The device may affect data dispersion.
The devices used to access data use a variety of applications or clients and may have different security characteristics.
The devices used to access data may have different ownership characteristics.
The provider’s computing resources are pooled to serve multiple consumers.
Internet-based CPUs are pooled to enable multi-threading.
The dedicated computing resources of each client are pooled together in a colocation facility.
Placing Internet (“cloud”) data centers near multiple sources of energy, such as hydroelectric dams.
None of the above.
False
True
Intrusion Prevention System
URL filters
Data Loss Prevention
Cloud Access and Security Brokers (CASB)
Database Activity Monitoring
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Multi-application, single tenant environments
Long distance relationships
Multi-tenant environments
Distributed computing arrangements
Single tenant environments
Lack of completeness and transparency in terms of use
Lack of information on jurisdictions
No source escrow agreement
Unclear asset ownership
Audit or certification not available to customers
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
Allowing the cloud provider to manage your keys so that they have the ability to access and delete the data from the main and back-up storage.
Maintaining customer managed key management and revoking or deleting keys from the key management system to prevent the data from being accessed again.
Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data.
Keep the keys stored on the client side so that they are secure and so that the users have the ability to delete their own data.
Both B and D. Correct
Answer: B Explanation
Arbitrary contract termination by acquiring company
Resource isolation may fail
Provider may change physical location
Mass layoffs may occur
Non-binding agreements put at risk
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Software Development Kits (SDKs)
Resource Description Framework (RDF)
Extensible Markup Language (XML)
Application Binary Interface (ABI)
Application Programming Interface (API)