exam questions

Exam CCSK All Questions

View all questions & answers for the CCSK exam

Exam CCSK topic 1 question 157 discussion

Actual exam question from CSA's CCSK
Question #: 157
Topic #: 1
[All CCSK Questions]

ENISA: A key area of controls for cloud provider network architecture is

  • A. Patch management
  • B. SAFECode software assurance
  • C. Hardening of virtual machines according to industry standard guidelines
  • D. Distributed Denial of Service mitigation
  • E. Antivirus
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
byfener
Highly Voted 1 year, 4 months ago
Selected Answer: D
Correction: according to ENISA Cloud Computing Security Risk Assessment page 73: NETWORK ARCHITECTURE CONTROLS  Define the controls used to mitigate DDoS (distributed denial–of-service) attacks. - Defence in depth (deep packet analysis, traffic throttling, packet black holing, etc) - Do you have defences against ‘internal’ (originating from the cloud providers networks) attacks as well as external (originating from the Internet or customer networks) attacks?
upvoted 5 times
...
ChewyBananas
Most Recent 5 months, 3 weeks ago
Selected Answer: D
C makes sense but the ENISA page 73 the answer is D. NETWORK ARCHITECTURE CONTROLS  Define the controls used to mitigate DDoS (distributed denial–of-service) attacks.
upvoted 1 times
...
Kneebee
10 months, 3 weeks ago
The correct answer is C: ENISA emphasizes the hardening of virtual machines according to industry standard guidelines.
upvoted 2 times
...
byfener
1 year, 4 months ago
Selected Answer: C
C. Hardening of virtual machines according to industry standard guidelines ENISA (European Union Agency for Cybersecurity) recognizes the importance of hardening virtual machines in cloud provider network architecture as a key area of controls. Hardening involves implementing security best practices and configurations to reduce the attack surface and enhance the security posture of virtual machines within the cloud environment. The other options (A, B, D, E) might be relevant to security but are not specifically highlighted by ENISA as key areas of controls for cloud provider network architecture in the context of the given options.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago