Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
How does cloud sprawl complicate security monitoring in an enterprise environment?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
Which factors primarily drive organizations to adopt cloud computing solutions?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
How does network segmentation primarily contribute to limiting the impact of a security breach?
Which of the following best describes how cloud computing manages shared resources?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
In the shared security model, how does the allocation of responsibility vary by service?
How does serverless computing impact infrastructure management responsibility?
How does SASE enhance traffic management when compared to traditional network models?
Which of the following best describes the primary purpose of cloud security frameworks?
Which of the following is a common security issue associated with serverless computing environments?
Which of the following best describes compliance in the context of cybersecurity?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
Which practice ensures container security by preventing post-deployment modifications?
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
An important consideration when performing a remote vulnerability test of a cloud-based application is to
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
Which statement best describes why it is important to know how data is being accessed?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
Who is responsible for the security of the physical infrastructure and virtualization platform?
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
What item below allows disparate directory services and independent security domains to be interconnected?
In volume storage, what method is often used to support resiliency and security?
Why is a service type of network typically isolated on different hardware?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
What is known as the interface used to connect with the metastructure and configure the cloud environment?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?