What primary aspects should effective cloud governance address to ensure security and compliance?
What does Zero Trust Network Access (ZTNA) primarily use to control access to applications?
Which type of AI workload typically requires large data sets and substantial computing resources?
What is the primary benefit of Federated Identity Management in an enterprise environment?
Which cloud security model type provides generalized templates for helping implement cloud security?
What is a primary benefit of using Identity and Access Management (IAM) roles/identities provided by cloud providers instead of static secrets?
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
Which of the following best describes the role of program frameworks in defining security components and technical controls?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Which concept provides the abstraction needed for resource pools?
All cloud services utilize virtualization technologies.
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
In a cloud environment spanning multiple jurisdictions, what is the most important factor to consider for compliance?
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
What is a cloud workload in terms of infrastructure and platform deployment?
What are the key outcomes of implementing robust cloud risk management practices?
What is an essential security characteristic required when using multi-tenanttechnologies?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
What is an advantage of using Kubernetes for container orchestration?
Why is it important to capture and centralize workload logs promptly in a cybersecurity environment?
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
Which aspect of assessing cloud providers poses the most significant challenge?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
Which cloud service model requires the customer to manage the operating system and applications?
Which of the following is a common exploitation factor associated with serverless and container workloads?
A cloud deployment of two or more unique clouds is known as:
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
What is a commonly used method by which hybrid cloud integrates data centers with public cloud?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
What is the most significant security difference between traditional infrastructure and cloud computing?
Which method is considered best practice for creating secure virtual machine (VM) images?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
In volume storage, what method is often used to support resiliency and security?
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
Use elastic servers when possible and move workloads to new instances.
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
What is the primary goal of implementing DevOps in a software development lifecycle?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?
Which statement best describes the impact of Cloud Computing on business continuity management?
Why is snapshot management crucial for the virtual machine (VM) lifecycle?
Which opportunity helps reduce common application security issues?
Which approach creates a secure network, invisible to unauthorized users?
How does centralized logging simplify security monitoring and compliance?
Which of the following best describes the shared responsibility model in cloud security?
Which AI workload mitigation strategy best addresses model inversion attacks that threaten data confidentiality?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
Which strategy is critical for securing containers at the image creation stage?
Which of the following best describes a key aspect of cloud risk management?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
What is an important step in conducting forensics on containerized and serverless environments?
Network logs from cloud providers are typically flow records, not full packet captures.
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Without virtualization, there is no cloud.
According to NIST, what is cloud computing defined as?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
What is the purpose of the "Principle of Least Privilege" in Identity and Access Management (IAM)?
What is true of searching data across cloud environments?
Which of the following best describes the responsibility for security in a cloud environment?
Which of the following is a primary purpose of establishing cloud risk registries?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
Select the best definition of “compliance” from the options below.
What is the primary purpose of cloud governance in an organization?
Why is it important to plan and coordinate response activities for incidents affecting the Cloud Service Provider (CSP)?
What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
Which of the following best describes a primary focus of cloud governance with an emphasis on security?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
What's the best way for organizations to establish a foundation for safeguarding data, upholding privacy, and meeting regulatory requirements in cloud applications?
Which tool is most effective for ensuring compliance and identifying misconfigurations in cloud management planes?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
How should an SDLC be modified to address application security in a Cloud Computing environment?
Why is it essential to embed cloud decisions within organizational governance?
In federated identity management, what role does the identity provider (IdP) play in relation to the relying party?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
What is a key consideration when implementing AI workloads to ensure they adhere to security best practices?
What does it mean if the system or environment is built automatically from a template?
ENISA: A reason for risk concerns of a cloud provider being acquired is:
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
What is the primary function of a Load Balancer Service in a Software Defined Network (SDN) environment?
Which statement best describes the Data Security Lifecycle?
How does cloud sprawl complicate security monitoring in an enterprise environment?
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
Which of the following best describes the concept of Measured Service in cloud computing?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
In a cloud context, what does entitlement refer to in relation to a user's permissions?
What's the difference between DNS Logs and Flow Logs?
What is the main purpose of multi-region resiliency in cloud environments?