Which cloud computing characteristic allows consumers to expand or contract required resources automatically?
Which activity is within the scope of the cloud provider’s role in the chain of custody?
Which action should be taken to ensure that unencrypted network traffic is protected?
Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?
Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?
Which strategy provides the highest overall cost savings for an organization implementing a business continuity and disaster recovery (BCDR) plan?
A company has determined that encryption has too much overhead to work with their system and has identified tokenization as an alternative. During this process, the tokenization server generates the token. Which step should occur immediately after this action?
Which privacy issue does the Clarifying Lawful Overseas Use of Data (CLOUD) Act address?
Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?
Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?
Which phase of the cloud data life cycle involves the process of crypto-shredding?
Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?
Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?
An organization is undergoing an ISO 27001 audit that includes a software as a service (SaaS) solution within scope, and the auditor has requested evidence of controls. What evidence should the organization provide the auditor?
Which countermeasure should be taken during the containment, eradication, and recovery phase of the incident response lifecycle?
An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?
Which cloud storage architecture enhances the opportunity for data policy enforcement such as data loss prevention (DLP)?
Which phase of the cloud data lifecycle implements the file, block, or object type of cloud architecture?
Which phase in secure application design and development includes threat modeling?
Under which jurisdiction do General Data Protection Regulation (GDPR) guidelines apply?
An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?
What is the first phase of identity management that is used to assert the identity of the user?
Which type of regulation governs credit card transactions as a part of cloud operations?
Which group should be notified for approval when a planned modification to an environment is scheduled?
Which countermeasure should be taken during the preparation phase of the incident response lifecycle?
Which aspect of access management safeguards data by determining the user's rights to a certain resource?
Why must the software agent management plane of the workload security control support auto-scaling and elasticity?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?
Which risk relates to the removal of a person’s information within the public cloud by legal authorities?
Which item should be used by a consumer to determine whether a cloud service provider is in regulatory or legal compliance?
A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?
A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?
The designers of a proposed data center are evaluating the requirements to use virtualization for the services it provides. Which type of design consideration is being addressed?
Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?
A company is interested in tokenization as an alternative to protecting data without encryption. The application will soon store the token. Which step should occur immediately before this action?
Which action should be taken to preserve forensic evidence for collection?
Which security information and event management concept focuses on account and service hijacking issues?
Which data source provides auditability and traceability for event investigation as well as documentation?
An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?
A security analyst is tasked with compiling a report of all people who used a system between two dates. The thorough report must include information about how long and how often the system was used. Which information should the analyst ensure is in the report?
Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?
Which business continuity and disaster recovery consideration should be part of a cloud application architecture?
A cloud consumer is scheduling a vulnerability assessment of a cloud service procured through a cloud broker. Who should the cloud consumer notify before beginning the assessment?
Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?
Which security threat occurs when authorized users increase their level of access in an unauthorized manner?
Which U.S. standard is used by federal government agencies to manage enterprise risk?
Which cloud risk is associated with the supply chain due to dependency on legacy internal servers for application delivery to end users?
Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?
Which cloud model allows an on-premises data center to use cloud bursting?
An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?
Which risk is unable to be highlighted from the outset in a cloud services contract?
Which legal framework is concerned with the privacy of data of EU/EEA citizens?
As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?
Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?