Question 13

If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.

Correct Answer:A

Question 14

Which term describes any situation where the cloud consumer does not manage any of the underlying hardware or virtual machines?

Correct Answer:A

Question 15

Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?

Correct Answer:D

Question 16

The containment phase of the incident response lifecycle requires taking systems offline.

Correct Answer:B

Question 17

Why is a service type of network typically isolated on different hardware?

Correct Answer:D

Question 18

Your SLA with your cloud provider ensures continuity for all services.

Correct Answer:A

START CCSK EXAM