CCSK
CCSK
CCSK
Certificate Of Cloud Security Knowledge
Additional Features:
Visit us at https://www.certkillers.net/ccsk/
Total Questions: 117
Latest Version: 8.0
Question: 1
What is resource pooling?
Answer: A
Question: 2
Your SLA with your cloud provider ensures continuity for all services.
A. False
B. True
Answer: A
Question: 3
Which of the following is NOT normally a method for detecting and preventing data migration
into the cloud?
Visit us at https://www.certschief.com/ccsk/
Answer: A
Question: 4
In which type of environment is it impractical to allow the customer to conduct their own audit,
making it important that the data center operators are required to provide auditing for the
customers?
Answer: C
Question: 5
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing
lock in is:
Answer: A
Question: 6
What is the best way to ensure that all data has been removed from a public cloud environment
including all media such as back-up tapes?
A. Allowing the cloud provider to manage your keys so that they have the ability to access and
delete the data from the main and back-up storage.
Visit us at https://www.certschief.com/ccsk/
B. Maintaining customer managed key management and revoking or deleting keys from the key
management system to prevent the data from being accessed again.
C. Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data.
D. Keep the keys stored on the client side so that they are secure and so that the users have the
ability to delete their own data.
E. Both B and D.
Answer: B
Question: 7
ENISA: A reason for risk concerns of a cloud provider being acquired is:
Answer: E
Question: 8
Which communication methods within a cloud environment must be exposed for partners or
consumers to access database information using a web application?
Answer: E
Question: 9
Visit us at https://www.certschief.com/ccsk/
A cloud deployment of two or more unique clouds is known as:
A. Infrastructures as a Service
B. A Private Cloud
C. A Community Cloud
D. A Hybrid Cloud
E. Jericho Cloud Cube Model
Answer: C
Question: 10
ENISA: Which is not one of the five key legal issues common across all scenarios:
A. Data protection
B. Professional negligence
C. Globalization
D. Intellectual property
E. Outsourcing services and changes in control
Answer: C
Question: 11
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
A. Sales
B. Marketing
C. Legal counsel
D. Auditors
E. Accounting
Answer: D
Question: 12
Visit us at https://www.certschief.com/ccsk/
What are the primary security responsibilities of the cloud provider in the management
infrastructure?
Answer: D
Question: 13
What is true of a workload?
Answer: A
Question: 14
ENISA: Which is a potential security benefit of cloud computing?
Answer: A
Question: 15
Visit us at https://www.certschief.com/ccsk/
The Software Defined Perimeter (SDP) includes which components?
Answer: A
Question: 16
Which cloud security model type provides generalized templates for helping implement cloud
security?
Answer: D
Question: 17
Select the statement below which best describes the relationship between identities and
attributes
A. Attributes belong to entities and identities belong to attributes. Each attribute can have
multiple identities but only one entity.
B. An attribute is a unique object within a database. Each attribute it has a number of identities
which help define its parameters.
C. An identity is a distinct and unique object within a particular namespace. Attributes are
properties which belong to an identity. Each identity can have multiple attributes.
D. Attributes are made unique by their identities.
E. Identities are the network names given to servers. Attributes are the characteristics of each
server.
Visit us at https://www.certschief.com/ccsk/
Answer: D
Question: 18
What is a potential concern of using Security-as-a-Service (SecaaS)?
A. Lack of visibility
B. Deployment flexibility
C. Scaling and costs
D. Intelligence sharing
E. Insulation of clients
Answer: A
Question: 19
How should an SDLC be modified to address application security in a Cloud Computing
environment?
Answer: A
Question: 20
Which governance domain focuses on proper and adequate incident detection, response,
notification, and remediation?
Visit us at https://www.certschief.com/ccsk/
E. Infrastructure Security
Answer: C
Question: 21
Which opportunity helps reduce common application security issues?
A. Elastic infrastructure
B. Default deny
C. Decreased use of micro-services
D. Segregation by default
E. Fewer serverless configurations
Answer: A
Question: 22
What is the most significant security difference between traditional infrastructure and cloud
computing?
