Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
What is an essential security characteristic required when using multi-tenanttechnologies?
Which of the following best describes a risk associated with insecure interfaces and APIs?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
Which of the following information security policies defines the use of an organization ' s IT resources?
Which practice minimizes human error in long-running cloud workloads’ security management?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
How should an SDLC be modified to address application security in a Cloud Computing environment?
Which aspect of assessing cloud providers poses the most significant challenge?
In preparing for cloud incident response, why is updating forensics tools for virtual machines (VMs) and containers critical?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
Which of the following events should be monitored according to CIS AWS benchmarks?
What is the purpose of the " Principle of Least Privilege " in Identity and Access Management (IAM)?
Which of the following enhances Platform as a Service (PaaS) security by regulating traffic into PaaS components?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
Which of the following best describes a primary risk associated with the use of cloud storage services?
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
In a cloud computing incident, what should be the initial focus of analysis due to the ephemeral nature of resources and centralized control mechanisms?
Which aspect of a Cloud Service Provider ' s (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
Who is responsible for the security of the physical infrastructure and virtualization platform?
Which of the following best describes an authoritative source in the context of identity management?
What is one primary operational challenge associated with using cloud-agnostic container strategies?
Which resilience tool helps distribute network or application traffic across multiple servers to ensure reliability and availability?
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?
What is the most significant security difference between traditional infrastructure and cloud computing?
Which of the following best describes the advantage of custom application level encryption?
Which of the following best describes how cloud computing manages shared resources?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
Which statement best describes the impact of Cloud Computing on business continuity management?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?
What Identity and Access Management (IAM) process decides to permit or deny a subject access to system objects like networks, data, or applications?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
In the context of IaaS, what are the primary components included in infrastructure?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
In preparing for cloud incident response, why is it crucial to establish a cloud deployment registry?
In federated identity management, what role does the identity provider (IdP) play in relation to the relying party?
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
What is a key characteristic of serverless functions in terms of execution environment?
What is the primary purpose of Identity and Access Management (IAM) systems in a cloud environment?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
Which of the following cloud essential characteristics refers to the capability of the service to scale resources up or down quickly and efficiently based on demand?
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
What is the most effective way to identify security vulnerabilities in an application?
What are the primary security responsibilities of the cloud provider in compute virtualizations?
Which practice ensures container security by preventing post-deployment modifications?
Which data security control is the LEAST likely to be assigned to an IaaS provider?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
How does DevSecOps fundamentally differ from traditional DevOps in the development process?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
An important consideration when performing a remote vulnerability test of a cloud-based application is to
Which of the following items is NOT an example of Security as a Service (SecaaS)?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
In a cloud context, what does entitlement refer to in relation to a user ' s permissions?
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?
In securing virtual machines (VMs), what is the primary role of using an “image factory " in VM deployment?
How does Infrastructure as Code (IaC) facilitate rapid recovery in cybersecurity?
What are the most important practices for reducing vulnerabilities in virtual machines (VMs) in a cloud environment?
What item below allows disparate directory services and independent security domains to be interconnected?