CCSK plus V4 Quiz Questions and Answers

Which of the following sanitization methods is feasible for use in the cloud?

Answer :
  • Crypto-shredding

Data dispersion is a cloud data security technique that is most similar to which legacy implementation?

Answer :
  • Redundant Array of Inexpensive Disks (RAID

According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?

Answer :
  • Store

According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes immediately before the Share phase?

Answer :
  • Use

What is a form of cloud data protection where data is spread across multiple storage devices/locations, similar to RAID in the legacy environment?

Answer :
  • Data dispersion

Which of the following will DLP solutions most likely not inspect?

Answer :
  • VoIP conversations

Which of the following terms describes a means to centralize logical control of all networked nodes in the environment, abstracted from the physical connections to each?

Answer :
  • Software-defined network (SDN)

What is the most prevalent protocol used in identity federation?

Answer :
  • SAML

The process of identity management includes all the following elements except ……………………...

Answer :
  • Redaction

What can be revealed by an audit of a baseline virtual image, used in a cloud environment?

Answer :
  • Whether necessary security controls are in place and functioning properly