What is a key advantage of using Infrastructure as Code (IaC) in application development?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
What is the primary function of a Load Balancer Service in a Software Defined Network (SDN) environment?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
Which of the following best describes the advantage of custom application level encryption?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
What is an essential security characteristic required when using multi-tenanttechnologies?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
In the context of cloud workload security, which feature directly contributes to enhanced performance and resource utilization without incurring excess costs?
What is the most significant security difference between traditional infrastructure and cloud computing?
Which of the following best describes the concept of Measured Service in cloud computing?
What is the most effective way to identify security vulnerabilities in an application?
Which of the following is a primary benefit of using Infrastructure as Code (IaC) in a security context?
Which two key capabilities are required for technology to be considered cloud computing?
How does artificial intelligence pose both opportunities and risks in cloud security?
What is the primary function of Privileged Identity Management (PIM) and Privileged Access Management (PAM)?
Which of the following is the MOST common cause of cloud-native security breaches?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
What tool allows teams to easily locate and integrate with approved cloud services?
What primary purpose does object storage encryption serve in cloud services?
In the initial stage of implementing centralized identity management, what is the primary focus of cybersecurity measures?
Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?
Which of the following statements best reflects the responsibility of organizations regarding cloud security and data ownership?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
In preparing for cloud incident response, why is it crucial to establish a cloud deployment registry?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
In the context of IaaS, what are the primary components included in infrastructure?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
When implementing a Zero Trust (ZT) strategy, which approach is considered fundamental for ensuring enterprise security and connectivity?
Which statement best describes why it is important to know how data is being accessed?
Which of the following is a common security issue associated with serverless computing environments?
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
Which tool is most effective for ensuring compliance and identifying misconfigurations in cloud management planes?
Which plane in a network architecture is responsible for controlling all administrative actions?
What of the following is NOT an essential characteristic of cloud computing?
Which type of cloud workload would be most appropriate for running isolated applications with minimum resource overhead?
What technology is commonly used to establish an encrypted tunnel between a remote user's device and a private network over the public Internet?
Which of the following best describes a key benefit of Software-Defined Networking (SDN)?
Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
In volume storage, what method is often used to support resiliency and security?
Which of the following is a common exploitation factor associated with serverless and container workloads?
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
How does Infrastructure as Code (IaC) facilitate rapid recovery in cybersecurity?
What is known as the interface used to connect with the metastructure and configure the cloud environment?
Which cloud security model type provides generalized templates for helping implement cloud security?
Which of the following best describes the shift-left approach in software development?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
What are the essential characteristics of cloud computing as defined by the NIST model?
Which of the following best describes an aspect of PaaS services in relation to network security controls within a cloud environment?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
What is a primary objective during the Detection and Analysis phase of incident response?
Which factors primarily drive organizations to adopt cloud computing solutions?
What is a primary benefit of using Identity and Access Management (IAM) roles/identities provided by cloud providers instead of static secrets?
Which of the following best describes the primary function of Cloud Detection and Response (CDR) in cybersecurity?
Why is a service type of network typically isolated on different hardware?
Which best practice is recommended when securing object repositories in a cloud environment?
Which of the following best describes the purpose of cloud security control objectives?
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
What are the most important practices for reducing vulnerabilities in virtual machines (VMs) in a cloud environment?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
Which type of security tool is essential for enforcing controls in a cloud environment to protect endpoints?
What is a key characteristic of serverless functions in terms of execution environment?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
Which of the following best describes compliance in the context of cybersecurity?
In a cloud computing incident, what should be the initial focus of analysis due to the ephemeral nature of resources and centralized control mechanisms?
When leveraging a cloud provider, what should be considered to ensure application security requirements are met?
Which of the following best describes the role of program frameworks in defining security components and technical controls?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
What is a common characteristic of default encryption provided by cloud providers for data at rest?