Congratulations – you have completed CCSK v4 Exam Simulator 4.0.
You scored 58 points out of 60 points total.
Your obtained grade is Passed
Congratulations, you passed!
Your answers are shown below:
1. Which common components of big data is focused on the mechanisms used to ingest
large volumes of data, often of a streaming nature?
Distributed information
Distributed storage
Distributed processing
Distributed attribution
Distributed data collection
2. What is a core tenant of risk management?
Risk insurance covers all financial losses, including loss of customers
The provider is accountable for all risk management
The consumer are completely responsible for all risks
If there is still residual risk after assessments and controls are in place, you must
accept the risk
You can manage, transfer, accept or avoid the risks
3. When designing an encryption system, you should start with a threat model
FALSE
TRUE
4. CCM: in the CCM tool (encryption and key management) is an example of which of
the following?
Risk impact
Domain
Control specification
None of the above
,5. Which facet is focused on protecting the management plane components, such as
web and API servers from attacks?
Logging and alerting
Perimeter security
Customer authentication
Authorization and entitlements
External authentication
6. Which phase of incident response life cycle includes creating and validating alerts?
Post-mortem
detection and analysis
Auditing and logging
Containment, eradication and recovery
Preparation
7. If in certain litigations and investigations, the actual cloud application or environment
itself is relevant to resolving the dispute in the litigation or the investigation, how is likely
the information to be obtained?
It would never be obtained in this situation
It would require an act of war
It would require a previous contractual agreement to obtain the application or
access to the environment
It would require a previous access agreement
It may require a subpoena of the provider directly
8. What is the order of the main phases of secure applications design and
development?
,9. If the management plane has been breached, you should confirm the
templates/configurations for your infrastructure or applications have not also been
compromised
False
TRUE
10. You have a business relationship with a cloud provider for all sales management
functionalities. Through the API and SDK, you have customized the interface and some
functionality, but the back end service is done through the cloud provider. In this
relationship, which service is completed by the cloud provider?
Desktop as a service DaaS
Platform as a service PaaS
Infrastructure as a service IaaS
Identity as a service IDaaS
Software as a service SaaS
11. Which of the following statements best defines the potential advantages of security
as a service SecaaS?
Many areas of security as a service are ripe for adoption with the notable
exceptions of anti-malware and anti-spam programs.
The advantage may include flexible offering of services, greater security
domain knowledge and efficiency of SecaaS providers
The standardization of security software’s makes the outsourcing of security as a
service nearly obsolete
The advantages are not realized until a security breach actually occurs. At that
time the greater response of the security team should be obvious
The higher costs and reduced flexibility are more than compensated for by the
ability to pass the security responsibilities to another firm.
12. What method can be utilized along with data fragmentation to enhance security?
14. Which of the following statements best defines the “authorization” as a component
of identity , entitlement and access management
Enforcing the roles by which access is granted to the resources
Giving a third party vendor permission to work on your cloud solution
Establishing/asserting the identity to the application
Checking data storage to make sure it meets compliance requirements
The process of specifying and maintaining access policies
15. What are major factor to building and managing secure management plane?
Device patching and maintenance; internal authentication and credential passing;
access management and logging; monitoring and alerting
API management ; endpoint security; logging; and authentication and
authorization
Perimeter security; customer authentication; internal authentication and
credential passing; authorizations and entitlements; and governance auditing
Permeter patching; log authentication; external entitlement passing; credential
alerting and customer security
Perimeter security; customer authentication; internal authentication and
credential passing ; authorization and entitlements; and logging,
monitoring and alerting
16. Highly regulated industries such as finance and health care should consider the
impact of cloud providers operating in diverse geographic locations and ………..
Virtual environments
Sparsely populated areas
Without licenses
Legal jurisdictions
None of the above
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LEARNEXAMS. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $30.49. You're not tied to anything after your purchase.