New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Newly Released Cloud Security Alliance CCSK Exam PDF

Page: 10 / 13
Total 177 questions

Certificate of Cloud Security Knowledge (v5.0) Questions and Answers

Question 37

APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.

Options:

A.

False

B.

True

Question 38

If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.

Options:

A.

False

B.

True

Question 39

How can virtual machine communications bypass network security controls?

Options:

A.

VM communications may use a virtual network on the same hardware host

B.

The guest OS can invoke stealth mode

C.

Hypervisors depend upon multiple network interfaces

D.

VM images can contain rootkits programmed to bypass firewalls

E.

Most network security systems do not recognize encrypted VM traffic

Question 40

What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?

Options:

A.

A data destruction plan

B.

A communication plan

C.

A back-up website

D.

A spill remediation kit

E.

A rainy day fund

Page: 10 / 13
Total 177 questions