Which of the following best describes the concept of Measured Service in cloud computing?
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
In the context of cloud security, which approach prioritizes incoming data logsfor threat detection by applying multiple sequential filters?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
Which strategic approach is most appropriate for managing a multi-cloud environment that includes multiple IaaS and PaaS providers?
Which factors primarily drive organizations to adopt cloud computing solutions?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Who is responsible for the security of the physical infrastructure and virtualization platform?
What is an important step in conducting forensics on containerized and serverless environments?
Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?
What key characteristic differentiates cloud networks from traditional networks?
How should an SDLC be modified to address application security in a Cloud Computing environment?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
Which of the following is a common exploitation factor associated with serverless and container workloads?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
Which of the following best describes the role of program frameworks in defining security components and technical controls?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
What is a primary objective during the Detection and Analysis phase of incident response?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
In the context of IaaS, what are the primary components included in infrastructure?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
Select the statement below which best describes the relationship between identities and attributes
Which feature of cloud networks ensures strong separation between customer environments?
Which of the following is a primary purpose of establishing cloud risk registries?
Which of the following best describes a risk associated with insecure interfaces and APIs?
Network logs from cloud providers are typically flow records, not full packet captures.
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
Why is it important to plan and coordinate response activities for incidents affecting the Cloud Service Provider (CSP)?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
Which of the following best describes how cloud computing manages shared resources?
What technology is commonly used to establish an encrypted tunnel between a remote user's device and a private network over the public Internet?
What does it mean if the system or environment is built automatically from a template?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
What is the primary function of landing zones or account factories in cloud environments?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
After an incident has been identified and classified, which activity is typically performed during the Containment, Eradication, and Recovery phase of incident response?
Which of the following functionalities is provided by Data Security Posture Management (DSPM) tools?
What are the most important practices for reducing vulnerabilities in virtual machines (VMs) in a cloud environment?
How does artificial intelligence pose both opportunities and risks in cloud security?
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
Which of the following cloud essential characteristics refers to the capability of the service to scale resources up or down quickly and efficiently based on demand?
Why is it important for Cloud Service Providers (CSPs) to document security controls?
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
Why is it important to capture and centralize workload logs promptly in a cybersecurity environment?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
In the initial stage of implementing centralized identity management, what is the primary focus of cybersecurity measures?
In preparing for cloud incident response, why is it crucial to establish a cloud deployment registry?
How does DevSecOps fundamentally differ from traditional DevOps in the development process?
Which of the following best describes an authoritative source in the context of identity management?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?
Which technique is most effective for preserving digital evidence in a cloud environment?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
What tool allows teams to easily locate and integrate with approved cloud services?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
Which term describes the practice in cloud compliance where a customer acquires a set of pre-approved regulatory or standards-based controls from a compliant provider?
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?