How does cloud sprawl complicate security monitoring in an enterprise environment?
Which of the following is the MOST common cause of cloud-native security breaches?
Which of the following best describes the responsibility for security in a cloud environment?
What is the primary goal of implementing DevOps in a software development lifecycle?
Which principle reduces security risk by granting users only the permissions essential for their role?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
How does centralized logging simplify security monitoring and compliance?
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
Which practice ensures container security by preventing post-deployment modifications?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
In the shared security model, how does the allocation of responsibility vary by service?
What is the primary purpose of cloud governance in an organization?
How does serverless computing impact infrastructure management responsibility?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
Which aspect is most important for effective cloud governance?
Which of the following is a common security issue associated with serverless computing environments?
What is a key consideration when handling cloud security incidents?
What tool allows teams to easily locate and integrate with approved cloud services?
What is the primary purpose of secrets management in cloud environments?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
What is an advantage of using Kubernetes for container orchestration?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
How does artificial intelligence pose both opportunities and risks in cloud security?
Which best practice is recommended when securing object repositories in a cloud environment?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
Which of the following best describes the purpose of cloud security control objectives?
Which of the following events should be monitored according to CIS AWS benchmarks?
Which of the following best describes an aspect of PaaS services in relation to network security controls within a cloud environment?
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
Which aspects are most important for ensuring security in a hybrid cloud environment?
Which of the following best describes a primary risk associated with the use of cloud storage services?
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
In the context of Software-Defined Networking (SDN), what does decoupling the network control plane from the data plane primarily achieve?
What is the primary function of a Load Balancer Service in a Software Defined Network (SDN) environment?
Why is consulting with stakeholders important for ensuring cloud security strategy alignment?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?
In a cloud context, what does entitlement refer to in relation to a user's permissions?
What is the main purpose of multi-region resiliency in cloud environments?
In federated identity management, what role does the identity provider (IdP) play in relation to the relying party?
What is the primary function of landing zones or account factories in cloud environments?
Which Identity and Access Management (IAM) principle focuses on implementing multiple security layers to dilute access power, thereby averting a misuse or compromise?
Which of the following best describes an authoritative source in the context of identity management?
Which tool is most effective for ensuring compliance and identifying misconfigurations in cloud management planes?
Which of the following enhances Platform as a Service (PaaS) security by regulating traffic into PaaS components?
Which of the following best describes a benefit of using VPNs for cloud connectivity?
In the context of cloud security, which approach prioritizes incoming data logs for threat detection by applying multiple sequential filters?
When establishing a cloud incident response program, what access do responders need to effectively analyze incidents?
Which plane in a network architecture is responsible for controlling all administrative actions?
What is the primary objective of posture management in a cloud environment?
What type of logs record interactions with specific services in a system?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
What is a primary objective of cloud governance in an organization?
Which of the following functionalities is provided by Data Security Posture Management (DSPM) tools?
What is the primary purpose of Cloud Infrastructure Entitlement Management (CIEM) in cloud environments?
All cloud services utilize virtualization technologies.
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
Which statement best describes the Data Security Lifecycle?
What is the most significant security difference between traditional infrastructure and cloud computing?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
How does virtualized storage help avoid data loss if a drive fails?
What is true of searching data across cloud environments?
What is known as the interface used to connect with the metastructure and configure the cloud environment?
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
Which attack surfaces, if any, does virtualization technology introduce?
Use elastic servers when possible and move workloads to new instances.
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
Which of the following statements best describes an identity
federation?
Big data includes high volume, high variety, and high velocity.
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
Select the best definition of “compliance” from the options below.
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
If there are gaps in network logging data, what can you do?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
What does it mean if the system or environment is built automatically from a template?