exam questions

Exam CCSK All Questions

View all questions & answers for the CCSK exam

Exam CCSK topic 1 question 146 discussion

Actual exam question from CSA's CCSK
Question #: 146
Topic #: 1
[All CCSK Questions]

What is it called when a customer's information and/or processes are compromised by the actions of another customer in a multi-tenancy environment?

  • A. Information leakage
  • B. Data loss
  • C. Failure to thrive
  • D. Relationship failure
  • E. Isolation failure
Show Suggested Answer Hide Answer
Suggested Answer: E 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
byfener
4 months, 2 weeks ago
Selected Answer: E
E. Isolation failure When a customer's information and/or processes are compromised by the actions of another customer in a multi-tenancy environment, it is referred to as an isolation failure. Isolation failure occurs when the mechanisms that are meant to keep the resources and data of different customers isolated from each other are breached, leading to unauthorized access or interference between tenants' data or applications. The other options (A, B, C, D) do not specifically describe this scenario of a security breach due to the actions of another customer in a multi-tenancy environment.
upvoted 4 times
...
Brainiac
6 months, 3 weeks ago
ENISAPg. 9: ISOLATION FAILURE: multi-tenancy and shared resources are defining characteristics of cloud computing. This risk category covers the failure of mechanisms separating storage, memory, routing and even reputation between different tenants (e.g., so-called guest-hopping attacks). However it should be considered that attacks on resource isolation mechanisms (e.g.,. against hypervisors) are still less numerous and much more difficult for an attacker to put in practice compared to attacks on traditional OSs.
upvoted 1 times
...
FATWENTYSIX
7 months, 2 weeks ago
It should be A: CCSK Study Guide pg 143; Data leakage. As with any cloud computing service or product, there is always the concern of data from one cloud user leaking to another. This risk isn’t unique to SecaaS, but the highly sensitive nature of security data (and other regulated data potentially exposed in security scanning or incidents) does mean that SecaaS providers should be held to the highest standards of multitenant isolation and segregation.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago