What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
Which of the following is the MOST common cause of cloud-native security breaches?
How does network segmentation primarily contribute to limiting the impact of a security breach?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
How does serverless computing impact infrastructure management responsibility?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
Which factors primarily drive organizations to adopt cloud computing solutions?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
Which practice ensures container security by preventing post-deployment modifications?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
The containment phase of the incident response lifecycle requires taking systems offline.
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
What are the primary security responsibilities of the cloud provider in compute virtualizations?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
How should an SDLC be modified to address application security in a Cloud Computing environment?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
What item below allows disparate directory services and independent security domains to be interconnected?
When designing an encryption system, you should start with a threat model.
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
What method can be utilized along with data fragmentation to enhance security?
Your cloud and on-premises infrastructures should always use the same network address ranges.
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
ENISA: Which is not one of the five key legal issues common across all scenarios:
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
Which data security control is the LEAST likely to be assigned to an IaaS provider?
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?