Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
In the context of cloud workload security, which feature directly contributes to enhanced performance and resource utilization without incurring excess costs?
Which principle reduces security risk by granting users only the permissions essential for their role?
What is true of companies considering a cloud computing business relationship?
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
When implementing a Zero Trust (ZT) strategy, which approach is considered fundamental for ensuring enterprise security and connectivity?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
What technology is commonly used to establish an encrypted tunnel between a remote user's device and a private network over the public Internet?
How can the use of third-party libraries introduce supply chain risks in software development?
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
What is the most effective way to identify security vulnerabilities in an application?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
Which of the following best describes the primary purpose of cloud security frameworks?
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
What is the primary objective of posture management in a cloud environment?
What is a primary benefit of implementing Zero Trust (ZT) architecture in cloud environments?
Which of the following is the MOST common cause of cloud-native security breaches?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
An important consideration when performing a remote vulnerability test of a cloud-based application is to
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
In the shared security model, how does the allocation of responsibility vary by service?
How does running applications on distinct virtual networks and only connecting networks as needed help?
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
What is the primary function of Privileged Identity Management (PIM) and Privileged Access Management (PAM)?
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
What is the primary purpose of Cloud Infrastructure Entitlement Management (CIEM) in cloud environments?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
What are the essential characteristics of cloud computing as defined by the NIST model?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
Which of the following is a common security issue associated with serverless computing environments?
What is a primary benefit of using Identity and Access Management (IAM) roles/identities provided by cloud providers instead of static secrets?
Which of the following cloud computing models primarily provides storage and computing resources to the users?
CCM: A hypothetical company called: “Health4Sure†is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
Which strategic approach is most appropriate for managing a multi-cloud environment that includes multiple IaaS and PaaS providers?
Which strategy is critical for securing containers at the image creation stage?
Which of the following best describes compliance in the context of cybersecurity?
An organization deploys an AI application for fraud detection. Which threat is MOST likely to affect its AI model’s accuracy?
What is a primary benefit of consolidating traffic through a central bastion/transit network in a hybrid cloud environment?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
Which of the following best describes the multi-tenant nature of cloud computing?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
What is a key characteristic of serverless functions in terms of execution environment?
After an incident has been identified and classified, which activity is typically performed during the Containment, Eradication, and Recovery phase of incident response?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
Which practice minimizes human error in long-running cloud workloads’ security management?
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
Which of the following best describes a risk associated with insecure interfaces and APIs?
Which of the following best describes a primary risk associated with the use of cloud storage services?
In the Software-as-a-service relationship, who is responsible for the majority of the security?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
What method can be utilized along with data fragmentation to enhance security?
Which term describes the practice in cloud compliance where a customer acquires a set of pre-approved regulatory or standards-based controls from a compliant provider?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?
Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?
What is a key advantage of using Infrastructure as Code (IaC) in application development?
What does it mean if the system or environment is built automatically from a template?
How does serverless computing impact infrastructure management responsibility?
Which of the following best describes the primary purpose of image factories in the context of virtual machine (VM) management?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
What is the most significant security difference between traditional infrastructure and cloud computing?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
Which of the following best describes how cloud computing manages shared resources?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
Which benefit of automated deployment pipelines most directly addresses continuous security and reliability?
Which type of cloud workload would be most appropriate for running isolated applications with minimum resource overhead?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?