20 Questions

Certificate of cloud security knowledge version 1.0 Quiz

1 :-

CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients. Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?

2 :-

What is true of searching data across cloud environments?

3 :-

Your cloud and on-premises infrastructures should always use the same network address ranges.

4 :-

APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.

5 :-

An important consideration when performing a remote vulnerability test of a cloud-based application is to

6 :-

What is defined as the process by which an opposing party may obtain private documents for use in litigation?

7 :-

A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?

8 :-

In volume storage, what method is often used to support resiliency and security ?

9 :-

Network logs from cloud providers are typically flow records, not full packet captures.

10 :-

Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?

11 :-

Which statement best describes the impact of Cloud Computing on business continuity management?

12 :-

What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?

13 :-

CCM: The following list of controls belong to which domain of the CCM? 

GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework

14 :-

Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?

15 :-

If there are gaps in network logging data, what can you do?

16 :-

How does running applications on distinct virtual networks and only connecting networks as needed help?

17 :-

Big data includes high volume, high variety, and high velocity.

 

18 :-

Which concept provides the abstraction needed for resource pools?

19 :-

ENISA: “VM hopping” is:

20 :-

Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?

Mock Test Completion Certificate
You scored 0 out of 20 questions.

🏅

For your extraordinary service and contributions to your profession.
We are delighted in providing this certificate to you.

Tips for improving your score:

  • Make sure to read the questions and answer choices carefully.
  • Don't try to answer any choices that you don't know. It's better to skip a question.