CSA Cert CCSK Certificate of Cloud Security Knowledge Online Training
CSA Cert CCSK Online Training
The questions for CCSK were last updated at Jul 12,2025.
- Exam Code: CCSK
- Exam Name: Certificate of Cloud Security Knowledge
- Certification Provider: CSA Cert
- Latest update: Jul 12,2025
In volume storage, what method is often used to support resiliency and security?
- A . proxy encryption
- B . data rights management
- C . hypervisor agents
- D . data dispersion
- E . random placement
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
- A . The CSP server facility
- B . The logs of all customers in a multi-tenant cloud
- C . The network components controlled by the CSP
- D . The CSP office spaces
- E . Their own virtual instances in the cloud
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
- A . The process of specifying and maintaining access policies
- B . Checking data storage to make sure it meets compliance requirements
- C . Giving a third party vendor permission to work on your cloud solution
- D . Establishing/asserting the identity to the application
- E . Enforcing the rules by which access is granted to the resources
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
- A . Legal Issues: Contracts and Electronic Discovery
- B . Infrastructure Security
- C . Compliance and Audit Management
- D . Information Governance
- E . Governance and Enterprise Risk Management
Your SLA with your cloud provider ensures continuity for all services.
- A . False
- B . True
ENISA: “VM hopping” is:
- A . Improper management of VM instances, causing customer VMs to be commingled with other customer systems.
- B . Looping within virtualized routing systems.
- C . Lack of vulnerability management standards.
- D . Using a compromised VM to exploit a hypervisor, used to take control of other VMs.
- E . Instability in VM patch management causing VM routing errors.
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
- A . DLP can provide options for quickly deleting all of the data stored in a cloud environment.
- B . DLP can classify all data in a storage repository.
- C . DLP never provides options for how data found in violation of a policy can be handled.
- D . DLP can provide options for where data is stored.
- E . DLP can provide options for how data found in violation of a policy can be handled.
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?
- A . Risk Impact
- B . Domain
- C . Control Specification
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
- A . Risk Impact
- B . Domain
- C . Control Specification
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
- A . Provider documentation
- B . Provider run audits and reports
- C . Third-party attestations
- D . Provider and consumer contracts
- E . EDiscovery tools