How should an SDLC be modified to address application security in a Cloud Computing environment?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
Who is responsible for the security of the physical infrastructure and virtualization platform?
Which statement best describes the impact of Cloud Computing on business continuity management?
Which of the following best describes the concept of Measured Service in cloud computing?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
ENISA: Which is a potential security benefit of cloud computing?
Which of the following best describes the shared responsibility model in cloud security?
Which of the following represents a benefit of using serverless computing for new workload types?
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
Why is it important to capture and centralize workload logs promptly in a cybersecurity environment?
Which aspect of assessing cloud providers poses the most significant challenge?
When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?
What is the primary objective of posture management in a cloud environment?
Why is a service type of network typically isolated on different hardware?
How does SASE enhance traffic management when compared to traditional network models?
Why is consulting with stakeholders important for ensuring cloud security strategy alignment?
Which statement best describes the Data Security Lifecycle?
Which of the following is a primary benefit of using Infrastructure as Code (IaC) in a security context?
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
Which of the following best describes a primary risk associated with the use of cloud storage services?
After an incident has been identified and classified, which activity is typically performed during the Containment, Eradication, and Recovery phase of incident response?
Which approach creates a secure network, invisible to unauthorized users?
Which technique is most effective for preserving digital evidence in a cloud environment?
Without virtualization, there is no cloud.
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
How does DevSecOps fundamentally differ from traditional DevOps in the development process?
How can the use of third-party libraries introduce supply chain risks in software development?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
What is true of searching data across cloud environments?
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
What are the essential characteristics of cloud computing as defined by the NIST model?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
In the context of incident response, which phase involves alerts validation to reduce false positives and estimates the incident's scope?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
Which best practice is recommended when securing object repositories in a cloud environment?
Why is it important to plan and coordinate response activities for incidents affecting the Cloud Service Provider (CSP)?
Which of the following is true about access policies in cybersecurity?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
What are the primary security responsibilities of the cloud provider in compute virtualizations?
What primary aspects should effective cloud governance address to ensure security and compliance?
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
What type of logs record interactions with specific services in a system?
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
Which Identity and Access Management (IAM) principle focuses on implementing multiple security layers to dilute access power, thereby averting a misuse or compromise?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
The containment phase of the incident response lifecycle requires taking systems offline.
Which of the following best describes the primary purpose of image factories in the context of virtual machine (VM) management?
In Identity and Access Management (IAM) containment, why is it crucial to understand if an attacker escalated their identity?
What is the primary advantage of implementing Continuous Integration and Continuous Delivery/Deployment (CI/CD) pipelines in the context of cybersecurity?
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
Which aspect of assessing cloud providers poses the most significant challenge?
Use elastic servers when possible and move workloads to new instances.
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
What is a key consideration when handling cloud security incidents?
What is the primary function of landing zones or account factories in cloud environments?
What is a primary benefit of implementing Zero Trust (ZT) architecture in cloud environments?
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
When implementing a Zero Trust (ZT) strategy, which approach is considered fundamental for ensuring enterprise security and connectivity?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
What does orchestration automate within a cloud environment?
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
What is a primary objective during the Detection and Analysis phase of incident response?
What is a key advantage of using Infrastructure as Code (IaC) in application development?
Which benefit of automated deployment pipelines most directly addresses continuous security and reliability?
ENISA: A reason for risk concerns of a cloud provider being acquired is:
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
In the context of FaaS, what is primarily defined in addition to functions?
Which of the following best describes the purpose of cloud security control objectives?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
Which of the following best describes the role of program frameworks in defining security components and technical controls?
How can virtual machine communications bypass network security controls?
How does running applications on distinct virtual networks and only connecting networks as needed help?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
Which type of AI workload typically requires large data sets and substantial computing resources?
Why is it important to control traffic flows between networks in a cybersecurity context?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
What primary purpose does object storage encryption serve in cloud services?
What is true of companies considering a cloud computing business relationship?
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
Which type of cloud workload would be most appropriate for running isolated applications with minimum resource overhead?