CCSK Module 6 Unit 7 Answers – CCSK Final Exam Prep Full 100% 2023 2024
This is CCSK Module 6 Unit 7 Answers – CCSK Final Exam Prep Cisco NetAcad in 2023 2024. Our expert team has verified questions and answers with clear explanations to get a full score of 100%. You can review all these questions before taking the exam.
-
In which service model does the cloud consumer have the least amount of control over security?
- Platform as a Service
- Infrastructure as a Service
- Software as a Service
- Security as a Server
-
Which of the following resource pools in not associated with IaaS:
- Network
- Compute
- Middleware
- Storage
-
Cloud changes compliance. Select the statement that is incorrect:
- The cloud provider is ultimately responsible for their customer’s compliance
- There may be a greater reliance on third party audits
- There are large variations between the compliance capabilities of different cloud providers
- Metastructure/management may span jurisdictions even if data is localized
-
Click and drag the phases of the lifecycle to the correct order.
-
Which of the following options encrypts data before you transfer it to object storage:
- Client-side encryption
- Externally managed encryption
- Applications encryption
- Server-side encryption
-
Identify the core security benefit of immutable:
- It fully isolates developers from productions environment
- All security updates are automatically applied
- There are no manual changes, so everything is consistent and administrative access can be disabled.
- It fully isolates operations from productions environments
-
When using provider managed encryption you are always sharing the same keys with other tenants.
- True
- False
-
Which of the following cloud data storage types can be described as “a database for files”:
- Object storage
- Database storage
- Platform storage
- Volume storage
-
Click here to drag the version control repository and the continuous integration server to the correct locations.
-
Select the cloud workload security options that can most improve overall security and reduce attack surface:
- Use immutable as much as possible
- Select cloud aware host security agents
- Store logs external to instances
- Leverage existing/traditional vulnerability assessment tools
-
What is the purpose of a data localization law?
- To require service providers to register with the country’s data protection commission
- To require company to hire only local workers
- To require that data about the country’s citizens be stored in the country
- To require that all business documents be in the country’s official language
-
How should the data security lifecycle be used?
- To create granular documentation for all data sensitive or not, in the cloud.
- To create granular documentation for all sensitive data in the cloud.
- As a lightweight tool to better understand data flow and potential vs. desired data usage.
- To replace existing data security architectures.
-
Which option allows you to use an existing build for key management without replicating everything in the cloud?
- HSM/Appliance
- Hybrid
- Virtual Appliance
- Third-party Service
-
Where can cloud providers publish their CAIQ and other security/compliance documents to help cloud prospects and customers assess the provider’s current security posture?
- The Security, Trust and Assurance Registry (STAR)
- The United States Federal Register of Cloud Providers
- The AWS marketplace
-
Which CSA tool allows you to quickly search a providers assessment for controls that map to regulations you care about and see the responses to those controls?
- CAIQ
- CCM
- STAR
- STARWatch
-
The most effective way for an attacker to compromise a security group is to compromise the host/virtual machine and then modify the rules.
- True
- False
-
Which of the following is correct?:
- GDPR Stands for “Government Data Privacy Rule”.
- GDPR Establishes fines of $1,000 per credit card number compromised
- GDPR prohibits the transfer of personal data outside the EU or EEA to a country that does not offer a similar privacy rights
- GDPR requires that EU member state’s national laws impose network requirements on operators of essential services.
-
All cloud data is eventually stored on a physical device, like a hard drive.
- True
- False
-
If an organization uses a Community Cloud Deployment Model, some portion of the physical infrastructure MUST be on-premises with one of the community members.
- True
- False
-
What is the purpose of a bastion network/transit VPC?
- To better support multiple virtual networks and accounts in hybrid scenarios
- To better lock down a hybrid cloud
- To create a cloud DMZ
- To improve internal routing and IP address space availability
-
Specific testing techniques are tightly aligned and should only be performed during their designated phase in the secure software development process:
- True
- False
-
In a hub and spoke model, which technology mediates between directory servers/identify providers and the service providers/relying parties:
- Directory servers
- Attribute Services
- CASB
- Federated identity brokkers
-
Select a technique to manage continuity within the cloud provider.
- Cross-location/region design
- Multi-cloud provider plans
- Hybrid cloud backup
- Data portability
-
In a postmortem what would be your highest priority to review and remediate if was a blocker in your incident response?
- Communications with the cloud provider
- Container vulnerabilities
- Operating system vulnerabilities
- Internal communicatins
-
Which key management option should you select if you are dealing with highly sensitive data that you don’t want your provider to potentially access under any circumstances:
- Virtual appliance
- HSM/hybrid
- BYOK
- 3rd party key management service
-
Which technology is generally required to build resource pools?
- Virtualization
- VLANs
- The Internet
- CPUs and memory
-
If a business is located outside the European Union it does not have to comply with the privacy laws of the European Union
- True
- False
-
Cloud consumers are ultimately responsible for understanding the legal implications of using a particular cloud provider and service.
- True
- False
-
In which service model does the cloud consumer have to rely most on what is in the contract and documented to enforce and manage security?
- PaaS
- SaaS
- Hybrid
- IaaS
-
What is the single most important rule for cloud BCP/DR?
- Use object storage for backups
- Snapshot regularly
- Architect for failure
- Use multiple cloud providers
-
What is critical when evaluating a cloud service within your risk management program?
- Accounting for the context of the information assets involved
- Minimizing regional harm
- Eliminating all outsourcing risk
- Ensuring the provider’s security program supports your existing on-premise tools
-
Which of the following is the most effective security barrier to contain blast radius?
- Virtual subnet (with or without ACLs)
- Cloud account/project/subscription
- Virtual network
- Security group
Subscribe
0 Comments
Newest