In which service model would the cloud service provider bear the greatest responsibility for security?
An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?
What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?
A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?
Which type of disaster recovery plan (DRP) test requires the whole organization to participate in a scheduled disaster scenario without performing all of the actual tasks?
An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?
Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?
Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?
Which security threat occurs when authorized users increase their level of access in an unauthorized manner?
Which general body of law covers data breach violations in a cloud environment at a federal agency?
Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?
Which management process involves multiple key holders, each with access to a portion of the information?
An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?
Which process is implemented during the hardening of an operating system (OS) and its workloads?
Which means of access management is used to determine whether someone is a legitimate user?
Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?
During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?
A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?
Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?
Which requirement in the Gramm-Leach-Bliley Act (GLBA) is included to protect private data?
Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?
Which key management option typically needs to be on-premises and delivers the keys to the cloud over a dedicated connection?
What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?
Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?
Which business continuity and disaster recovery consideration should be part of a cloud application architecture?
Which logical consideration should be addressed when planning the design of a data center?
What is a core goal of operating system (OS) baseline compliance and monitoring?
A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?
Which level of compliance is required by a cloud service provider to protect customer data at banks and insurance companies?
Which data source provides auditability and traceability for event investigation as well as documentation?
Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
Which legal framework is concerned with the privacy of data of EU/EEA citizens?
Which cloud computing role can subscribe to a software as a service (SaaS) application?
An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
Which service model requires the most consumer responsibility for security issues?
Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?
Which model does the Cloud Security Alliance (CSA) use as its standard for defining cloud computing?
Why must the software agent management plane of the workload security control support auto-scaling and elasticity?
Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?
A network administrator is concerned about the loss of physical control when moving data to the cloud. Which countermeasure should be implemented to avoid this threat?
An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?
Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?
Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?
An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?
Which description accurately characterizes the movement of applications to the cloud?
Which item must be examined in detail when evaluating the risks associated with a new software as a service (SaaS) solution?
An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?
Which cloud computing characteristic allows consumers to expand or contract required resources automatically?
A security analyst is tasked with compiling a report of all people who used a system between two dates. The thorough report must include information about how long and how often the system was used. Which information should the analyst ensure is in the report?