Use elastic servers when possible and move workloads to new instances.
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
Network logs from cloud providers are typically flow records, not full packet captures.
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
Which opportunity helps reduce common application security issues?
Which data security control is the LEAST likely to be assigned to an IaaS provider?
What is true of security as it relates to cloud network infrastructure?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
What is known as the interface used to connect with the metastructure and configure the cloud environment?
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Which concept provides the abstraction needed for resource pools?
When designing an encryption system, you should start with a threat model.
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
ENISA: A reason for risk concerns of a cloud provider being acquired is:
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
How can web security as a service be deployed for a cloud consumer?
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
What is an advantage of using Kubernetes for container orchestration?
Which best practice is recommended when securing object repositories in a cloud environment?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
Why is snapshot management crucial for the virtual machine (VM) lifecycle?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Which of the following is a common security issue associated with serverless computing environments?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
Which approach creates a secure network, invisible to unauthorized users?
According to NIST, what is cloud computing defined as?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
What is the primary purpose of secrets management in cloud environments?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
What is the primary goal of implementing DevOps in a software development lifecycle?
Which factors primarily drive organizations to adopt cloud computing solutions?
Which areas should be initially prioritized for hybrid cloud security?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
How does centralized logging simplify security monitoring and compliance?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
Which principle reduces security risk by granting users only the permissions essential for their role?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
What's the difference between DNS Logs and Flow Logs?
Which of the following best describes how cloud computing manages shared resources?
How does network segmentation primarily contribute to limiting the impact of a security breach?