A. Management plane
B. Intrusion detection options
C. Secondary authentication factors
D. Network access points
E. Mobile security configuration options
Answer: A
Question: 23
A security failure at the root network of a cloud provider will not compromise the security of all
customers because of multitenancy configuration.
A. False
B. True
Visit us at https://www.certschief.com/ccsk/
Answer: A
Question: 24
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can
the user investigate on their own?
Answer: E
Question: 25
If in certain litigations and investigations, the actual cloud application or environment itself is
relevant to resolving the dispute in the litigation or investigation, how is the information likely to
be obtained?
Answer: D
Question: 26
The containment phase of the incident response lifecycle requires taking systems offline.
A. False
Visit us at https://www.certschief.com/ccsk/
B. True
Answer: B
Question: 27
What are the primary security responsibilities of the cloud provider in compute virtualizations?
Answer: A
Question: 28
What should every cloud customer set up with its cloud service provider (CSP) that can be
utilized in the event of an incident?
Answer: B
Question: 29
Audits should be robustly designed to reflect best practice, appropriate resources, and tested
protocols and standards. They should also use what type of auditors?
Visit us at https://www.certschief.com/ccsk/
C. Certified by CSA
D. Auditors working in the interest of the cloud provider
E. None of the above
Answer: B
Question: 30
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
A. DLP can provide options for quickly deleting all of the data stored in a cloud environment.
B. DLP can classify all data in a storage repository.
C. DLP never provides options for how data found in violation of a policy can be handled.
D. DLP can provide options for where data is stored.
E. DLP can provide options for how data found in violation of a policy can be handled.
Answer: E
Question: 31
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud
security control to which of the following elements?
Answer: C
Question: 32
For third-party audits or attestations, what is critical for providers to publish and customers to
evaluate?
A. Scope of the assessment and the exact included features and services for the assessment
B. Provider infrastructure information including maintenance windows and contracts
Visit us at https://www.certschief.com/ccsk/
C. Network or architecture diagrams including all end point security devices in use
D. Service-level agreements between all parties
E. Full API access to all required services
Answer: C
Question: 33
When mapping functions to lifecycle phases, which functions are required to successfully
process data?
Answer: A
Question: 34
When designing an encryption system, you should start with a threat model.
A. False
B. True
Answer: B
Question: 35
Which of the following is one of the five essential characteristics of cloud computing as defined
by NIST?
A. Multi-tenancy
B. Nation-state boundaries
C. Measured service
Visit us at https://www.certschief.com/ccsk/
D. Unlimited bandwidth
E. Hybrid clouds
Answer: C
Question: 36
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
Answer: B
Question: 37
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider
restrictions.
A. False
B. True
Answer: A
Question: 38
How can key management be leveraged to prevent cloud providers from inappropriately
accessing customer data?
Visit us at https://www.certschief.com/ccsk/
D. Stipulate encryption in contract language
E. Select cloud providers within the same country as customer
Answer: C
Question: 39
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for
using CCM is NOT suitable for the company as a cloud customer?
A. Submit the CCM on behalf of the CSP to CSA Security, Trust & Assurance Registry (STAR), a
free, publicly accessible registry that documents the security controls provided by CSPs
B. Use CCM to build a detailed list of requirements and controls that they want their CSP to
implement
C. Use CCM to help assess the risk associated with the CSP
D. None of the above
Answer: D
Question: 40
If the management plane has been breached, you should confirm the templates/configurations
for your infrastructure or applications have not also been compromised.
A. False
B. True
Answer: A
Question: 41
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management
solution. They are growing rapidly and therefore need to put controls in place in order to
manage any changes in
their production environment. Which of the following Change Control & Configuration
Management production environment specific control should they implement in this scenario?
Visit us at https://www.certschief.com/ccsk/
A. Policies and procedures shall be established for managing the risks associated with applying
changes to business-critical or customer (tenant)-impacting (physical and virtual) applications
and system-
B. Policies and procedures shall be established, and supporting business processes and technical
measures implemented, to restrict the installation of unauthorized software on organizationally-
owned or
C. All cloud-based services used by the company's mobile devices or BYOD shall be pre-approved
for usage and the storage of company business data.
