Which of the following items is NOT an example of Security as a Service (SecaaS)?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
When designing an encryption system, you should start with a threat model.
All cloud services utilize virtualization technologies.
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
ENISA: A reason for risk concerns of a cloud provider being acquired is:
How can web security as a service be deployed for a cloud consumer?
Select the statement below which best describes the relationship between identities and attributes
ENISA: Which is not one of the five key legal issues common across all scenarios:
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
The containment phase of the incident response lifecycle requires taking systems offline.
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
How does virtualized storage help avoid data loss if a drive fails?
Which statement best describes the impact of Cloud Computing on business continuity management?
What is true of security as it relates to cloud network infrastructure?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
Who is responsible for the security of the physical infrastructure and virtualization platform?
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
What item below allows disparate directory services and independent security domains to be interconnected?
Which opportunity helps reduce common application security issues?
ENISA: “VM hopping” is:
Which data security control is the LEAST likely to be assigned to an IaaS provider?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
Your SLA with your cloud provider ensures continuity for all services.
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
Which best practice is recommended when securing object repositories in a cloud environment?
According to NIST, what is cloud computing defined as?
How does artificial intelligence pose both opportunities and risks in cloud security?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
What is the primary purpose of secrets management in cloud environments?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
What tool allows teams to easily locate and integrate with approved cloud services?
Which practice ensures container security by preventing post-deployment modifications?
In the shared security model, how does the allocation of responsibility vary by service?
Which factors primarily drive organizations to adopt cloud computing solutions?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
Which of the following best describes how cloud computing manages shared resources?
Which of the following best describes the primary purpose of cloud security frameworks?
What is the primary purpose of cloud governance in an organization?
What is the primary goal of implementing DevOps in a software development lifecycle?
How does cloud sprawl complicate security monitoring in an enterprise environment?
Which of the following is a common security issue associated with serverless computing environments?