In the IaaS shared responsibility model, which responsibility typically falls on the Cloud Service Provider (CSP)?
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
Which of the following events should be monitored according to CIS AWS benchmarks?
In a cloud environment spanning multiple jurisdictions, what is the most important factor to consider for compliance?
Which of the following best describes compliance in the context of cybersecurity?
After an incident has been identified and classified, which activity is typically performed during the Containment, Eradication, and Recovery phase of incident response?
Which of the following best describes the primary purpose of cloud security frameworks?
In the context of FaaS, what is primarily defined in addition to functions?
In a cloud computing incident, what should be the initial focus of analysis due to the ephemeral nature of resources and centralized control mechanisms?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
Which of the following best describes a key aspect of cloud risk management?
What is true of companies considering a cloud computing business relationship?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
Which of the following best describes a risk associated with insecure interfaces and APIs?
What is the primary purpose of Identity and Access Management (IAM) systems in a cloud environment?
Which of the following is a common security issue associated with serverless computing environments?
How should an SDLC be modified to address application security in a Cloud Computing environment?
How can the use of third-party libraries introduce supply chain risks in software development?
Which of the following best describes the shared responsibility model in cloud security?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
In the context of cloud security, which approach prioritizes incoming data logsfor threat detection by applying multiple sequential filters?
What is one significant way Artificial Intelligence, particularly Large Language Models, is impacting IT and security?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
Your cloud and on-premises infrastructures should always use the same network address ranges.
Which cloud service model typically places the most security responsibilities on the cloud customer?
What is the primary advantage of implementing Continuous Integration and Continuous Delivery/Deployment (CI/CD) pipelines in the context of cybersecurity?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
Which best practice is recommended when securing object repositories in a cloud environment?
In volume storage, what method is often used to support resiliency and security?
Which benefit of automated deployment pipelines most directly addresses continuous security and reliability?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
Which of the following best describes the concept of AI as a Service (AIaaS)?
What is the primary benefit of Federated Identity Management in an enterprise environment?
Which of the following best describes the primary function of Cloud Detection and Response (CDR) in cybersecurity?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
What is the primary objective of posture management in a cloud environment?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
When designing an encryption system, you should start with a threat model.
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Which of the following best describes the primary purpose of image factories in the context of virtual machine (VM) management?
What method can be utilized along with data fragmentation to enhance security?
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Why is it important to plan and coordinate response activities for incidents affecting the Cloud Service Provider (CSP)?
What are the key outcomes of implementing robust cloud risk management practices?
Select the statement below which best describes the relationship between identities and attributes
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
Why is it important for Cloud Service Providers (CSPs) to document security controls?
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
In the cloud provider and consumer relationship, which entity
manages the virtual or abstracted infrastructure?
Who is responsible for the security of the physical infrastructure and virtualization platform?
How does DevSecOps fundamentally differ from traditional DevOps in the development process?
Which of the following is a primary benefit of using Infrastructure as Code (IaC) in a security context?
What is the primary goal of implementing DevOps in a software development lifecycle?
Why is snapshot management crucial for the virtual machine (VM) lifecycle?
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
What does Zero Trust Network Access (ZTNA) primarily use to control access to applications?
Which of the following best describes a primary risk associated with the use of cloud storage services?
How does artificial intelligence pose both opportunities and risks in cloud security?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
Which plane in a network architecture is responsible for controlling all administrative actions?
What are the essential characteristics of cloud computing as defined by the NIST model?
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?
In preparing for cloud incident response, why is updating forensics tools for virtual machines (VMs) and containers critical?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
Which of the following is a common risk factor related to misconfiguration and inadequate change control in cybersecurity?
What is a commonly used method by which hybrid cloud integrates data centers with public cloud?
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
Why is it essential to embed cloud decisions within organizational governance?
Which data security control is the LEAST likely to be assigned to an IaaS provider?