D. None of the above
Answer: A
Question: 42
Containers are highly portable code execution environments.
A. False
B. True
Answer: B
Question: 43
Which statement best describes the Data Security Lifecycle?
A. The Data Security Lifecycle has six stages, is strictly linear, and never varies.
B. The Data Security Lifecycle has six stages, can be non-linear, and varies in that some data may
never pass through all stages.
C. The Data Security Lifecycle has five stages, is circular, and varies in that some data may never
pass through all stages.
D. The Data Security Lifecycle has six stages, can be non-linear, and is distinct in that data must
always pass through all phases.
E. The Data Security Lifecycle has five stages, can be non-linear, and is distinct in that data must
always pass through all phases.
Answer: B
Visit us at https://www.certschief.com/ccsk/
Question: 44
Which of the following encryption methods would be utilized when object storage is used as the
back-end for an application?
A. Database encryption
B. Media encryption
C. Asymmetric encryption
D. Object encryption
E. Client/application encryption
Answer: E
Question: 45
In the Software-as-a-service relationship, who is responsible for the majority of the security?
A. Application Consumer
B. Database Manager
C. Application Developer
D. Cloud Provider
E. Web Application CISO
Answer: D
Question: 46
What method can be utilized along with data fragmentation to enhance security?
A. Encryption
B. Organization
C. Knowledge management
D. IDS
E. Insulation
Answer: E
Visit us at https://www.certschief.com/ccsk/
Question: 47
Which of the following statements best defines the "authorization" as a component of identity,
entitlement, and access management?
Answer: D
Question: 48
How can web security as a service be deployed for a cloud consumer?
Answer: A
Question: 49
When configured properly, logs can track every code, infrastructure, and configuration change
and connect it back to the submitter and approver, including the test results.
A. False
B. True
Answer: B
Visit us at https://www.certschief.com/ccsk/
Question: 50
What of the following is NOT an essential characteristic of cloud computing?
Answer: C
Question: 51
Without virtualization, there is no cloud.
A. False
B. True
Answer: B
Question: 52
All assets require the same continuity in the cloud.
A. False
B. True
Answer: A
Question: 53
Visit us at https://www.certschief.com/ccsk/
Which type of application security testing tests running applications and includes tests such as
web vulnerability testing and fuzzing?
A. Code Review
B. Static Application Security Testing (SAST)
C. Unit Testing
D. Functional Testing
E. Dynamic Application Security Testing (DAST)
Answer: E
Question: 54
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the
applicability of the cloud security control to which of the following elements?
Answer: D
Question: 55
Any given processor and memory will nearly always be running multiple workloads, often from
different tenants.
A. False
B. True
Answer: B
Question: 56
Visit us at https://www.certschief.com/ccsk/
In which deployment model should the governance strategy consider the minimum common set
of controls comprised of the Cloud Service Provider contract and the organization's internal
governance agreements?
A. Public
B. PaaS
C. Private
D. IaaS
E. Hybrid
Answer: E
Question: 57
What is known as the interface used to connect with the metastructure and configure the cloud
environment?
A. Administrative access
B. Management plane
C. Identity and Access Management
D. Single sign-on
E. Cloud dashboard
Answer: B
Question: 58
What does it mean if the system or environment is built automatically from a template?
A. Nothing.
B. It depends on how the automation is configured.
C. Changes made in production are overwritten by the next code or template change.
D. Changes made in test are overwritten by the next code or template change.
E. Changes made in production are untouched by the next code or template change.
Answer: D
Visit us at https://www.certschief.com/ccsk/
Question: 59
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
A. True
B. False
Answer: B
Question: 60
Which of the following statements best describes an identity
federation?
Answer: E
Question: 61
What is a core tenant of risk management?
Answer: B
Visit us at https://www.certschief.com/ccsk/
Question: 62
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
Answer: B
Question: 63
What are the encryption options available for SaaS consumers?
