Certificate of Cloud Security Knowledge (CCSK) Foundation Quiz Questions and Answers

Which of the following sanitization methods is feasible for use in the cloud?

Answer :
  • Crypto-shredding

Logging is an example of what type of control?

Answer :
  • Detective

According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?

Answer :
  • Store

According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes immediately before the Share phase?

Answer :
  • Use

What is a form of cloud data protection where data is spread across multiple storage devices/locations, similar to RAID in the legacy environment?

Answer :
  • Data dispersion

Which of the following will DLP solutions most likely not inspect?

Answer :
  • VoIP conversations

Data dispersion is a cloud data security technique that is most similar to which legacy implementation?

Answer :
  • Redundant Array of Inexpensive Disks (RAID

Which of the following terms describes a means to centralize logical control of all networked nodes in the environment, abstracted from the physical connections to each?

Answer :
  • Software-defined network (SDN)

What is the most prevalent protocol used in identity federation?

Answer :
  • SAML

The process of identity management includes all the following elements except ……………………...

Answer :
  • Redaction