CCSK v5 Sample Questions
CCSK v5 Sample Questions
Justification: In the IaaS model, infrastructure management primarily lies with the user, except for the
underlying hardware.
Justification: This definition specifically highlights scalability, elasticity, and resource sharing, which are
fundamental aspects of cloud computing as defined by ISO/IEC 22123-1:2023.
Q3: Which characteristic of cloud computing can potentially increase security risks when
compared to traditional on-premises infrastructure?
● Elasticity
● Broad network access
● Resource pooling
● Multi-tenancy
Q4: Which of the following best describes the composition of a cloud computing
resource?
● It can include processors, memory, networks, databases, and applications
● It is limited to only raw infrastructure components like processors and memory
● It solely comprises high-level software resources such as databases and applications
● It consists primarily of physical servers and storage devices
Justification: Cloud computing resources are flexible and cover a range of components, not limited to just
hardware or software.
Justification: CSA STAR Attestation includes self-assessments conducted using the Cloud Security
Alliance (CSA) Cloud Controls Matrix (CCM).
Q8: How does enterprise governance align IT capabilities with business objectives?
● By ensuring IT initiatives support overall business strategy
● By centralizing all IT decisions within the IT department
● By isolating IT from business processes to maintain security
● By focusing exclusively on technical efficiency
Justification: Enterprise governance ensures that IT efforts contribute to the main goals and strategic
direction of the organization.
Justification: Strong frameworks and policies form the foundation of effective cloud governance, as they
provide structure and guidelines.
Justification: Mitigation involves developing actions to reduce the impact or likelihood of a risk.
Q11: Which of the following actions is most effective in establishing a robust cloud risk
profile for your organization?
● Rely solely on vendor certifications and assurances
● Deploy an extensive set of firewall rules
● Conduct regular risk assessments and security audits
● Adopt a one-time compliance assessment approach
Q12: Which step in the assessment process involves analyzing the cloud service
provider's policies and reports?
● Review CSP documentation
● Business requests
● Map to data classification
● Define required and compensating controls
Justification: This step involves analyzing the cloud service provider's policies and reports to ensure they
meet contractual and regulatory requirements.
Q13: What is a primary reason that effective cloud risk management is critical for an
organization?
● To reduce the cost of cloud services
● To enhance employee productivity
● To eliminate the need for internal IT staff
● To mitigate potential data breaches and ensure regulatory compliance
Justification: Effective cloud risk management helps protect sensitive data and ensures the organization
adheres to relevant laws and regulations.
Q14: Which of the following best mitigates the risk of an unauthorized access incident in
a cloud environment?
● Relying solely on strong passwords
● Implementing multi-factor authentication (MFA)
● Encrypting data at rest
● Regularly updating software
Justification: MFA requires multiple forms of verification to access an account, which significantly reduces
the risk of unauthorized access.
Justification: Centralized logging gathers logs from various sources to facilitate monitoring and quick
incident response.
Q16: Which tool is best suited for ensuring secure API traffic in a SaaS environment?
● Federated Identity Brokers
● CASBs (Cloud Access Security Brokers)
● API Gateways
● IAM (Identity and Access Management)
Justification: API Gateways act as a management tool that controls the way applications use APIs,
ensuring secure API traffic handling.
Q17: Which of the following is a core security capability provided by Cloud Service
Providers (CSPs) to help manage access and permissions?
● Logging and Monitoring
● IAM (Identity and Access Management)
● Encryption-at-Rest
● DDoS Protection
Justification: IAM is a critical security capability that helps manage user identities and their access to
resources within the cloud environment.
Q19: What is the scope level at which policies can be applied within an organization?
● Organization-wide, group-level, or deployment-level
● Department-level, project-level, or team-level
● Region-level, unit-level, or task-level
● Enterprise-level, section-level, or role-level
Justification: PBAC specifies access policies in documents, detailing the conditions under which
resources can be accessed.
Justification: Soft tokens are usually software-based and can be implemented as apps on smartphones
generating TOTPs.
Q22: Why is Identity and Access Management (IAM) considered the new perimeter in
cloud-native security environments?
● IAM ensures secure access to resources in a decentralized and dynamic cloud
environment
● IAM is used solely for user authentication in on-premises environments
Justification: IAM controls who has access to what, ensuring that only authorized users can interact with
resources, which is crucial in a cloud-native environment.
Q23: What is the primary benefit of implementing IAM between organizations and cloud
providers?