A. Any encryption option that is available for volume storage, object storage, or PaaS
B. Provider-managed and (sometimes) proxy encryption
C. Client/application and file/folder encryption
D. Object encryption Volume storage encryption
Answer: B
Question: 64
In the cloud provider and consumer relationship, which entity
manages the virtual or abstracted infrastructure?
Answer: C
Visit us at https://www.certschief.com/ccsk/
Question: 65
Which term describes any situation where the cloud consumer does
not manage any of the underlying hardware or virtual machines?
A. Serverless computing
B. Virtual machineless
C. Abstraction
D. Container
E. Provider managed
Answer: A
Question: 66
All cloud services utilize virtualization technologies.
A. False
B. True
Answer: B
Question: 67
If there are gaps in network logging data, what can you do?
A. Nothing. There are simply limitations around the data that can be logged in the cloud.
B. Ask the cloud provider to open more ports.
C. You can instrument the technology stack with your own logging.
D. Ask the cloud provider to close more ports.
E. Nothing. The cloud provider must make the information available.
Answer: C
Visit us at https://www.certschief.com/ccsk/
Question: 68
CCM: In the CCM tool, a is a measure that modifies risk and includes any process, policy, device,
practice or any other actions which modify risk.
A. Risk Impact
B. Domain
C. Control Specification
Answer: C
Question: 69
Who is responsible for the security of the physical infrastructure and virtualization platform?
Answer: E
Question: 70
What factors should you understand about the data specifically due to legal, regulatory, and
jurisdictional factors?
Answer: D
Visit us at https://www.certschief.com/ccsk/
Question: 71
Which cloud-based service model enables companies to provide client-based access for partners
to databases or applications?
A. Platform-as-a-service (PaaS)
B. Desktop-as-a-service (DaaS)
C. Infrastructure-as-a-service (IaaS)
D. Identity-as-a-service (IDaaS)
E. Software-as-a-service (SaaS)
Answer: A
Question: 72
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments
GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
Answer: B
Question: 73
Which attack surfaces, if any, does virtualization technology introduce?
A. The hypervisor
B. Virtualization management components apart from the hypervisor
C. Configuration and VM sprawl issues
D. All of the above
Answer: D
Visit us at https://www.certschief.com/ccsk/
Question: 74
APIs and web services require extensive hardening and must assume attacks from authenticated
and unauthenticated adversaries.
A. False
B. True
Answer: B
Question: 75
Which of the following is NOT a cloud computing characteristic that impacts incidence
response?
Answer: B
Question: 76
Big data includes high volume, high variety, and high velocity.
A. False
B. True
Answer: B
Visit us at https://www.certschief.com/ccsk/
Question: 77
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides
cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH
Act among other industry standards. Health4Sure decides to assess the overall security of their
cloud service against the CCM toolkit so that they will be able to present this document to
potential clients.
Which of the following approach would be most suitable to assess the overall security posture
of Health4Sure’s cloud service?
A. The CCM columns are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify
the CCM controls already covered ad a result of their compliance with HIPPA/HITECH Act. They
could then assess the remaining controls. This approach will save time.
B. The CCM domain controls are mapped to HIPAA/HITECH Act and therefore Health4Sure could
verify the CCM controls already covered as a result of their compliance with HIPPA/HITECH Act.
They could then assess the remaining controls thoroughly. This approach saves time while being
able to assess the company’s overall security posture in an efficient manner.
C. The CCM domains are not mapped to HIPAA/HITECH Act. Therefore Health4Sure should
assess the security posture of their cloud service against each and every control in the CCM. This
approach will allow a thorough assessment of the security posture.
Answer: C
Question: 78
A defining set of rules composed of claims and attributes of the entities in a transaction, which is
used to determine their level of access to cloud-based resources is called what?
A. An entitlement matrix
B. A support table
C. An entry log
D. A validation process
E. An access log
Answer: D
Question: 79
Visit us at https://www.certschief.com/ccsk/
Cloud applications can use virtual networks and other structures, for hyper-segregated
environments.
A. False
B. True
Answer: B
Question: 80
Your cloud and on-premises infrastructures should always use the same network address
ranges.
A. False
B. True
Answer: A
Question: 81
Which layer is the most important for securing because it is considered to be the foundation for
secure cloud operations?
