Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What is an advantage of using Kubernetes for container orchestration?

A.

Limited deployment options

B.

Manual management of resources

C.

Automation of deployment and scaling

D.

Increased hardware dependency

Full Access
Question # 5

Why is early integration of pre-deployment testing crucial in a cybersecurity project?

A.

It identifies issues before full deployment, saving time and resources.

B.

It increases the overall testing time and costs.

C.

It allows skipping final verification tests.

D.

It eliminates the need for continuous integration.

Full Access
Question # 6

Which of the following is the MOST common cause of cloud-native security breaches?

A.

Inability to monitor cloud infrastructure for threats

B.

IAM failures

C.

Lack of encryption for data at rest

D.

Vulnerabilities in cloud provider's physical infrastructure

Full Access
Question # 7

What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?

A.

Generating logs within the SaaS applications

B.

Managing the financial costs of SaaS subscriptions

C.

Providing training sessions for staff on using SaaS tools

D.

Evaluating the security measures and compliance requirements

Full Access
Question # 8

Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?

A.

Component credentials

B.

Immutable infrastructure

C.

Infrastructure as code

D.

Application integration

Full Access
Question # 9

Which practice ensures container security by preventing post-deployment modifications?

A.

Implementing dynamic network segmentation policies

B.

Employing Role-Based Access Control (RBAC) for container access

C.

Regular vulnerability scanning of deployed containers

D.

Use of immutable containers

Full Access
Question # 10

Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?

A.

Focusing exclusively on signature-based detection for known malware

B.

Deploying behavioral detectors for IAM and management plane activities

C.

Implementing full packet capture and monitoring

D.

Relying on IP address and connection header monitoring

Full Access
Question # 11

In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?

A.

Enhances security by supporting authorizations based on the current context and status

B.

Reduces log analysis requirements

C.

Simplifies regulatory compliance by using a single sign-on mechanism

D.

These are required for proper implementation of RBAC

Full Access
Question # 12

Which of the following best describes how cloud computing manages shared resources?

A.

Through virtualization, with administrators allocating resources based on SLAs

B.

Through abstraction and automation to distribute resources to customers

C.

By allocating physical systems to a single customer at a time

D.

Through manual configuration of resources for each user need

Full Access
Question # 13

Which of the following best describes compliance in the context of cybersecurity?

A.

Defining and maintaining the governance plan

B.

Adherence to internal policies, laws, regulations, standards, and best practices

C.

Implementing automation technologies to monitor the control implemented

D.

Conducting regular penetration testing as stated in applicable laws and regulations

Full Access
Question # 14

Which of the following best describes the responsibility for security in a cloud environment?

A.

Cloud Service Customers (CSCs) are solely responsible for security in the cloud environment. The Cloud Service Providers (CSPs) are accountable.

B.

Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) share security responsibilities. The exact allocation of responsibilities depends on the technology and context.

C.

Cloud Service Providers (CSPs) are solely responsible for security in the cloud environment. Cloud Service Customers (CSCs) have an advisory role.

D.

Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) share security responsibilities. The allocation of responsibilities is constant.

Full Access
Question # 15

In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?

A.

Post-Incident Activity

B.

Detection and Analysis

C.

Preparation

D.

Containment, Eradication, and Recovery

Full Access
Question # 16

When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?

A.

Network Attached Storage (NAS)

B.

Block storage

C.

File storage

D.

Object storage

Full Access
Question # 17

In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?

A.

Implementing real-time visibility

B.

Deploying container-specific antivirus scanning

C.

Using static code analysis tools in the pipeline

D.

Full packet network monitoring

Full Access
Question # 18

What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?

A.

To automate the data encryption process across all cloud services

B.

To reduce the overall cost of cloud storage solutions

C.

To apply appropriate security controls based on asset sensitivity and importance

D.

To increase the speed of data retrieval within the cloud environment

Full Access
Question # 19

Why is snapshot management crucial for the virtual machine (VM) lifecycle?

