What item below allows disparate directory services and independent security domains to be interconnected?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
Which of the following best describes the primary purpose of cloud security frameworks?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
What tool allows teams to easily locate and integrate with approved cloud services?
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
How does artificial intelligence pose both opportunities and risks in cloud security?
What primary purpose does object storage encryption serve in cloud services?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
How does cloud sprawl complicate security monitoring in an enterprise environment?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
What is the primary objective of posture management in a cloud environment?
What key characteristic differentiates cloud networks from traditional networks?
Which best practice is recommended when securing object repositories in a cloud environment?
What is the main purpose of multi-region resiliency in cloud environments?
Which of the following best describes the shift-left approach in software development?
What is a primary benefit of using Identity and Access Management (IAM) roles/identities provided by cloud providers instead of static secrets?
Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?
Which of the following best describes a primary risk associated with the use of cloud storage services?
What is one primary operational challenge associated with using cloud-agnostic container strategies?
What is a cloud workload in terms of infrastructure and platform deployment?
Which of the following cloud essential characteristics refers to the capability of the service to scale resources up or down quickly and efficiently based on demand?
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
What is a key characteristic of serverless functions in terms of execution environment?
Which of the following best describes an aspect of PaaS services in relation to network security controls within a cloud environment?
Which technique involves assessing potential threats through analyzing attacker capabilities, motivations, and potential targets?
When establishing a cloud incident response program, what access do responders need to effectively analyze incidents?
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
When designing an encryption system, you should start with a threat model.
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
Your cloud and on-premises infrastructures should always use the same network address ranges.
What is the most significant security difference between traditional infrastructure and cloud computing?
What are the key outcomes of implementing robust cloud risk management practices?
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
Which of the following best describes a risk associated with insecure interfaces and APIs?
In preparing for cloud incident response, why is updating forensics tools for virtual machines (VMs) and containers critical?
What are the most important practices for reducing vulnerabilities in virtual machines (VMs) in a cloud environment?
Which AI workload mitigation strategy best addresses model inversion attacks that threaten data confidentiality?
In volume storage, what method is often used to support resiliency and security?
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Which of the following best describes the responsibility for security in a cloud environment?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
Which of the following is the MOST common cause of cloud-native security breaches?
How does serverless computing impact infrastructure management responsibility?
What method can be utilized along with data fragmentation to enhance security?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
Network logs from cloud providers are typically flow records, not full packet captures.
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
What are the primary security responsibilities of the cloud provider in compute virtualizations?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is: