What is the most effective way to identify security vulnerabilities in an application?
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
What is a key benefit of using customer-managed encryption keys with cloud key management service (KMS)?
What is known as the interface used to connect with the metastructure and configure the cloud environment?
Which aspects are most important for ensuring security in a hybrid cloud environment?
What is a primary objective during the Detection and Analysis phase of incident response?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
Which of the following cloud computing models primarily provides storage and computing resources to the users?
An important consideration when performing a remote vulnerability test of a cloud-based application is to
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
Which benefit of automated deployment pipelines most directly addresses continuous security and reliability?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
Which of the following is a common exploitation factor associated with serverless and container workloads?
Big data includes high volume, high variety, and high velocity.
Select the statement below which best describes the relationship between identities and attributes
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
What is a potential concern of using Security-as-a-Service (SecaaS)?
How can the use of third-party libraries introduce supply chain risks in software development?
What is the primary purpose of Cloud Infrastructure Entitlement Management (CIEM) in cloud environments?
Which two key capabilities are required for technology to be considered cloud computing?
Which of the following best describes how cloud computing manages shared resources?
Which concept provides the abstraction needed for resource pools?
In the cloud provider and consumer relationship, which entity
manages the virtual or abstracted infrastructure?
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
Which factors primarily drive organizations to adopt cloud computing solutions?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
Which of the following best describes the advantage of custom application level encryption?
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
How does cloud sprawl complicate security monitoring in an enterprise environment?
Which plane in a network architecture is responsible for controlling all administrative actions?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
Which cloud security model type provides generalized templates for helping implement cloud security?
Which statement best describes why it is important to know how data is being accessed?
Why is it important to control traffic flows between networks in a cybersecurity context?
Which of the following best describes compliance in the context of cybersecurity?
What is resource pooling?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
Why is consulting with stakeholders important for ensuring cloud security strategy alignment?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
In a cloud context, what does entitlement refer to in relation to a user's permissions?
What is the main purpose of multi-region resiliency in cloud environments?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
How does DevSecOps fundamentally differ from traditional DevOps in the development process?
Which attack surfaces, if any, does virtualization technology introduce?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
How does artificial intelligence pose both opportunities and risks in cloud security?
Without virtualization, there is no cloud.
What is one primary operational challenge associated with using cloud-agnostic container strategies?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
How should an SDLC be modified to address application security in a Cloud Computing environment?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
What is the primary function of a Load Balancer Service in a Software Defined Network (SDN) environment?
What is the primary goal of implementing DevOps in a software development lifecycle?
How does serverless computing impact infrastructure management responsibility?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
Which of the following best describes a key aspect of cloud risk management?
Which of the following best describes the role of program frameworks in defining security components and technical controls?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
In Identity and Access Management (IAM) containment, why is it crucial to understand if an attacker escalated their identity?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
Who is responsible for the security of the physical infrastructure and virtualization platform?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
Which of the following best describes the concept of Measured Service in cloud computing?
Which of the following best describes the purpose of cloud security control objectives?
Containers are highly portable code execution environments.
What are the primary security responsibilities of the cloud provider in compute virtualizations?
Which data security control is the LEAST likely to be assigned to an IaaS provider?
How does SASE enhance traffic management when compared to traditional network models?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
Which practice minimizes human error in long-running cloud workloads’ security management?
ENISA: A reason for risk concerns of a cloud provider being acquired is:
Which technique is most effective for preserving digital evidence in a cloud environment?