A.

It allows for quick restoration points during updates or changes

B.

It is used for load balancing VMs

C.

It enhances VM performance significantly

D.

It provides real-time analytics on VM applications

Full Access
Question # 20

Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?

A.

They reduce the cost of cloud services.

B.

They provide visibility into cloud environments.

C.

They enhance physical security.

D.

They encrypt cloud data at rest.

Full Access
Question # 21

What's the difference between DNS Logs and Flow Logs?

A.

They represent the logging of different networking solutions, and DNS Logs are more suitable for a ZTA implementation

B.

DNS Logs record domain name resolution requests and responses, while Flow Logs record info on source, destination, protocol

C.

They play identical functions and can be used interchangeably

D.

DNS Logs record all the information about the network behavior, including source, destination, and protocol, while Flow Logs record users' applications behavior

Full Access
Question # 22

Which aspect is most important for effective cloud governance?

A.

Formalizing cloud security policies

B.

Implementing best-practice cloud security control objectives

C.

Negotiating SLAs with cloud providers

D.

Establishing a governance hierarchy

Full Access
Question # 23

What is the primary goal of implementing DevOps in a software development lifecycle?

A.

To create a separation between development and operations

B.

To eliminate the need for IT operations by automating all tasks

C.

To enhance collaboration between development and IT operations for efficient delivery

D.

To reduce the development team size by merging roles

Full Access
Question # 24

What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?

A.

PBAC eliminates the need for defining and managing user roles and permissions.

B.

PBAC is easier to implement and manage compared to Role-Based Access Control (RBAC).

C.

PBAC allows enforcement of granular, context-aware security policies using multiple attributes.

D.

PBAC ensures that access policies are consistent across all cloud providers and platforms.

Full Access
Question # 25

How does SASE enhance traffic management when compared to traditional network models?

A.

It solely focuses on user authentication improvements

B.

It replaces existing network protocols with new proprietary ones

C.

It filters traffic near user devices, reducing the need for backhauling

D.

It requires all traffic to be sent through central data centers

Full Access
Question # 26

What tool allows teams to easily locate and integrate with approved cloud services?

A.

Contracts

B.

Shared Responsibility Model

C.

Service Registry

D.

Risk Register

Full Access
Question # 27

Which principle reduces security risk by granting users only the permissions essential for their role?

A.

Role-Based Access Control

B.

Unlimited Access

C.

Mandatory Access Control

D.

Least-Privileged Access

Full Access
Question # 28

A cloud deployment of two or more unique clouds is known as:

A.

Infrastructures as a Service

B.

A Private Cloud

C.

A Community Cloud

D.

A Hybrid Cloud

E.

Jericho Cloud Cube Model

Full Access
Question # 29

When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?

A.

The CSP server facility

B.

The logs of all customers in a multi-tenant cloud

C.

The network components controlled by the CSP

D.

The CSP office spaces

E.

Their own virtual instances in the cloud

Full Access
Question # 30

Select the best definition of “compliance” from the options below.

A.

The development of a routine that covers all necessary security measures.

B.

The diligent habits of good security practices and recording of the same.

C.

The timely and efficient filing of security reports.

D.

The awareness and adherence to obligations, including the assessment and prioritization of corrective actions deemed necessary and appropriate.

E.

The process of completing all forms and paperwork necessary to develop a defensible paper trail.

Full Access
Question # 31

Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?

A.

Planned Outages

B.

Resiliency Planning

C.

Expected Engineering

D.

Chaos Engineering

E.

Organized Downtime

Full Access
Question # 32

Your SLA with your cloud provider ensures continuity for all services.

A.

False

B.

True

Full Access
Question # 33

Network logs from cloud providers are typically flow records, not full packet captures.

A.

False

B.

True

Full Access
Question # 34

When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.

A.

False

B.

