What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
Which resilience tool helps distribute network or application traffic across multiple servers to ensure reliability and availability?
What is the primary function of landing zones or account factories in cloud environments?
In a cloud context, what does entitlement refer to in relation to a user's permissions?
In federated identity management, what role does the identity provider (IdP) play in relation to the relying party?
When establishing a cloud incident response program, what access do responders need to effectively analyze incidents?
Which cloud service model typically places the most security responsibilities on the cloud customer?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
Which plane in a network architecture is responsible for controlling all administrative actions?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
Which of the following best describes how cloud computing manages shared resources?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
Why is consulting with stakeholders important for ensuring cloud security strategy alignment?
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
Which of the following best describes the shared responsibility model in cloud security?
Which of the following best describes compliance in the context of cybersecurity?
What is a primary benefit of implementing Zero Trust (ZT) architecture in cloud environments?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
In the IaaS shared responsibility model, which responsibility typically falls on the Cloud Service Provider (CSP)?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
Which aspect of assessing cloud providers poses the most significant challenge?
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
In preparing for cloud incident response, why is updating forensics tools for virtual machines (VMs) and containers critical?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?
Which of the following information security policies defines the use of an organization's IT resources?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
What key activities are part of the preparation phase in incident response planning?
In FaaS, what is the primary security concern with using third-party services/APIs?
Which of the following best describes the multi-tenant nature of cloud computing?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
In the context of cloud workload security, which feature directly contributes to enhanced performance and resource utilization without incurring excess costs?
Which factors primarily drive organizations to adopt cloud computing solutions?
ENISA: Which is not one of the five key legal issues common across all scenarios:
What is a primary objective during the Detection and Analysis phase of incident response?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
In the initial stage of implementing centralized identity management, what is the primary focus of cybersecurity measures?
In volume storage, what method is often used to support resiliency and security?
How does running applications on distinct virtual networks and only connecting networks as needed help?
Which of the following best describes the concept of Measured Service in cloud computing?
When implementing a Zero Trust (ZT) strategy, which approach is considered fundamental for ensuring enterprise security and connectivity?
Which of the following cloud computing models primarily provides storage and computing resources to the users?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
Which of the following best describes an authoritative source in the context of identity management?
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
What is the primary purpose of Identity and Access Management (IAM) systems in a cloud environment?
What is the most effective way to identify security vulnerabilities in an application?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
Which two key capabilities are required for technology to be considered cloud computing?
How does SASE enhance traffic management when compared to traditional network models?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
What is a primary benefit of consolidating traffic through a central bastion/transit network in a hybrid cloud environment?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
What are the key outcomes of implementing robust cloud risk management practices?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
Which of the following best describes the primary purpose of cloud security frameworks?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
Which Identity and Access Management (IAM) principle focuses on implementing multiple security layers to dilute access power, thereby averting a misuse or compromise?
Which type of security tool is essential for enforcing controls in a cloud environment to protect endpoints?
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
What is a key consideration when implementing AI workloads to ensure they adhere to security best practices?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
What is a primary benefit of implementing micro-segmentation within a Zero Trust Architecture?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?