Free CSA CCSK Exam Questions (page: 18)

What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?

  1. PBAC eliminates the need for defining and managing user roles and permissions.
  2. PBAC is easier to implement and manage compared to Role-Based Access Control (RBAC).
  3. PBAC allows enforcement of granular, context-aware security policies using multiple attributes.
  4. PBAC ensures that access policies are consistent across all cloud providers and platforms.

Answer(s): C

Explanation:

PBAC enables highly specific access control based on multiple attributes, enhancing flexibility and security in cloud environments.


Reference:

[CCSK v5 Curriculum, Domain 5 - IAM][16source].



How does serverless computing impact infrastructure management responsibility?

  1. Requires extensive on-premises infrastructure
  2. Shifts more responsibility to cloud service providers
  3. Increases workload for developers
  4. Eliminates need for cloud service providers

Answer(s): B

Explanation:

Serverless computing shifts infrastructure management responsibility to the CSP, allowing customers to focus on application logic rather than infrastructure.


Reference:

[Security Guidance v5, Domain 8 - Cloud Workload Security]



Which best practice is recommended when securing object repositories in a cloud environment?

  1. Using access controls as the sole security measure
  2. Encrypting all objects in the repository
  3. Encrypting the access paths only
  4. Encrypting only sensitive objects

Answer(s): B

Explanation:

Encrypting all objects in the repository ensures that data is protected at rest, reducing the risk of unauthorized access or data exposure.


Reference:

[Security Guidance v5, Domain 9 - Data Security]



Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?

  1. A single deployment for all applications
  2. Shared deployments for similar applications
  3. Randomized deployment configurations
  4. Multiple independent deployments for applications

Answer(s): D

Explanation:

Multiple independent deployments help isolate workloads, reducing the potential impact of a breach by confining it to a single deployment environment.


Reference:

[Security Guidance v5, Domain 7 - Infrastructure & Networking]



Viewing page 18 of 73



Post your Comments and Discuss CSA CCSK exam prep with other Community members:

CCSK Exam Discussions & Posts