In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
Which of the following best describes the primary purpose of cloud security frameworks?
How does artificial intelligence pose both opportunities and risks in cloud security?
What is the primary purpose of secrets management in cloud environments?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
What's the difference between DNS Logs and Flow Logs?
In the shared security model, how does the allocation of responsibility vary by service?
What is an advantage of using Kubernetes for container orchestration?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Which of the following best describes how cloud computing manages shared resources?
Which cloud service model allows users to access applications hosted and managed by the provider, with the user only needing to configure the application?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
How does cloud sprawl complicate security monitoring in an enterprise environment?
Which areas should be initially prioritized for hybrid cloud security?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
Which of the following best describes the responsibility for security in a cloud environment?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
Which best practice is recommended when securing object repositories in a cloud environment?
How does centralized logging simplify security monitoring and compliance?
Which aspect is most important for effective cloud governance?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
Which statement best describes the impact of Cloud Computing on business continuity management?
Your SLA with your cloud provider ensures continuity for all services.
What is known as the interface used to connect with the metastructure and configure the cloud environment?
Use elastic servers when possible and move workloads to new instances.
What is a potential concern of using Security-as-a-Service (SecaaS)?
What is resource pooling?
Network logs from cloud providers are typically flow records, not full packet captures.
Why is a service type of network typically isolated on different hardware?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
How can virtual machine communications bypass network security controls?
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
What is true of searching data across cloud environments?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
Select the statement below which best describes the relationship between identities and attributes
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
Select the best definition of “compliance” from the options below.
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
Your cloud and on-premises infrastructures should always use the same network address ranges.
ENISA: “VM hopping” is:
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
What are the encryption options available for SaaS consumers?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
How should an SDLC be modified to address application security in a Cloud Computing environment?