An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?
An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?
Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?
An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?
Which aspect of strong authentication is part of enterprise risk management?
Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?
Which action should be taken to ensure that unencrypted network traffic is protected?
Which jurisdictional protection factor should be known if personally identifiable information (PII) is to be stored in the cloud?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
Which factor should be the basis of a business continuity plan?
A breach caused by lack of security management resulted in a civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight. Who should be contacted?
Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?
A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?
Which service model requires the most consumer responsibility for security issues?
Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?
An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?
A network administrator is concerned about the loss of physical control when moving data to the cloud. Which countermeasure should be implemented to avoid this threat?
In which service model would the cloud service provider bear the greatest responsibility for security?
Which security testing method requires compliance with the cloud service provider’s terms of service?
Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?
Which security control is a countermeasure against vendor lock-in and lock-out?
Which strategy will reduce the impact of risk in the business continuity and disaster recovery planning process?
Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?
Which document, commonly existing in an IT enterprise, can be used to speed up the process of identifying a potential cloud service provider (CSP)?
Which requirement in the Gramm-Leach-Bliley Act (GLBA) is included to protect private data?
Which regulation provides a guide for implementing the risk management framework?
Which cloud storage architecture enhances the opportunity for data policy enforcement such as data loss prevention (DLP)?
Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?
As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?
Which security control could be implemented as part of a layered physical defense at a cloud hosting site?
Which security strategy is associated with data rights management solutions?
Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?
An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?
Which level of compliance is required by a cloud service provider to protect customer data at banks and insurance companies?
An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?
How does a cloud-based distributed denial-of-service (DDoS) protection strategy help in the event of an attack?
A security analyst is tasked with compiling a report of all people who used a system between two dates. The thorough report must include information about how long and how often the system was used. Which information should the analyst ensure is in the report?
An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?
Which risk relates to the removal of a person’s information within the public cloud by legal authorities?
Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?
Which general body of law covers data breach violations in a cloud environment at a federal agency?
Which concept focuses on operating highly available workloads in the cloud?
What is the process of identifying and procuring stored data as evidence for legal purposes?
Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?
A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?
Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?
Which process is implemented during the hardening of an operating system (OS) and its workloads?
Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?
Which security risk is co-owned by the enterprise team and the cloud provider in the software as a service (SaaS) model?
Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?
Which data source provides auditability and traceability for event investigation as well as documentation?
Which tier from Uptime Institute's Data Center Site Infrastructure Tier Standards is considered to be the most secure, reliable, and redundant in design and operational elements?
An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?
An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?
Which cloud storage design is based on a hierarchical system?
Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?
Which phase in secure application design and development includes threat modeling?