CSA CCSK
Q: 1
How does network segmentation primarily contribute to limiting the impact of a security breach?
Options
Q: 2
What is the primary purpose of Identity and Access Management (IAM) systems in a cloud
environment?
Options
Q: 3
What method can be utilized along with data fragmentation to enhance security?
Options
Q: 4
Which of the following statements best defines the "authorization" as a component of identity,
entitlement, and access management?
Options
Q: 5
What tool allows teams to easily locate and integrate with approved cloud services?
Options
Q: 6
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using
CCM is NOT suitable for the company as a cloud customer?
Options
Q: 7
What is true of a workload?
Options
Q: 8
What is the newer application development methodology and philosophy focused on automation of
application development and deployment?
Options
Q: 9
When configured properly, logs can track every code, infrastructure, and configuration change and
connect it back to the submitter and approver, including the test results.
Options
Q: 10
The Software Defined Perimeter (SDP) includes which components?
Options
Question 1 of 10