When mapping functions to lifecycle phases, which functions are required to successfully process data?
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
Which two key capabilities are required for technology to be considered cloud computing?
Your SLA with your cloud provider ensures continuity for all services.
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
How does centralized logging simplify security monitoring and compliance?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
Which type of cloud workload would be most appropriate for running isolated applications with minimum resource overhead?
Which of the following best describes the primary function of Cloud Detection and Response (CDR) in cybersecurity?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
What is the primary function of landing zones or account factories in cloud environments?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?
What is the primary purpose of Cloud Infrastructure Entitlement Management (CIEM) in cloud environments?
Why is it essential to embed cloud decisions within organizational governance?
What are the encryption options available for SaaS consumers?
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
Which concept provides the abstraction needed for resource pools?
Which term describes the practice in cloud compliance where a customer acquires a set of pre-approved regulatory or standards-based controls from a compliant provider?
Use elastic servers when possible and move workloads to new instances.
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
The Software Defined Perimeter (SDP) includes which components?
What is resource pooling?
Why is a service type of network typically isolated on different hardware?
What is one significant way Artificial Intelligence, particularly Large Language Models, is impacting IT and security?
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
What is the primary objective of posture management in a cloud environment?
In the context of incident response, which phase involves alerts validation to reduce false positives and estimates the incident's scope?
Which of the following best describes the advantage of custom application level encryption?
Which principle reduces security risk by granting users only the permissions essential for their role?
What is the primary function of Privileged Identity Management (PIM) and Privileged Access Management (PAM)?
When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?
After an incident has been identified and classified, which activity is typically performed during the Containment, Eradication, and Recovery phase of incident response?
How does artificial intelligence pose both opportunities and risks in cloud security?
What is the primary advantage of implementing Continuous Integration and Continuous Delivery/Deployment (CI/CD) pipelines in the context of cybersecurity?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
Which of the following best describes a primary focus of cloud governance with an emphasis on security?
Which of the following is a common risk factor related to misconfiguration and inadequate change control in cybersecurity?
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?
Which of the following best describes a key aspect of cloud risk management?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
Which resilience tool helps distribute network or application traffic across multiple servers to ensure reliability and availability?
What technology is commonly used to establish an encrypted tunnel between a remote user's device and a private network over the public Internet?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
Which of the following is a common security issue associated with serverless computing environments?
A cloud deployment of two or more unique clouds is known as:
Which of the following statements best describes an identity
federation?
How does virtualized storage help avoid data loss if a drive fails?
Which of the following best describes a primary risk associated with the use of cloud storage services?
Which strategy is critical for securing containers at the image creation stage?
What are the essential characteristics of cloud computing as defined by the NIST model?
An organization deploys an AI application for fraud detection. Which threat is MOST likely to affect its AI model’s accuracy?
What is a key consideration when handling cloud security incidents?
How does cloud adoption impact incident response processes in cybersecurity?
What is the primary goal of implementing DevOps in a software development lifecycle?
What is a primary benefit of using Identity and Access Management (IAM) roles/identities provided by cloud providers instead of static secrets?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
What is the primary function of a Load Balancer Service in a Software Defined Network (SDN) environment?
What is true of searching data across cloud environments?
When designing an encryption system, you should start with a threat model.
How does DevSecOps fundamentally differ from traditional DevOps in the development process?
Which aspect is most important for effective cloud governance?
Why is it important for Cloud Service Providers (CSPs) to document security controls?
In the context of cloud workload security, which feature directly contributes to enhanced performance and resource utilization without incurring excess costs?
What is a primary benefit of implementing micro-segmentation within a Zero Trust Architecture?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
Which aspects are most important for ensuring security in a hybrid cloud environment?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
Which of the following best describes the concept of AI as a Service (AIaaS)?
Which of the following is the MOST common cause of cloud-native security breaches?
When establishing a cloud incident response program, what access do responders need to effectively analyze incidents?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
What are the primary security responsibilities of the cloud provider in compute virtualizations?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
Which of the following best describes the concept of Measured Service in cloud computing?
Which of the following best describes the multi-tenant nature of cloud computing?
In Identity and Access Management (IAM) containment, why is it crucial to understand if an attacker escalated their identity?
Which areas should be initially prioritized for hybrid cloud security?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
What is a key component of governance in the context of cybersecurity?
Which Identity and Access Management (IAM) component verifies the identity of a user, process, or device, as a prerequisite to allowing access?
How should an SDLC be modified to address application security in a Cloud Computing environment?
ENISA: A reason for risk concerns of a cloud provider being acquired is:
How can the use of third-party libraries introduce supply chain risks in software development?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
What is an advantage of using Kubernetes for container orchestration?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
What is the primary purpose of Identity and Access Management (IAM) systems in a cloud environment?
Which practice minimizes human error in long-running cloud workloads’ security management?