Certificate of Cloud Security Knowledge v5 (CCSKv5.0) Questions and Answers
What is a key consideration when implementing AI workloads to ensure they adhere to security best practices?
What is the primary role of Identity and Access Management (IAM)?
Which of the following functionalities is provided by Data Security Posture Management (DSPM) tools?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?
What is the purpose of the "Principle of Least Privilege" in Identity and Access Management (IAM)?
What is the most significant security difference between traditional infrastructure and cloud computing?
What is true of security as it relates to cloud network infrastructure?
What is the primary purpose of virtual machine (VM) image sources?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?
What item below allows disparate directory services and independent security domains to be interconnected?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
Which statement best describes the impact of Cloud Computing on business continuity management?
Which of the following information security policies defines the use of an organization's IT resources?
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
What is an important step in conducting forensics on containerized and serverless environments?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
What is true of searching data across cloud environments?
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
What is a common characteristic of Platform as a Service (PaaS)?
Which of the following best describes a key benefit of Software-Defined Networking (SDN)?
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
Which term describes the practice in cloud compliance where a customer acquires a set of pre-approved regulatory or standards-based controls from a compliant provider?
What's the difference between DNS Logs and Flow Logs?
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
Which type of cloud workload would be most appropriate for running isolated applications with minimum resource overhead?
How does virtualized storage help avoid data loss if a drive fails?
Select the statement below which best describes the relationship between identities and attributes
How can virtual machine communications bypass network security controls?
Your cloud and on-premises infrastructures should always use the same network address ranges.
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
How is encryption managed on multi-tenant storage?
Which technique is most effective for preserving digital evidence in a cloud environment?
Which concept provides the abstraction needed for resource pools?
When establishing a cloud incident response program, what access do responders need to effectively analyze incidents?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
In the context of incident response, which phase involves alerts validation to reduce false positives and estimates the incident's scope?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
What is a primary benefit of using Identity and Access Management (IAM) roles/identities provided by cloud providers instead of static secrets?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
Which AI workload mitigation strategy best addresses model inversion attacks that threaten data confidentiality?
A cloud deployment of two or more unique clouds is known as:
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
Which factors primarily drive organizations to adopt cloud computing solutions?
An organization deploys an AI application for fraud detection. Which threat is MOST likely to affect its AI model’s accuracy?
Which aspect of assessing cloud providers poses the most significant challenge?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
What of the following is NOT an essential characteristic of cloud computing?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
In the IaaS shared responsibility model, which responsibility typically falls on the Cloud Service Provider (CSP)?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
After an incident has been identified and classified, which activity is typically performed during the Containment, Eradication, and Recovery phase of incident response?
ENISA: A reason for risk concerns of a cloud provider being acquired is:
Which of the following best describes the shift-left approach in software development?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Select the best definition of “compliance” from the options below.
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
Which of the following events should be monitored according to CIS AWS benchmarks?
What is resource pooling?
In FaaS, what is the primary security concern with using third-party services/APIs?
Which of the following is a primary purpose of establishing cloud risk registries?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
Containers are highly portable code execution environments.
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
What is a commonly used method by which hybrid cloud integrates data centers with public cloud?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
Which aspect of assessing cloud providers poses the most significant challenge?
What is a primary benefit of implementing Zero Trust (ZT) architecture in cloud environments?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
What is the primary goal of implementing DevOps in a software development lifecycle?
Which areas should be initially prioritized for hybrid cloud security?
Which statement best describes the Data Security Lifecycle?
How does cloud sprawl complicate security monitoring in an enterprise environment?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
Which of the following best describes a primary risk associated with the use of cloud storage services?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
Why is it essential to embed cloud decisions within organizational governance?
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
What is a primary objective of cloud governance in an organization?
What is a key advantage of using Infrastructure as Code (IaC) in application development?
Which resilience tool helps distribute network or application traffic across multiple servers to ensure reliability and availability?
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Who is responsible for the security of the physical infrastructure and virtualization platform?
How does network segmentation primarily contribute to limiting the impact of a security breach?
In preparing for cloud incident response, why is updating forensics tools for virtual machines (VMs) and containers critical?
Why is it important to plan and coordinate response activities for incidents affecting the Cloud Service Provider (CSP)?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
Which of the following is true about access policies in cybersecurity?
Which method is considered best practice for creating secure virtual machine (VM) images?