3 Months Free Update
3 Months Free Update
3 Months Free Update
What of the following is NOT an essential characteristic of cloud computing?
When establishing a cloud incident response program, what access do responders need to effectively analyze incidents?
What is a primary benefit of consolidating traffic through a central bastion/transit network in a hybrid cloud environment?
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
What is a key benefit of using customer-managed encryption keys with cloud key management service (KMS)?
What primary purpose does object storage encryption serve in cloud services?
The containment phase of the incident response lifecycle requires taking systems offline.
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?
Why is snapshot management crucial for the virtual machine (VM) lifecycle?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
How does running applications on distinct virtual networks and only connecting networks as needed help?
In volume storage, what method is often used to support resiliency and security?
Why is it important to plan and coordinate response activities for incidents affecting the Cloud Service Provider (CSP)?
In the context of IaaS, what are the primary components included in infrastructure?
Your cloud and on-premises infrastructures should always use the same network address ranges.
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
Why is it important to capture and centralize workload logs promptly in a cybersecurity environment?
Why is a service type of network typically isolated on different hardware?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
What is a primary objective during the Detection and Analysis phase of incident response?
Which of the following best describes the primary purpose of image factories in the context of virtual machine (VM) management?
In the context of incident response, which phase involves alerts validation to reduce false positives and estimates the incident's scope?
Which tool is most effective for ensuring compliance and identifying misconfigurations in cloud management planes?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
Which cloud security model type provides generalized templates for helping implement cloud security?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
Which aspect of assessing cloud providers poses the most significant challenge?
What key activities are part of the preparation phase in incident response planning?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
What is the purpose of the "Principle of Least Privilege" in Identity and Access Management (IAM)?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
Which of the following is a common exploitation factor associated with serverless and container workloads?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
Which of the following best describes a key aspect of cloud risk management?
Which of the following best describes the shared responsibility model in cloud security?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
Which cloud service model typically places the most security responsibilities on the cloud customer?
Which of the following best describes the primary purpose of cloud security frameworks?
Which of the following represents a benefit of using serverless computing for new workload types?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
Which of the following best describes compliance in the context of cybersecurity?
What is the primary function of landing zones or account factories in cloud environments?
Which of the following best describes how cloud computing manages shared resources?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
Which of the following best describes a risk associated with insecure interfaces and APIs?
In the context of FaaS, what is primarily defined in addition to functions?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
How does cloud sprawl complicate security monitoring in an enterprise environment?
What does it mean if the system or environment is built automatically from a template?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
What is the primary goal of implementing DevOps in a software development lifecycle?
How should an SDLC be modified to address application security in a Cloud Computing environment?
What tool allows teams to easily locate and integrate with approved cloud services?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
What is an essential security characteristic required when using multi-tenanttechnologies?
Which technique involves assessing potential threats through analyzing attacker capabilities, motivations, and potential targets?
What is a primary benefit of implementing micro-segmentation within a Zero Trust Architecture?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
Which of the following best describes the role of program frameworks in defining security components and technical controls?
Which of the following best describes the purpose of cloud security control objectives?
What item below allows disparate directory services and independent security domains to be interconnected?
An organization deploys an AI application for fraud detection. Which threat is MOST likely to affect its AI model’s accuracy?
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?