True

Full Access
Question # 35

Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?

A.

Auditors working in the interest of the cloud customer

B.

Independent auditors

C.

Certified by CSA

D.

Auditors working in the interest of the cloud provider

E.

None of the above

Full Access
Question # 36

Your cloud and on-premises infrastructures should always use the same network address ranges.

A.

False

B.

True

Full Access
Question # 37

CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?

A.

Mappings to well-known standards and frameworks

B.

Service Provider or Tenant/Consumer

C.

Physical, Network, Compute, Storage, Application or Data

D.

SaaS, PaaS or IaaS

Full Access
Question # 38

Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?

A.

Intrusion Prevention System

B.

URL filters

C.

Data Loss Prevention

D.

Cloud Access and Security Brokers (CASB)

E.

Database Activity Monitoring

Full Access
Question # 39

Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider

A.

False

B.

True

Full Access
Question # 40

If there are gaps in network logging data, what can you do?

A.

Nothing. There are simply limitations around the data that can be logged in the cloud.

B.

Ask the cloud provider to open more ports.

C.

You can instrument the technology stack with your own logging.

D.

Ask the cloud provider to close more ports.

E.

Nothing. The cloud provider must make the information available.

Full Access
Question # 41

When designing an encryption system, you should start with a threat model.

A.

False

B.

True

Full Access
Question # 42

REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.

A.

False

B.

True

Full Access
Question # 43

ENISA: Which is a potential security benefit of cloud computing?

A.

More efficient and timely system updates

B.

ISO 27001 certification

C.

Provider can obfuscate system O/S and versions

D.

Greater compatibility with customer IT infrastructure

E.

Lock-In

Full Access
Question # 44

CCM: The following list of controls belong to which domain of the CCM?

GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework

A.

Governance and Retention Management

B.

Governance and Risk Management

C.

Governing and Risk Metrics

Full Access
Question # 45

A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?

A.

An entitlement matrix

B.

A support table

C.

An entry log

D.

A validation process

E.

An access log

Full Access
Question # 46

Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?

A.

Platform-as-a-service (PaaS)

B.

Desktop-as-a-service (DaaS)

C.

Infrastructure-as-a-service (IaaS)

D.

Identity-as-a-service (IDaaS)

E.

Software-as-a-service (SaaS)

Full Access
Question # 47

ENISA: An example high risk role for malicious insiders within a Cloud Provider includes

A.

Sales

B.

Marketing

C.

Legal counsel

D.

Auditors

E.

Accounting

Full Access
Question # 48

What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?

A.

The physical location of the data and how it is accessed

B.

The fragmentation and encryption algorithms employed

C.

The language of the data and how it affects the user

D.

The implications of storing complex information on simple storage systems

E.

The actual size of the data and the storage format

Full Access
Question # 49

When mapping functions to lifecycle phases, which functions are required to successfully process data?

A.

Create, Store, Use, and Share

B.

Create and Store

C.

Create and Use

D.

Create, Store, and Use

E.

Create, Use, Store, and Delete

Full Access
Question # 50

What is true of security as it relates to cloud network infrastructure?

A.

You should apply cloud firewalls on a per-network basis.

B.

You should deploy your cloud firewalls identical to the existing firewalls.

C.

You should always open traffic between workloads in the same virtual subnet for better visibility.

D.

You should implement a default allow with cloud firewalls and then restrict as necessary.

E.

You should implement a default deny with cloud firewalls.

Full Access
Question # 51

Without virtualization, there is no cloud.

A.

False

B.

True

Full Access
Question # 52

Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?

A.

Infrastructure

B.

Datastructure

C.

Infostructure

D.

Applistructure

E.

Metastructure

Full Access
Question # 53

What is defined as the process by which an opposing party may obtain private documents for use in litigation?

A.

Discovery

B.

Custody

C.

Subpoena

D.

Risk Assessment

E.

Scope

Full Access