What is a primary objective of cloud governance in an organization?
Which Identity and Access Management (IAM) principle focuses on implementing multiple security layers to dilute access power, thereby averting a misuse or compromise?
Which aspect of cybersecurity can AI enhance by reducing false positive alerts?
What is the main purpose of multi-region resiliency in cloud environments?
Which of the following best describes an aspect of PaaS services in relation to network security controls within a cloud environment?
Which of the following best describes the multi-tenant nature of cloud computing?
Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?
What is a primary benefit of implementing micro-segmentation within a Zero Trust Architecture?
Which benefit of automated deployment pipelines most directly addresses continuous security and reliability?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
Which cloud service model requires the customer to manage the operating system and applications?
What's the best way for organizations to establish a foundation for safeguarding data, upholding privacy, and meeting regulatory requirements in cloud applications?
Which term describes the practice in cloud compliance where a customer acquires a set of pre-approved regulatory or standards-based controls from a compliant provider?
What is one of the primary advantages of including Static Application Security Testing (SAST) in Continuous Integration (CI) pipelines?
What is one primary operational challenge associated with using cloud-agnostic container strategies?
Why is identity management at the organization level considered a key aspect in cybersecurity?
When comparing different Cloud Service Providers (CSPs), what should a cybersecurity professional be mindful of regarding their organizational structures?
Why is governance crucial in balancing the speed of adoption with risk control in cybersecurity initiatives?
In securing virtual machines (VMs), what is the primary role of using an “image factory" in VM deployment?
In a cloud computing incident, what should be the initial focus of analysis due to the ephemeral nature of resources and centralized control mechanisms?
In the context of FaaS, what is primarily defined in addition to functions?
What is critical for securing serverless computing models in the cloud?
In cloud environments, why are Management Plane Logs indispensable for security monitoring?
Which of the following functionalities is provided by Data Security Posture Management (DSPM) tools?
What are the most important practices for reducing vulnerabilities in virtual machines (VMs) in a cloud environment?
What is the primary purpose of Identity and Access Management (IAM) systems in a cloud environment?
What does it mean if the system or environment is built automatically from a template?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
What is true of companies considering a cloud computing business relationship?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
How can web security as a service be deployed for a cloud consumer?
What is the most significant security difference between traditional infrastructure and cloud computing?
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
If there are gaps in network logging data, what can you do?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
What is true of searching data across cloud environments?
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
How is encryption managed on multi-tenant storage?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
Which of the following items is NOT an example of Security as a Service (SecaaS)?
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
The containment phase of the incident response lifecycle requires taking systems offline.
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
Containers are highly portable code execution environments.
What's the difference between DNS Logs and Flow Logs?
Which practice ensures container security by preventing post-deployment modifications?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
Which principle reduces security risk by granting users only the permissions essential for their role?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
How does network segmentation primarily contribute to limiting the impact of a security breach?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
Which of the following is the MOST common cause of cloud-native security breaches?
Which approach creates a secure network, invisible to unauthorized users?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
What is the primary purpose of secrets management in cloud environments?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
Which areas should be initially prioritized for hybrid cloud security?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
How does artificial intelligence pose both opportunities and risks in cloud security?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
What is the primary goal of implementing DevOps in a software development lifecycle?
Which best practice is recommended when securing object repositories in a cloud environment?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
How does serverless computing impact infrastructure management responsibility?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Which of the following best describes compliance in the context of cybersecurity?