CSA CCSK Exam (page: 8)
CSA Certificate Of Cloud Security Knowledge
Updated on: 15-Feb-2026

Viewing Page 8 of 41

Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?

  1. Access control
  2. Federated Identity Management
  3. Authoritative source
  4. Entitlement
  5. Authentication

Answer(s): D



Which concept provides the abstraction needed for resource pools?

  1. Virtualization
  2. Applistructure
  3. Hypervisor
  4. Metastructure
  5. Orchestration

Answer(s): A



Network logs from cloud providers are typically ow records, not full packet captures.

  1. False
  2. True

Answer(s): B



Select the best de nition of `compliance` from the options below.

  1. The development of a routine that covers all necessary security measures.
  2. The diligent habits of good security practices and recording of the same.
  3. The timely and e cient ling of security reports.
  4. The awareness and adherence to obligations, including the assessment and prioritization of corrective actions deemed necessary and appropriate.
  5. The process of completing all forms and paperwork necessary to develop a defensible paper trail.

Answer(s): D



CCM: In the CCM tool, `Encryption and Key Management` is an example of which of the following?

  1. Risk Impact
  2. Domain
  3. Control Speci cation

Answer(s): B



Viewing Page 8 of 41



Share your comments for CSA CCSK exam with other users:

Nobody 8/30/2023 9:54:00 PM

does this actually work? are they the exam questions and answers word for word?
Anonymous