University Guaranteed Success
Congratulations – you have completed CCSK v4 Exam
Simulator 4.0. You scored 58 points out of 60 points total.
Your obtained grade is Passed
Congratulations, you passed!
Your answers are shown below:
1. Which common components of big data is focused on the mechanisms
used to ingest large volumes of data, often of a streaming nature?
● Distributed information
● Distributed storage
● Distributed processing
● Distributed attribution
● Distributed data collection
2. What is a core tenant of risk management?
● Risk insurance covers all financial losses, including loss of customers
● The provider is accountable for all risk management
● The consumer are completely responsible for all risks
● If there is still residual risk after assessments and controls are in
place, you must accept the risk
● You can manage, transfer, accept or avoid the risks
,3. When designing an encryption system, you should start with a threat model
, ● FALSE
● TRUE
4. CCM: in the CCM tool (encryption and key management) is an example
of which of the following?
● Risk impact
● Domain
● Control specification
● None of the above
5. Which facet is focused on protecting the management plane
components, such as web and API servers from attacks?
● Logging and alerting
● Perimeter security
● Customer authentication
● Authorization and entitlements
● External authentication
6. Which phase of incident response life cycle includes creating and validating
alerts?
● Post-mortem
● detection and analysis
● Auditing and logging
● Containment, eradication and recovery
● Preparation