Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CCSK VCE Exam Download

Page: 4 / 20
Total 273 questions

Certificate of Cloud Security Knowledge (CCSKv5.0) Questions and Answers

Question 13

Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.

Options:

A.

False

B.

True

Question 14

CCM: Cloud Controls Matrix (CCM) is a completely independent cloud

assessment toolkit that does not map any existing standards.

Options:

A.

True

B.

False

Question 15

What is true of a workload?

Options:

A.

It is a unit of processing that consumes memory

B.

It does not require a hardware stack

C.

It is always a virtual machine

D.

It is configured for specific, established tasks

E.

It must be containerized

Question 16

How can virtual machine communications bypass network security controls?

Options:

A.

VM communications may use a virtual network on the same hardware host

B.

The guest OS can invoke stealth mode

C.

Hypervisors depend upon multiple network interfaces

D.

VM images can contain rootkits programmed to bypass firewalls

E.

Most network security systems do not recognize encrypted VM traffic

Page: 4 / 20
Total 273 questions