Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
What is a key consideration when implementing AI workloads to ensure they adhere to security best practices?
What is the primary purpose of Identity and Access Management (IAM) systems in a cloud environment?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?
What primary aspects should effective cloud governance address to ensure security and compliance?
What are the essential characteristics of cloud computing as defined by the NIST model?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
What tool allows teams to easily locate and integrate with approved cloud services?
Which factors primarily drive organizations to adopt cloud computing solutions?
In a cloud context, what does entitlement refer to in relation to a user's permissions?
Which of the following best describes the concept of Measured Service in cloud computing?
In the context of cloud workload security, which feature directly contributes to enhanced performance and resource utilization without incurring excess costs?
What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
Which of the following is the MOST common cause of cloud-native security breaches?
Which plane in a network architecture is responsible for controlling all administrative actions?
Which of the following best describes the shift-left approach in software development?
Which cloud service model typically places the most security responsibilities on the cloud customer?
What Identity and Access Management (IAM) process decides to permit or deny a subject access to system objects like networks, data, or applications?
Which of the following best describes the responsibility for security in a cloud environment?
Which strategic approach is most appropriate for managing a multi-cloud environment that includes multiple IaaS and PaaS providers?
What key characteristic differentiates cloud networks from traditional networks?
Which technique involves assessing potential threats through analyzing attacker capabilities, motivations, and potential targets?
What is the most effective way to identify security vulnerabilities in an application?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
What is an essential security characteristic required when using multi-tenant technologies?
What is a primary objective during the Detection and Analysis phase of incident response?
Which of the following best describes a benefit of using VPNs for cloud connectivity?
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
Which of the following best describes compliance in the context of cybersecurity?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
Which practice ensures container security by preventing post-deployment modifications?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
In volume storage, what method is often used to support resiliency and security?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
What is the most significant security difference between traditional infrastructure and cloud computing?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
What item below allows disparate directory services and independent security domains to be interconnected?
In the initial stage of implementing centralized identity management, what is the primary focus of cybersecurity measures?
In Identity and Access Management (IAM) containment, why is it crucial to understand if an attacker escalated their identity?
What is known as the interface used to connect with the metastructure and configure the cloud environment?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Select the statement below which best describes the relationship between identities and attributes
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
Which of the following items is NOT an example of Security as a Service (SecaaS)?
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?