Free CCSK Exam Braindumps

Pass your Certificate of Cloud Security Knowledge exam with these free Questions and Answers

Page 5 of 24
QUESTION 16

Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?

  1. A. Database encryption
  2. B. Media encryption
  3. C. Asymmetric encryption
  4. D. Object encryption
  5. E. Client/application encryption

Correct Answer: E

QUESTION 17

CCM: Cloud Controls Matrix (CCM) is a completely independent cloud assessment toolkit that does not map any existing standards.

  1. A. True
  2. B. False

Correct Answer: B

QUESTION 18

Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?

  1. A. Auditors working in the interest of the cloud customer
  2. B. Independent auditors
  3. C. Certified by CSA
  4. D. Auditors working in the interest of the cloud provider
  5. E. None of the above

Correct Answer: B

QUESTION 19

What is defined as the process by which an opposing party may obtain private documents for use in litigation?

  1. A. Discovery
  2. B. Custody
  3. C. Subpoena
  4. D. Risk Assessment
  5. E. Scope

Correct Answer: A

QUESTION 20

Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?

  1. A. Access control
  2. B. Federated Identity Management
  3. C. Authoritative source
  4. D. Entitlement
  5. E. Authentication

Correct Answer: D

Page 5 of 24

Post your Comments and Discuss CSA CCSK exam with other Community members: