CSA Certificate Of Cloud Security Knowledge CCSK Exam Practice Test

Page: 1 / 14
Total 332 questions
Question 1

What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?



Answer : B


Question 2

Which practice ensures container security by preventing post-deployment modifications?



Answer : D

Immutable containers are not altered post-deployment, ensuring the integrity of the deployed environment and reducing the risk of unauthorized modifications. Reference: [CCSK v5 Curriculum, Domain 8 - Cloud Workload Security][16source].


Question 3

Containers are highly portable code execution environments.



Answer : B


Question 4

Which cloud service model typically places the most security responsibilities on the cloud customer?



Answer : B

InInfrastructure as a Service (IaaS), the customer has themost control and security responsibilitybecause:

The provider only secures physical infrastructure (data centers, networking, hardware).

Customers must configure and manage firewalls, network security, operating system patches, and IAM.

Data security, encryption, and application security are entirely the customer's responsibility.

In contrast:

PaaS (Platform as a Service)places some security responsibility on the provider (e.g., runtime environments, managed databases).

SaaS (Software as a Service)places most security responsibility on the provider, with customers mainly managingidentity and access controls.

This is extensively discussed in:

CCSK v5 - Security Guidance v4.0, Domain 1 (Cloud Computing Concepts and Architectures)

Cloud Controls Matrix (CCM) - Infrastructure and Application Security Controls.


Question 5

Your cloud and on-premises infrastructures should always use the same network address ranges.



Answer : A


Question 6

What is the primary function of a Load Balancer Service in a Software Defined Network (SDN) environment?



Answer : C

The correct answer isC. To distribute incoming network traffic across multiple destinations.

ALoad Balancer Servicein anSDN environmentis responsible forefficiently distributing network trafficacross multiple servers or instances. This ensures high availability, reliability, and optimized resource usage.

Key Functions:

Traffic Distribution:Balances incoming requests to various servers based on predefined algorithms (round-robin, least connections, etc.).

High Availability:Prevents server overload and reduces downtime by distributing workload.

Scalability:Automatically adjusts as the number of requests or available resources changes.

Health Monitoring:Continually checks server availability and responsiveness to avoid directing traffic to non-responsive instances.

Why Other Options Are Incorrect:

A . Isolated virtual networks:Creating isolated networks is a function of network virtualization, not load balancing.

B . Monitor network performance:Monitoring is done by network monitoring tools, not load balancers.

D . Encrypt data for secure transmission:Encryption is handled by security protocols like TLS/SSL, not load balancers.

Real-World Example:

Services likeAWS Elastic Load Balancer (ELB)andAzure Load Balancerensure that traffic is distributed efficiently across instances, maintaining performance and uptime.


CSA Security Guidance v4.0, Domain 7: Infrastructure Security

Cloud Computing Security Risk Assessment (ENISA) - SDN and Load Balancing

Cloud Controls Matrix (CCM) v3.0.1 - Network and Infrastructure Domains

Question 7

Which best practice is recommended when securing object repositories in a cloud environment?



Answer : B

Encrypting all objects in the repository ensures that data is protected at rest, reducing the risk of unauthorized access or data exposure. Reference: [Security Guidance v5, Domain 9 - Data Security]


Page:    1 / 14   
Total 332 questions