A. Infrastructure
B. Datastructure
C. Infostructure
D. Applistructure
E. Metastructure
Answer: A
Question: 82
Why is a service type of network typically isolated on different hardware?
Visit us at https://www.certschief.com/ccsk/
B. It manages resource pools for cloud consumers
C. It has distinct functions from other networks
D. It manages the traffic between other networks
E. It requires unique security
Answer: D
Question: 83
Which governance domain deals with evaluating how cloud computing affects compliance with
internal
security policies and various legal requirements, such as regulatory and legislative?
Answer: C
Question: 84
An important consideration when performing a remote vulnerability test of a cloud-based
application is to
Answer: A
Question: 85
Visit us at https://www.certschief.com/ccsk/
Cloud services exhibit five essential characteristics that demonstrate their relation to, and
differences from, traditional computing approaches. Which one of the five characteristics is
described as: a consumer can unilaterally provision computing capabilities such as server time
and network storage as needed.
A. Rapid elasticity
B. Resource pooling
C. Broad network access
D. Measured service
E. On-demand self-service
Answer: E
Question: 86
REST APIs are the standard for web-based services because they run over HTTPS and work well
across diverse environments.
A. False
B. True
Answer: B
Question: 87
Which of the following statements are NOT requirements of governance and enterprise risk
management in a cloud environment?
A. Inspect and account for risks inherited from other members of the cloud supply chain and
take active measures to mitigate and contain risks through operational resiliency.
B. Respect the interdependency of the risks inherent in the cloud supply chain and communicate
the corporate risk posture and readiness to consumers and dependent parties.
C. Negotiate long-term contracts with companies who use well-vetted software application to
avoid the transient nature of the cloud environment.
D. Provide transparency to stakeholders and shareholders demonstrating fiscal solvency and
organizational transparency.
E. Both B and C.
Answer: C
Visit us at https://www.certschief.com/ccsk/
Question: 88
What is defined as the process by which an opposing party may obtain private documents for
use in litigation?
A. Discovery
B. Custody
C. Subpoena
D. Risk Assessment
E. Scope
Answer: A
Question: 89
What item below allows disparate directory services and independent security domains to be
interconnected?
A. Coalition
B. Cloud
C. Intersection
D. Union
E. Federation
Answer: E
Question: 90
Use elastic servers when possible and move workloads to new instances.
A. False
B. True
Answer: B
Visit us at https://www.certschief.com/ccsk/
Question: 91
To understand their compliance alignments and gaps with a cloud provider, what must cloud
customers rely on?
A. Provider documentation
B. Provider run audits and reports
C. Third-party attestations
D. Provider and consumer contracts
E. EDiscovery tools
Answer: C
Question: 92
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for
cloud deployments?
Answer: B
Question: 93
Which data security control is the LEAST likely to be assigned to an IaaS provider?
A. Application logic
B. Access controls
C. Encryption solutions
D. Physical destruction
Visit us at https://www.certschief.com/ccsk/
E. Asset management and tracking
Answer: A
Question: 94
How does virtualized storage help avoid data loss if a drive fails?
Answer: A
Question: 95
What is the newer application development methodology and philosophy focused on
automation of application development and deployment?
A. Agile
B. BusOps
C. DevOps
D. SecDevOps
E. Scrum
Answer: C
Question: 96
Sending data to a provider’s storage over an API is likely as much more reliable and secure than
setting up your own SFTP server on a VM in the same provider
A. False
B. True
Visit us at https://www.certschief.com/ccsk/
Answer: B
Question: 97
What is true of searching data across cloud environments?
A. You might not have the ability or administrative rights to search or access all hosted data.
B. The cloud provider must conduct the search with the full administrative controls.
C. All cloud-hosted email accounts are easily searchable.
D. Search and discovery time is always factored into a contract between the consumer and
provider.
E. You can easily search across your environment using any E-Discovery tool.
Answer: A
Question: 98
How does running applications on distinct virtual networks and only connecting networks as
needed help?
Answer: D
Question: 99
How can virtual machine communications bypass network security controls?
