Free CCSK Exam Braindumps (page: 4)

Page 3 of 50

APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.

  1. False
  2. True

Answer(s): B



Which of the following is NOT a cloud computing characteristic that impacts incidence response?

  1. The on demand self-service nature of cloud computing environments.
  2. Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident.
  3. The possibility of data crossing geographic or jurisdictional boundaries.
  4. Object-based storage in a private cloud.
  5. The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures.

Answer(s): B



Big data includes high volume, high variety, and high velocity.

  1. False
  2. True

Answer(s): B



CCM: A hypothetical company called: `Health4Sure` is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure's cloud service?

  1. The CCM columns are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered ad a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining controls. This approach will save time.
  2. The CCM domain controls are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered as a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining controls thoroughly. This approach saves time while being able to assess the company's overall security posture in an e cient manner.
  3. The CCM domains are not mapped to HIPAA/HITECH Act. Therefore Health4Sure should assess the security posture of their cloud service against each and every control in the CCM. This approach will allow a thorough assessment of the security posture.

Answer(s): C






Post your Comments and Discuss CSA CCSK exam with other Community members: