Which practice minimizes human error in long-running cloud workloads’ security management?
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
Which cloud service model requires the customer to manage the operating system and applications?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
Which aspect of assessing cloud providers poses the most significant challenge?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
What is known as the interface used to connect with the metastructure and configure the cloud environment?
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?
Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
How does cloud adoption impact incident response processes in cybersecurity?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
Which of the following best describes the role of program frameworks in defining security components and technical controls?
What's the best way for organizations to establish a foundation for safeguarding data, upholding privacy, and meeting regulatory requirements in cloud applications?
Which of the following is a primary purpose of establishing cloud risk registries?
When implementing a Zero Trust (ZT) strategy, which approach is considered fundamental for ensuring enterprise security and connectivity?
Your cloud and on-premises infrastructures should always use the same network address ranges.
What of the following is NOT an essential characteristic of cloud computing?
Select the statement below which best describes the relationship between identities and attributes
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
Which practice ensures container security by preventing post-deployment modifications?
Which of the following best describes the advantage of custom application level encryption?
How does serverless computing impact infrastructure management responsibility?
Which of the following statements best reflects the responsibility of organizations regarding cloud security and data ownership?
What are the essential characteristics of cloud computing as defined by the NIST model?
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
Which of the following best describes the multi-tenant nature of cloud computing?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
Which of the following is a common exploitation factor associated with serverless and container workloads?
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
Which term describes any situation where the cloud consumer does
not manage any of the underlying hardware or virtual machines?
What item below allows disparate directory services and independent security domains to be interconnected?
Which of the following best describes a primary risk associated with the use of cloud storage services?
In volume storage, what method is often used to support resiliency and security?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
What key characteristic differentiates cloud networks from traditional networks?
Which factors primarily drive organizations to adopt cloud computing solutions?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
What is the primary goal of implementing DevOps in a software development lifecycle?
Which data security control is the LEAST likely to be assigned to an IaaS provider?
What tool allows teams to easily locate and integrate with approved cloud services?
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
Which of the following best describes a benefit of using VPNs for cloud connectivity?
In Identity and Access Management (IAM) containment, why is it crucial to understand if an attacker escalated their identity?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
In a cloud environment spanning multiple jurisdictions, what is the most important factor to consider for compliance?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
Which of the following best describes the purpose of cloud security control objectives?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
What is the primary function of landing zones or account factories in cloud environments?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
Which term describes the practice in cloud compliance where a customer acquires a set of pre-approved regulatory or standards-based controls from a compliant provider?
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Which of the following best describes the concept of AI as a Service (AIaaS)?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
What is the primary benefit of Federated Identity Management in an enterprise environment?
Which of the following best describes how cloud computing manages shared resources?
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
In federated identity management, what role does the identity provider (IdP) play in relation to the relying party?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
How does network segmentation primarily contribute to limiting the impact of a security breach?
What Identity and Access Management (IAM) process decides to permit or deny a subject access to system objects like networks, data, or applications?
Which type of AI workload typically requires large data sets and substantial computing resources?