What is a key characteristic of serverless functions in terms of execution environment?
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
Which aspect of assessing cloud providers poses the most significant challenge?
What is a key consideration when implementing AI workloads to ensure they adhere to security best practices?
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Which of the following best describes compliance in the context of cybersecurity?
What is the primary goal of implementing DevOps in a software development lifecycle?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
In the initial stage of implementing centralized identity management, what is the primary focus of cybersecurity measures?
Which of the following is a common exploitation factor associated with serverless and container workloads?
Which data security control is the LEAST likely to be assigned to an IaaS provider?
Which factors primarily drive organizations to adopt cloud computing solutions?
Which of the following best describes the concept of Measured Service in cloud computing?
In the context of incident response, which phase involves alerts validation to reduce false positives and estimates the incident's scope?
What key characteristic differentiates cloud networks from traditional networks?
Select the statement below which best describes the relationship between identities and attributes
In the shared security model, how does the allocation of responsibility vary by service?
Which term describes any situation where the cloud consumer does
not manage any of the underlying hardware or virtual machines?
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
Which of the following best describes a benefit of using VPNs for cloud connectivity?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
What is the most effective way to identify security vulnerabilities in an application?
Why is it important to control traffic flows between networks in a cybersecurity context?
What is the most significant security difference between traditional infrastructure and cloud computing?
Which of the following best describes a primary risk associated with the use of cloud storage services?
Which of the following is a common security issue associated with serverless computing environments?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
Which of the following is the MOST common cause of cloud-native security breaches?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
What are the most important practices for reducing vulnerabilities in virtual machines (VMs) in a cloud environment?
Which of the following best describes a key benefit of Software-Defined Networking (SDN)?
Why is identity management at the organization level considered a key aspect in cybersecurity?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
How does running applications on distinct virtual networks and only connecting networks as needed help?
Which aspects are most important for ensuring security in a hybrid cloud environment?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
Which of the following best describes the advantage of custom application level encryption?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
How does Infrastructure as Code (IaC) facilitate rapid recovery in cybersecurity?
What is a key advantage of using Infrastructure as Code (IaC) in application development?
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
ENISA: Which is not one of the five key legal issues common across all scenarios:
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Which of the following cloud computing models primarily provides storage and computing resources to the users?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
In a cloud context, what does entitlement refer to in relation to a user's permissions?