In preparing for cloud incident response, why is updating forensics tools for virtual machines (VMs) and containers critical?
Which opportunity helps reduce common application security issues?
Which of the following best describes a primary risk associated with the use of cloud storage services?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
Which areas should be initially prioritized for hybrid cloud security?
What is true of a workload?
ENISA: Which is a potential security benefit of cloud computing?
How does artificial intelligence pose both opportunities and risks in cloud security?
Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?
In the context of cloud security, which approach prioritizes incoming data logsfor threat detection by applying multiple sequential filters?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
In a cloud environment spanning multiple jurisdictions, what is the most important factor to consider for compliance?
Who is responsible for the security of the physical infrastructure and virtualization platform?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
What primary purpose does object storage encryption serve in cloud services?
How can virtual machine communications bypass network security controls?
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
What method can be utilized along with data fragmentation to enhance security?
Which of the following best describes the multi-tenant nature of cloud computing?
What type of logs record interactions with specific services in a system?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
Which statement best describes the impact of Cloud Computing on business continuity management?
Which best practice is recommended when securing object repositories in a cloud environment?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Which attack surfaces, if any, does virtualization technology introduce?
Why is it important to control traffic flows between networks in a cybersecurity context?
ENISA: A reason for risk concerns of a cloud provider being acquired is:
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
Which of the following cloud computing models primarily provides storage and computing resources to the users?
In the cloud provider and consumer relationship, which entity
manages the virtual or abstracted infrastructure?
In volume storage, what method is often used to support resiliency and security?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
What is the most significant security difference between traditional infrastructure and cloud computing?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
What of the following is NOT an essential characteristic of cloud computing?
Which type of cloud workload would be most appropriate for running isolated applications with minimum resource overhead?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
ENISA: “VM hopping” is:
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
Why is consulting with stakeholders important for ensuring cloud security strategy alignment?
Which of the following events should be monitored according to CIS AWS benchmarks?
Which AI workload mitigation strategy best addresses model inversion attacks that threaten data confidentiality?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
In a cloud context, what does entitlement refer to in relation to a user's permissions?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
What is a key benefit of using customer-managed encryption keys with cloud key management service (KMS)?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
What is true of searching data across cloud environments?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
When implementing a Zero Trust (ZT) strategy, which approach is considered fundamental for ensuring enterprise security and connectivity?
Use elastic servers when possible and move workloads to new instances.
How does cloud sprawl complicate security monitoring in an enterprise environment?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
What is a key component of governance in the context of cybersecurity?
Which aspect is most important for effective cloud governance?
What key activities are part of the preparation phase in incident response planning?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
How can the use of third-party libraries introduce supply chain risks in software development?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
According to NIST, what is cloud computing defined as?
What are the key outcomes of implementing robust cloud risk management practices?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
Which practice ensures container security by preventing post-deployment modifications?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Which practice minimizes human error in long-running cloud workloads’ security management?
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
In the context of FaaS, what is primarily defined in addition to functions?
Which of the following best describes an aspect of PaaS services in relation to network security controls within a cloud environment?
What are the primary security responsibilities of the cloud provider in compute virtualizations?
Which of the following is a common exploitation factor associated with serverless and container workloads?
Which of the following best describes the advantage of custom application level encryption?
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
What key characteristic differentiates cloud networks from traditional networks?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
Which of the following is a primary benefit of using Infrastructure as Code (IaC) in a security context?