3 Months Free Update
3 Months Free Update
3 Months Free Update
Which term describes any situation where the cloud consumer does
not manage any of the underlying hardware or virtual machines?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
What is the primary function of a Load Balancer Service in a Software Defined Network (SDN) environment?
Which of the following best describes the concept of AI as a Service (AIaaS)?
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
In a cloud context, what does entitlement refer to in relation to a user's permissions?
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
What is a cloud workload in terms of infrastructure and platform deployment?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
In the context of incident response, which phase involves alerts validation to reduce false positives and estimates the incident's scope?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
Which resilience tool helps distribute network or application traffic across multiple servers to ensure reliability and availability?
What item below allows disparate directory services and independent security domains to be interconnected?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Which of the following best describes an aspect of PaaS services in relation to network security controls within a cloud environment?
Which practice minimizes human error in long-running cloud workloads’ security management?
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
In the context of cloud security, which approach prioritizes incoming data logsfor threat detection by applying multiple sequential filters?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
What tool allows teams to easily locate and integrate with approved cloud services?
Why is snapshot management crucial for the virtual machine (VM) lifecycle?
What key activities are part of the preparation phase in incident response planning?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
Which of the following cloud computing models primarily provides storage and computing resources to the users?
Which of the following best describes the multi-tenant nature of cloud computing?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
In the cloud provider and consumer relationship, which entity
manages the virtual or abstracted infrastructure?
What is one significant way Artificial Intelligence, particularly Large Language Models, is impacting IT and security?
Which of the following best describes a key benefit of Software-Defined Networking (SDN)?
Which of the following is a common exploitation factor associated with serverless and container workloads?
ENISA: Which is not one of the five key legal issues common across all scenarios:
Which of the following items is NOT an example of Security as a Service (SecaaS)?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
Which cloud service model requires the customer to manage the operating system and applications?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?
Which of the following functionalities is provided by Data Security Posture Management (DSPM) tools?
What is the primary advantage of implementing Continuous Integration and Continuous Delivery/Deployment (CI/CD) pipelines in the context of cybersecurity?
How does SASE enhance traffic management when compared to traditional network models?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
Which plane in a network architecture is responsible for controlling all administrative actions?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
What is the primary function of Privileged Identity Management (PIM) and Privileged Access Management (PAM)?
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
How does artificial intelligence pose both opportunities and risks in cloud security?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
Which of the following is a common security issue associated with serverless computing environments?
What Identity and Access Management (IAM) process decides to permit or deny a subject access to system objects like networks, data, or applications?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
Which principle reduces security risk by granting users only the permissions essential for their role?
Which type of AI workload typically requires large data sets and substantial computing resources?
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
Select the statement below which best describes the relationship between identities and attributes
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?