Which type of AI workload typically requires large data sets and substantial computing resources?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
What is the primary function of landing zones or account factories in cloud environments?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
Which technique involves assessing potential threats through analyzing attacker capabilities, motivations, and potential targets?
ENISA: Which is not one of the five key legal issues common across all scenarios:
What is the primary advantage of implementing Continuous Integration and Continuous Delivery/Deployment (CI/CD) pipelines in the context of cybersecurity?
Which two key capabilities are required for technology to be considered cloud computing?
Which of the following is a primary purpose of establishing cloud risk registries?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?
What is a primary benefit of implementing micro-segmentation within a Zero Trust Architecture?
How does SASE enhance traffic management when compared to traditional network models?
What is a primary objective during the Detection and Analysis phase of incident response?
Which of the following is a common exploitation factor associated with serverless and container workloads?
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
Which statement best describes why it is important to know how data is being accessed?
What is the most significant security difference between traditional infrastructure and cloud computing?
What is a primary benefit of implementing Zero Trust (ZT) architecture in cloud environments?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
How can the use of third-party libraries introduce supply chain risks in software development?
Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
In volume storage, what method is often used to support resiliency and security?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
Which best practice is recommended when securing object repositories in a cloud environment?
Which of the following best describes the shift-left approach in software development?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
Why is identity management at the organization level considered a key aspect in cybersecurity?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
What item below allows disparate directory services and independent security domains to be interconnected?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
What tool allows teams to easily locate and integrate with approved cloud services?
Which of the following best describes an aspect of PaaS services in relation to network security controls within a cloud environment?
How does DevSecOps fundamentally differ from traditional DevOps in the development process?
What is an essential security characteristic required when using multi-tenanttechnologies?
What are the most important practices for reducing vulnerabilities in virtual machines (VMs) in a cloud environment?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
What does Zero Trust Network Access (ZTNA) primarily use to control access to applications?
Which of the following is a primary benefit of using Infrastructure as Code (IaC) in a security context?
Which of the following best describes a risk associated with insecure interfaces and APIs?
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
How does running applications on distinct virtual networks and only connecting networks as needed help?
Which resilience tool helps distribute network or application traffic across multiple servers to ensure reliability and availability?
Which of the following best describes compliance in the context of cybersecurity?
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
In the context of cloud security, which approach prioritizes incoming data logsfor threat detection by applying multiple sequential filters?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
Which cloud service model typically places the most security responsibilities on the cloud customer?
Which of the following best describes the responsibility for security in a cloud environment?
Which tool is most effective for ensuring compliance and identifying misconfigurations in cloud management planes?
Which of the following best describes the advantage of custom application level encryption?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
Which of the following best describes a benefit of using VPNs for cloud connectivity?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
Which of the following items is NOT an example of Security as a Service (SecaaS)?