Which strategy is critical for securing containers at the image creation stage?
Which cloud service model typically places the most security responsibilities on the cloud customer?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
How does Infrastructure as Code (IaC) facilitate rapid recovery in cybersecurity?
In a cloud environment spanning multiple jurisdictions, what is the most important factor to consider for compliance?
Which practice ensures container security by preventing post-deployment modifications?
In the context of server-side encryption handled by cloud providers, what is the key attribute of this encryption?
How does SASE enhance traffic management when compared to traditional network models?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
What are the essential characteristics of cloud computing as defined by the NIST model?
What is the primary benefit of Federated Identity Management in an enterprise environment?
Which of the following cloud computing models primarily provides storage and computing resources to the users?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
What is the primary purpose of Identity and Access Management (IAM) systems in a cloud environment?
Which of the following is a common exploitation factor associated with serverless and container workloads?
Which type of AI workload typically requires large data sets and substantial computing resources?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Which of the following best describes the advantage of custom application level encryption?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
Which tool is most effective for ensuring compliance and identifying misconfigurations in cloud management planes?
What is the most effective way to identify security vulnerabilities in an application?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
CCM: A hypothetical company called: “Health4Sure†is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
In the cloud provider and consumer relationship, which entity
manages the virtual or abstracted infrastructure?
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
What is a primary benefit of implementing micro-segmentation within a Zero Trust Architecture?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
What method can be utilized along with data fragmentation to enhance security?
A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?
Which cloud service model requires the customer to manage the operating system and applications?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
What is the primary function of Privileged Identity Management (PIM) and Privileged Access Management (PAM)?
When implementing a Zero Trust (ZT) strategy, which approach is considered fundamental for ensuring enterprise security and connectivity?
What is true of companies considering a cloud computing business relationship?
When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?
Which of the following best describes a key benefit of Software-Defined Networking (SDN)?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
Which statement best describes the impact of Cloud Computing on business continuity management?
Who is responsible for the security of the physical infrastructure and virtualization platform?
What is the main purpose of multi-region resiliency in cloud environments?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
Which benefit of automated deployment pipelines most directly addresses continuous security and reliability?
Select the statement below which best describes the relationship between identities and attributes
Which of the following best describes the purpose of cloud security control objectives?
Which aspect of a Cloud Service Provider's (CSPs) infrastructure security involves protecting the interfaces used to manage configurations and resources?
Which of the following best describes a risk associated with insecure interfaces and APIs?
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
Which resilience tool helps distribute network or application traffic across multiple servers to ensure reliability and availability?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
In federated identity management, what role does the identity provider (IdP) play in relation to the relying party?
Which of the following best describes the primary purpose of cloud security frameworks?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
How should an SDLC be modified to address application security in a Cloud Computing environment?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
Which aspect of assessing cloud providers poses the most significant challenge?
Which strategic approach is most appropriate for managing a multi-cloud environment that includes multiple IaaS and PaaS providers?
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
Which of the following represents a benefit of using serverless computing for new workload types?
What technology is commonly used to establish an encrypted tunnel between a remote user's device and a private network over the public Internet?
Which technique is most effective for preserving digital evidence in a cloud environment?
Which type of cloud workload would be most appropriate for running isolated applications with minimum resource overhead?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
An organization deploys an AI application for fraud detection. Which threat is MOST likely to affect its AI model’s accuracy?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
Which AI workload mitigation strategy best addresses model inversion attacks that threaten data confidentiality?
Which of the following best describes the primary purpose of image factories in the context of virtual machine (VM) management?
In the context of IaaS, what are the primary components included in infrastructure?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
ENISA: Which is not one of the five key legal issues common across all scenarios: