As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?
Which security information and event management concept focuses on account and service hijacking issues?
An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?
Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?
Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?
Which security testing method requires compliance with the cloud service provider’s terms of service?
In which cloud service model is the cloud consumer responsible for installation and maintenance of the operating system?
Which security threat occurs when authorized users increase their level of access in an unauthorized manner?
Which characteristic could affect the audit process for a customer of a cloud service provider?
Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?
An organization wants to conduct some of the disaster recovery plan testing with the least possible impact on production. Which method should be used?
Which concept focuses on operating highly available workloads in the cloud?
What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?
A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?
A cloud consumer is scheduling a vulnerability assessment of a cloud service procured through a cloud broker. Who should the cloud consumer notify before beginning the assessment?
Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?
Which process is implemented during the hardening of an operating system (OS) and its workloads?
Which activity is within the scope of the cloud provider’s role in the chain of custody?
An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?
Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?
Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?
Which business continuity and disaster recovery consideration should be part of a cloud application architecture?
Which security control could be implemented as part of a layered physical defense at a cloud hosting site?
Which tool provides a dedicated environment to contain and analyze malware?
Which description accurately characterizes the movement of applications to the cloud?
An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?
What is the definition of transportable as it relates to cloud contract design requirements?
An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
Which cloud platform detection and analysis methodology can be performed to determine whether other similar instances were potentially exposed during the same attack?
After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?
Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?
Who should be part of formal tasking when conducting testing for business continuity management?
A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?
Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?
An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?
During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?
Which regulation provides a guide for implementing the risk management framework?
Which type of disaster recovery plan (DRP) test requires the whole organization to participate in a scheduled disaster scenario without performing all of the actual tasks?
Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?
Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?
Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?
Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?
Which phase of the software development life cycle includes creating user stories?
An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?
A network administrator is concerned about the loss of physical control when moving data to the cloud. Which countermeasure should be implemented to avoid this threat?
Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?
Which security issue can be found only through dynamic application security testing (DAST)?
An organization is going through the process of selecting a new enterprise resource management (ERM) vendor. The organization has already selected the vendor and is now preparing to go through the onboarding process. Which specific issues should be discussed between the organization and the vendor during this phase?
What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?
Which phase in secure application design and development includes threat modeling?