(Answered) CS CYBER SECU CCSK Exam 5 Pace University Guaranteed Success
(Answered) CS CYBER SECU CCSK Exam 5 Pace University Guaranteed Success Congratulations – you have completed CCSK v4 Exam Simulator 5. You scored 60 points out of 60 points total. Your obtained grade is Pass Your answers are shown below: 1. Private Cloud operated solely for a single organization can be located at- ● Only On-premise ● Only Off-premise ● Both On-premise and Off-premise ● Trusted third party Question was not answered 2. Which of the following essential characteristics of a cloud allows customers to closely match resource consumption with demand? ● Resource Pooling ● On-demand self-service ● Broad network access ● Rapid elasticity ● Measured service Question was not answered 3. How can you prevent cloud providers from inappropriately accessing customer data? ● Use strong contractual controls to prevent unauthorized access ● Disable the root user access and delete the access keys ● Wherever possible, do not store the keys in the cloud ● Implement strong access controls on your data ● Encrypt your data at rest and implement multi-factor authentication Question was not answered 4. Which of the following is the most important aspects of incident response for cloud-based resources? ● Expectations around what the customer does versus what the provider does ● Service Level Agreement ● Non-Disclosure Agreement ● B & C ● E. A & B Question was not answered 5. ENISA: Lock-in is under which category of risk? ● Technical ● Legal ● Policy and Organizational ● Operational Question was not answered 6. ENISA: The lack of use of standards technologies and solutions by the cloud provider may lead to- ● Isolation failure ● Resource exhaustion ● Loss of governance ● Lock-in ● Data leakage Question was not answered 7. Role-Based Access Control (RBAC) model for IAM offers greater flexibility and security than the Attribute-Based Access Control (ABAC) model. ● True ● False Question was not answered 8. Which of the following regarding customer managed keys is true? ● Cloud customer manages the encryption key and the provider manages the encryption engine. ● Provider manages the encryption key and cloud customer manages the encryption engine. ● Cloud customer manages both the encryption key and the encryption engine. ● Cloud customer and provider jointly manage the encryption key and encryption engine. ● Cloud customer and provider jointly manage the encryption engine and cloud customer manages their own encryption key. Question was not answered 9. Which of the following are the most commonly seen networks that are isolated onto dedicated hardware since there is no functional or traffic overlap? ● Management, service, storage ● Management, server, application ● Server, application, storage ● Server, network, storage Question was not answered 10. Which of the following encryption methods is utilized when object storage is used as the back-end for an application? ● Client/ application encryption ● Symmetric encryption ● Database encryption ● D. Asymmetric encryption ● Object encryption Question was not answered 11. Exiting from an activity giving rise to more risk is called as? ● Ignoring the risk ● Avoiding the risk ● Transferring the risk ● Reducing the risk ● Accepting the risk Question was not answered 12. ENISA: Whose responsibility is it to choose a data processor that provides sufficient guarantees with respect to the technical security measures and organisational measures governing the processing to be carried out, and ensuring compliance with those measures? ● Subject ● Keeper ● Coordinator ● Processor ● Controller Question was not answered 13. Customers should view cloud services and security as – ● Service provider security issue ● Third-party security issue ● Technology security issue ● Supply chain security issue ● Enterprise security strategy
Geschreven voor
- Instelling
- Pace University
- Vak
- CS CYBER SECU CCSK
Documentinformatie
- Geüpload op
- 17 januari 2024
- Aantal pagina's
- 24
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
answered cs cyber secu ccsk exam 5 pace univers