Why is early integration of pre-deployment testing crucial in a cybersecurity project?
Which of the following is the MOST common cause of cloud-native security breaches?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
Which practice ensures container security by preventing post-deployment modifications?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
Which of the following best describes how cloud computing manages shared resources?
Which of the following best describes compliance in the context of cybersecurity?
Which of the following best describes the responsibility for security in a cloud environment?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
When designing a cloud-native application that requires scalable and durable data storage, which storage option should be primarily considered?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
Why is snapshot management crucial for the virtual machine (VM) lifecycle?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
What is the primary goal of implementing DevOps in a software development lifecycle?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
How does SASE enhance traffic management when compared to traditional network models?
What tool allows teams to easily locate and integrate with approved cloud services?
Which principle reduces security risk by granting users only the permissions essential for their role?
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
Network logs from cloud providers are typically flow records, not full packet captures.
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
Your cloud and on-premises infrastructures should always use the same network address ranges.
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
When designing an encryption system, you should start with a threat model.
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
What is defined as the process by which an opposing party may obtain private documents for use in litigation?