ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
What of the following is NOT an essential characteristic of cloud computing?
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
What are the encryption options available for SaaS consumers?
All assets require the same continuity in the cloud.
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
What is true of searching data across cloud environments?
Which of the following statements best describes an identity
federation?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
What is resource pooling?
What is the most significant security difference between traditional infrastructure and cloud computing?
Without virtualization, there is no cloud.
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
ENISA: “VM hopping” is:
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Which statement best describes the Data Security Lifecycle?
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
What is a core tenant of risk management?
What is a key component of governance in the context of cybersecurity?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?
What is the most effective way to identify security vulnerabilities in an application?
Which technique involves assessing potential threats through analyzing attacker capabilities, motivations, and potential targets?
Which of the following cloud computing models primarily provides storage and computing resources to the users?
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?
What is the primary function of landing zones or account factories in cloud environments?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
In the context of cloud workload security, which feature directly contributes to enhanced performance and resource utilization without incurring excess costs?
What key characteristic differentiates cloud networks from traditional networks?
What is the primary function of Privileged Identity Management (PIM) and Privileged Access Management (PAM)?
Which practice minimizes human error in long-running cloud workloads’ security management?
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
Which technique is most effective for preserving digital evidence in a cloud environment?
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
In preparing for cloud incident response, why is it crucial to establish a cloud deployment registry?
Which of the following best describes a key aspect of cloud risk management?
What is critical for securing serverless computing models in the cloud?
Which of the following best describes an aspect of PaaS services in relation to network security controls within a cloud environment?
What is the main purpose of multi-region resiliency in cloud environments?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
Which of the following best describes the concept of AI as a Service (AIaaS)?
When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
What's the difference between DNS Logs and Flow Logs?
Which of the following best describes the primary purpose of cloud security frameworks?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
Which practice ensures container security by preventing post-deployment modifications?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
What is a key consideration when implementing AI workloads to ensure they adhere to security best practices?
What is the primary goal of implementing DevOps in a software development lifecycle?
What primary purpose does object storage encryption serve in cloud services?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
What is an advantage of using Kubernetes for container orchestration?
Which of the following best describes compliance in the context of cybersecurity?
What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
Which principle reduces security risk by granting users only the permissions essential for their role?
Why is snapshot management crucial for the virtual machine (VM) lifecycle?
How does cloud sprawl complicate security monitoring in an enterprise environment?
Which of the following is the MOST common cause of cloud-native security breaches?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
According to NIST, what is cloud computing defined as?
What is the primary purpose of secrets management in cloud environments?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
Which of the following best describes how cloud computing manages shared resources?
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?