CSA Cert CCSK Certificate of Cloud Security Knowledge Online Training
CSA Cert CCSK Online Training
The questions for CCSK were last updated at Nov 19,2024.
- Exam Code: CCSK
- Exam Name: Certificate of Cloud Security Knowledge
- Certification Provider: CSA Cert
- Latest update: Nov 19,2024
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
- A . Agile
- B . BusOps
- C . DevOps
- D . SecDevOps
- E . Scrum
What is true of searching data across cloud environments?
- A . You might not have the ability or administrative rights to search or access all hosted data.
- B . The cloud provider must conduct the search with the full administrative controls.
- C . All cloud-hosted email accounts are easily searchable.
- D . Search and discovery time is always factored into a contract between the consumer and provider.
- E . You can easily search across your environment using any E-Discovery tool.
How should an SDLC be modified to address application security in a Cloud Computing environment?
- A . Integrated development environments
- B . Updated threat and trust models
- C . No modification is needed
- D . Just-in-time compilers
- E . Both B and C
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
- A . Data Security and Encryption
- B . Information Governance
- C . Incident Response, Notification and Remediation
- D . Compliance and Audit Management
- E . Infrastructure Security
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
- A . An entitlement matrix
- B . A support table
- C . An entry log
- D . A validation process
- E . An access log
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
- A . Volume storage
- B . Platform
- C . Database
- D . Application
- E . Object storage
Which opportunity helps reduce common application security issues?
- A . Elastic infrastructure
- B . Default deny
- C . Decreased use of micro-services
- D . Segregation by default
- E . Fewer serverless configurations
How does virtualized storage help avoid data loss if a drive fails?
- A . Multiple copies in different locations
- B . Drives are backed up, swapped, and archived constantly
- C . Full back ups weekly
- D . Data loss is unavoidable with drive failures
- E . Incremental backups daily
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
- A . Code Review
- B . Static Application Security Testing (SAST)
- C . Unit Testing
- D . Functional Testing
- E . Dynamic Application Security Testing (DAST)
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
- A . Infrastructure
- B . Datastructure
- C . Infostructure
- D . Applistructure
- E . Metastructure