Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
Which cloud service model typically places the most security responsibilities on the cloud customer?
Which of the following enhances Platform as a Service (PaaS) security by regulating traffic into PaaS components?
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
What is an important step in conducting forensics on containerized and serverless environments?
Which of the following best describes the primary function of Cloud Detection and Response (CDR) in cybersecurity?
In the initial stage of implementing centralized identity management, what is the primary focus of cybersecurity measures?
Which method is considered best practice for creating secure virtual machine (VM) images?
Why is it important for Cloud Service Providers (CSPs) to document security controls?
Why is identity management at the organization level considered a key aspect in cybersecurity?
What does it mean if the system or environment is built automatically from a template?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
Which aspects are most important for ensuring security in a hybrid cloud environment?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
Which AI workload mitigation strategy best addresses model inversion attacks that threaten data confidentiality?
Which of the following best describes the responsibility for security in a cloud environment?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
What is one primary operational challenge associated with using cloud-agnostic container strategies?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
What is the primary purpose of volume storage encryption in a cloud environment?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
What is a key consideration when implementing AI workloads to ensure they adhere to security best practices?
How does Infrastructure as Code (IaC) facilitate rapid recovery in cybersecurity?
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?
ENISA: Which is not one of the five key legal issues common across all scenarios:
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
The containment phase of the incident response lifecycle requires taking systems offline.
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?
In preparing for cloud incident response, why is updating forensics tools for virtual machines (VMs) and containers critical?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
In the shared security model, how does the allocation of responsibility vary by service?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
How does running applications on distinct virtual networks and only connecting networks as needed help?
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
Which of the following best describes a key benefit of Software-Defined Networking (SDN)?
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
Which of the following information security policies defines the use of an organization's IT resources?
What is an essential security characteristic required when using multi-tenanttechnologies?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
In Identity and Access Management (IAM) containment, why is it crucial to understand if an attacker escalated their identity?
Which strategy is critical for securing containers at the image creation stage?
Which aspect of assessing cloud providers poses the most significant challenge?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?
What technology is commonly used to establish an encrypted tunnel between a remote user's device and a private network over the public Internet?
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
How does SASE enhance traffic management when compared to traditional network models?
Which of the following is a common security issue associated with serverless computing environments?
Which of the following is a common exploitation factor associated with serverless and container workloads?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
What is a key benefit of using customer-managed encryption keys with cloud key management service (KMS)?
What is the most significant security difference between traditional infrastructure and cloud computing?
Which practice ensures container security by preventing post-deployment modifications?
When leveraging a cloud provider, what should be considered to ensure application security requirements are met?
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
Which cloud security model type provides generalized templates for helping implement cloud security?
An organization deploys an AI application for fraud detection. Which threat is MOST likely to affect its AI model’s accuracy?
Which of the following best describes compliance in the context of cybersecurity?
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.