Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CSA CCSK Exam - Topic 9 Question 30 Discussion

Actual exam question for CSA's CCSK exam
Question #: 30
Topic #: 9
[All CCSK Questions]

ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Quentin
4 months ago
Jurisdiction info is often overlooked, but it's super important!
upvoted 0 times
...
Jody
5 months ago
Audit or certification not being available is a huge red flag.
upvoted 0 times
...
Alison
5 months ago
Wait, no source escrow agreement? That sounds risky!
upvoted 0 times
...
Rashad
5 months ago
I disagree, I believe unclear asset ownership is the bigger issue.
upvoted 0 times
...
Elliott
5 months ago
Definitely think it's about lack of completeness and transparency.
upvoted 0 times
...
Nickolas
5 months ago
I vaguely remember that no source escrow agreement could lead to significant lock-in issues, but I’m not confident it’s the right answer here.
upvoted 0 times
...
Wei
5 months ago
I feel like the lack of completeness and transparency in terms of use is a big factor too, but I can't recall if it was ranked as the highest risk.
upvoted 0 times
...
Curtis
5 months ago
I think it might be related to unclear asset ownership. That seems to come up a lot in similar practice questions.
upvoted 0 times
...
Danilo
6 months ago
I remember discussing lock-in risks in class, but I'm not sure which specific vulnerability is ranked highest.
upvoted 0 times
...
Tomas
6 months ago
Hmm, this looks like a tricky one. I'll need to think through the naming convention carefully.
upvoted 0 times
...
Stephaine
6 months ago
Okay, the key details I see are that the firewall rule is rejecting traffic on port 22. I just need to determine if it's a distributed firewall or a gateway firewall, and which servers/gateways it's applied to.
upvoted 0 times
...
Marjory
6 months ago
This is a tricky one. I'm not super familiar with the Palo Alto dynamic address group feature, so I'll have to make an educated guess. I think VM Monitoring and XML API might be the two options, but I'm not 100% sure. I'll review the documentation again to double-check.
upvoted 0 times
...
Helene
6 months ago
This looks like a pretty straightforward configuration issue. I think I can handle this by carefully going through each of the violations and making the necessary changes to the configuration files.
upvoted 0 times
...
Jennie
6 months ago
Hmm, I'm a bit unsure about this one. The question is asking about the specifics of the 'Printenv' vulnerability, and I'm not entirely familiar with that. I'll need to think it through carefully.
upvoted 0 times
...
Karina
6 months ago
Okay, I think I know the answer here. The Monitoring service and the Configuration Logging service both have additional connections to a secondary database, right?
upvoted 0 times
...

Save Cancel