Visit us at https://www.certschief.com/ccsk/
D. VM images can contain rootkits programmed to bypass firewalls
E. Most network security systems do not recognize encrypted VM traffic
Answer: A
Question: 100
ENISA: “VM hopping” is:
Answer: D
Question: 101
Which concept is a mapping of an identity, including roles, personas, and attributes, to an
authorization?
A. Access control
B. Federated Identity Management
C. Authoritative source
D. Entitlement
E. Authentication
Answer: D
Question: 102
Which concept provides the abstraction needed for resource pools?
A. Virtualization
Visit us at https://www.certschief.com/ccsk/
B. Applistructure
C. Hypervisor
D. Metastructure
E. Orchestration
Answer: A
Question: 103
Network logs from cloud providers are typically flow records, not full packet captures.
A. False
B. True
Answer: B
Question: 104
Select the best definition of “compliance” from the options below.
Answer: D
Question: 105
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the
following?
A. Risk Impact
Visit us at https://www.certschief.com/ccsk/
B. Domain
C. Control Specification
Answer: B
Question: 106
In volume storage, what method is often used to support resiliency and security?
A. proxy encryption
B. data rights management
C. hypervisor agents
D. data dispersion
E. random placement
Answer: D
Question: 107
What is true of security as it relates to cloud network infrastructure?
Answer: E
Question: 108
Which statement best describes the impact of Cloud Computing on business continuity
management?
Visit us at https://www.certschief.com/ccsk/
A. A general lack of interoperability standards means that extra focus must be placed on the
security aspects of migration between Cloud providers.
B. The size of data sets hosted at a Cloud provider can present challenges if migration to another
provider becomes necessary.
C. Customers of SaaS providers in particular need to mitigate the risks of application lock-in.
D. Clients need to do business continuity planning due diligence in case they suddenly need to
switch providers.
E. Geographic redundancy ensures that Cloud Providers provide highly available services.
Answer: E
Question: 109
What is known as a code execution environment running within an operating system that shares
and uses the resources of the operating system?
A. Platform-based Workload
B. Pod
C. Abstraction
D. Container
E. Virtual machine
Answer: D
Question: 110
Which term is used to describe the use of tools to selectively degrade portions of the cloud to
continuously test business continuity?
A. Planned Outages
B. Resiliency Planning
C. Expected Engineering
D. Chaos Engineering
E. Organized Downtime
Answer: D
Visit us at https://www.certschief.com/ccsk/
Question: 111
What is true of companies considering a cloud computing business relationship?
A. The laws protecting customer data are based on the cloud provider and customer location
only.
B. The confidentiality agreements between companies using cloud computing services is limited
legally to the company, not the provider.
C. The companies using the cloud providers are the custodians of the data entrusted to them.
D. The cloud computing companies are absolved of all data security and associated risks through
contracts and data laws.
E. The cloud computing companies own all customer data.
Answer: C
Question: 112
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission
from the provider.
A. False
B. True
Answer: B
Question: 113
When deploying Security as a Service in a highly regulated industry or environment, what should
both parties agree on in advance and include in the SLA?
A. The metrics defining the service level required to achieve regulatory objectives.
B. The duration of time that a security violation can occur before the client begins assessing
regulatory fines.
C. The cost per incident for security breaches of regulated information.
D. The regulations that are pertinent to the contract and how to circumvent them.
E. The type of security software which meets regulations and the number of licenses that will be
needed.
Visit us at https://www.certschief.com/ccsk/
Answer: A
Question: 114
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
A. Volume storage
B. Platform
C. Database
D. Application
E. Object storage
Answer: A
Question: 115
Which of the following items is NOT an example of Security as a Service (SecaaS)?
A. Spam filtering
B. Authentication
C. Provisioning
D. Web filtering
E. Intrusion detection
Answer: C
Question: 116
How is encryption managed on multi-tenant storage?
Visit us at https://www.certschief.com/ccsk/
Answer: B
Question: 117
Which statement best describes why it is important to know how data is being accessed?
Answer: D
Visit us at https://www.certschief.com/ccsk/