● Increased physical security of data centers
● Reduced need for encryption
● Centralized access control and management
● Enhanced performance of cloud services
Justification: Centralized IAM allows organizations to maintain control over access policies and manage
identities efficiently across various platforms.
Q24: Which primary principle does Attribute-Based Access Control (ABAC) utilize to
grant access?
● Uses specific attributes like user role, environment, and resource
● Uses the username and password only
● Grants access based on IP address
● Uses predefined group policies
Justification: ABAC makes decisions based on various attributes like user role, environment conditions,
and resources for access control.
Justification: Cascading Log Architecture is designed to streamline and organize logs hierarchically.
Justification: Centralization allows for uniform monitoring, making detection and response to anomalies
more efficient.
Q27: Which of the following best describes the primary purpose of Cloud Security
Posture Management (CSPM)?
● Managing cloud service subscriptions
● Optimizing cloud service performance
● Providing cloud cost management solutions
● Continuous monitoring and assessing cloud security
Justification: CSPM is designed to continuously monitor and assess cloud security to identify and rectify
vulnerabilities.
Q28: Which type of log contains activities from console, API, or CLI access?
● Data Plane Logs
● Application Logs
● Management Plane Logs
● Security Logs
Justification: Management Plane Logs monitor activities initiated through console, API, or CLI access.
Q29: Which primary function of logs is vital for ensuring comprehensive monitoring and
debugging of system activities?
● Optimizing system performance
● Providing detailed records of all system activities
● Blocking unauthorized access attempts
● Automating routine maintenance tasks
Justification: Logs record every system activity, offering comprehensive monitoring and debugging
capabilities.
Justification: ZTNA operates on the principle that no user or device is trusted until proven otherwise,
enhancing security by requiring identity verification before granting access.
Justification: Acknowledgments are typically where credit is given to lead authors, contributors, and
reviewers.
Justification: Keeping software up-to-date is crucial for mitigating vulnerabilities and ensuring system
security.
Q33: Which principle should be prioritized when managing IAM for serverless
applications to minimize security risks?
● Broad permissions
● Static roles
Justification: Least privilege access ensures users and applications only have permissions necessary for
their tasks, minimizing potential abuse.
Justification: AI requires extensive data processing and computing power, both of which are efficiently
handled by cloud's dynamic scaling capabilities.
Justification: DLP tools aim to identify, monitor, and protect sensitive data, including in cloud
environments.
Q36: Which method provides security for specific data items by encrypting data at the
application layer?
● Network level encryption
● Application level encryption
● File system encryption
● Database encryption
Justification: Application level encryption secures specific data items at the application layer, enhancing
data confidentiality.
Justification: Non-relational databases (NoSQL) are designed to scale horizontally and accommodate
various data formats.
Justification: Firewall rules setup is related to security configurations and networking, not storage services
in PaaS.
Justification: The core aspects of data security are essential for maintaining the trust and legal standing
of an organization.
Q42: Which of the following is crucial for ensuring application security in a cloud
computing environment?
● Lowering network latency
● Implementing redundant power supplies
● Prioritizing bandwidth allocation
● Implementing robust access controls
Justification: Robust access controls are essential to secure sensitive data and enforce user
authentication in cloud environments.
Justification: Application security must be integrated from the initial design phase through continuous
maintenance to ensure comprehensive protection.
Q44: How can DevOps introduce risk, but also benefit application security?
● DevOps reduces the need for security testing
● DevOps focuses solely on automating deployment processes
● Faster deployment cycles can improve response times but may introduce untested code
● DevOps practices inherently guarantee secure applications
Justification: It is essential for cloud incident response teams to have persistent read access to all
deployments to review resources and configurations involved in an incident.
Justification: User access controls ensure that only authorized individuals can interact with sensitive
components of the PaaS, mitigating risks of unauthorized access.
Justification: Unified access control models provide a consistent framework, reducing complexity and
enhancing manageability.
Justification: The Optimal stage is the highest in the CISA ZT Maturity Model, indicating complete
integration and optimization.
Justification: An optimal stage in automation maturity involves systems that can fully automate processes
and adapt to new threats or changes dynamically.
Q50: Which strategy is crucial to minimizing security risks by ensuring users only have
access necessary for their job functions?
● Continuous authentication
● Implemented firewalls
● Enforcing least privilege principles
● Strict access controls
Justification: Least privilege limits user access strictly to what is required, reducing potential misuse or
breaches.