What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
In preparing for cloud incident response, why is updating forensics tools for virtual machines (VMs) and containers critical?
In preparing for cloud incident response, why is it crucial to establish a cloud deployment registry?
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
What does Zero Trust Network Access (ZTNA) primarily use to control access to applications?
Which of the following best describes a risk associated with insecure interfaces and APIs?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
Which best practice is recommended when securing object repositories in a cloud environment?
Which technique is most effective for preserving digital evidence in a cloud environment?
What is an essential security characteristic required when using multi-tenanttechnologies?
When establishing a cloud incident response program, what access do responders need to effectively analyze incidents?
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
In Identity and Access Management (IAM) containment, why is it crucial to understand if an attacker escalated their identity?
Which of the following best describes a primary risk associated with the use of cloud storage services?
Your cloud and on-premises infrastructures should always use the same network address ranges.
What are the primary security responsibilities of the cloud provider in the management infrastructure?
Which of the following is a primary purpose of establishing cloud risk registries?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
Which of the following is a primary benefit of using Infrastructure as Code (IaC) in a security context?
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
Which of the following cloud essential characteristics refers to the capability of the service to scale resources up or down quickly and efficiently based on demand?
Which of the following events should be monitored according to CIS AWS benchmarks?
Which of the following best describes how cloud computing manages shared resources?
Which cloud service model typically places the most security responsibilities on the cloud customer?
Which type of AI workload typically requires large data sets and substantial computing resources?
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
Which of the following best describes the primary purpose of cloud security frameworks?
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
What are the key outcomes of implementing robust cloud risk management practices?
In federated identity management, what role does the identity provider (IdP) play in relation to the relying party?
What is the primary function of Data Encryption Keys (DEK) in cloud security?
How does SASE enhance traffic management when compared to traditional network models?
In a cloud computing incident, what should be the initial focus of analysis due to the ephemeral nature of resources and centralized control mechanisms?
What is the primary function of landing zones or account factories in cloud environments?
Which aspects are most important for ensuring security in a hybrid cloud environment?
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
What method can be utilized along with data fragmentation to enhance security?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
Which of the following best describes the responsibility for security in a cloud environment?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
What is the most significant security difference between traditional infrastructure and cloud computing?
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
In the cloud provider and consumer relationship, which entity
manages the virtual or abstracted infrastructure?
Which of the following best describes a benefit of using VPNs for cloud connectivity?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
Which of the following best describes the shift-left approach in software development?
An important consideration when performing a remote vulnerability test of a cloud-based application is to
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
In the context of cloud security, which approach prioritizes incoming data logsfor threat detection by applying multiple sequential filters?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
How does Infrastructure as Code (IaC) facilitate rapid recovery in cybersecurity?
Which type of cloud workload would be most appropriate for running isolated applications with minimum resource overhead?
In the shared security model, how does the allocation of responsibility vary by service?
What is the primary objective of posture management in a cloud environment?
Which factors primarily drive organizations to adopt cloud computing solutions?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
How does cloud sprawl complicate security monitoring in an enterprise environment?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
Which Identity and Access Management (IAM) principle focuses on implementing multiple security layers to dilute access power, thereby averting a misuse or compromise?
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
When mapping functions to lifecycle phases, which functions are required to successfully process data?
What are the essential characteristics of cloud computing as defined by the NIST model?
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
Which tool is most effective for ensuring compliance and identifying misconfigurations in cloud management planes?
What is the primary advantage of implementing Continuous Integration and Continuous Delivery/Deployment (CI/CD) pipelines in the context of cybersecurity?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?