Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CSA CCSK Exam - Topic 9 Question 44 Discussion

Actual exam question for CSA's CCSK exam
Question #: 44
Topic #: 9
[All CCSK Questions]

Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Noel
5 months ago
Totally agree, measured service is crucial!
upvoted 0 times
...
Deonna
5 months ago
Wait, nation-state boundaries? That sounds off.
upvoted 0 times
...
Rima
5 months ago
Not sure about unlimited bandwidth being essential.
upvoted 0 times
...
Lou
5 months ago
I thought multi-tenancy was a key feature too.
upvoted 0 times
...
Miss
5 months ago
Measured service is definitely one of them!
upvoted 0 times
...
Jennie
6 months ago
I thought "unlimited bandwidth" was a common misconception about cloud computing, so I doubt that's one of the characteristics.
upvoted 0 times
...
Gilberto
6 months ago
I feel like "measured service" was definitely mentioned in our practice questions, so I might lean towards that option.
upvoted 0 times
...
Simona
6 months ago
I remember studying about multi-tenancy, but I can't recall if it's one of the five characteristics or just a feature of cloud services.
upvoted 0 times
...
Laura
6 months ago
I think one of the essential characteristics is "measured service," but I'm not completely sure if that's the right term.
upvoted 0 times
...
Bernardine
6 months ago
Okay, I think I've got this. The key is to use the right syntax for the ZFS commands. Let me jot down the steps.
upvoted 0 times
...
Queenie
6 months ago
I think the answer is B. Data integrity control seems like the feature that would ensure the indexed data couldn't be tampered with.
upvoted 0 times
...
Annalee
6 months ago
This is a classic cybersecurity question. The textbook definition of a brute force attack is trying every possible password variation to gain access. So I'm confident B is the right answer here.
upvoted 0 times
...

Save Cancel