In which cloud service model is the cloud consumer responsible for installation and maintenance of the operating system?
An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?
Which phase of the cloud data life cycle involves the process of crypto-shredding?
Which phase in secure application design and development includes threat modeling?
Which phase of the cloud data lifecycle implements the file, block, or object type of cloud architecture?
Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?
An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?
Which security issue can be found only through dynamic application security testing (DAST)?
Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?
During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?
Which strategy will reduce the impact of risk in the business continuity and disaster recovery planning process?
An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?
Which key cloud computing technology meters what is provided and ensures consumers only use what is allotted?
Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?
A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?
Which term describes data elements that, when combined with other information, are used to single out an individual?
Which U.S. standard is used by federal government agencies to manage enterprise risk?
Which cloud computing service model allows customers to run their own application code without configuring the server environment?
Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?
Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?
Which means of access management is used to determine whether someone is a legitimate user?
In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?
Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?
Which logical consideration should be addressed when planning the design of a data center?
As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?
Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?
A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?
Which type of service allows an organization to maximize control of its information?
Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?
Which countermeasure should be taken during the preparation phase of the incident response lifecycle?
What is the definition of transportable as it relates to cloud contract design requirements?
An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?
A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?
Which security testing method requires compliance with the cloud service provider’s terms of service?
Which cloud computing characteristic allows consumers to expand or contract required resources automatically?
Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?
Which business continuity and disaster recovery consideration should be part of a cloud application architecture?
An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?
Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?
Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?
Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?
An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?
Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?
An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?
An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?
Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?
Which steps should an organization take to avoid risk when dealing with software licensing?
A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?
Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?