Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
Which of the following is the MOST common cause of cloud-native security breaches?
Which practice ensures container security by preventing post-deployment modifications?
What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
Which of the following is a common security issue associated with serverless computing environments?
Which governance domain deals with evaluating how cloud computing affects compliance with internal
security policies and various legal requirements, such as regulatory and legislative?
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
How does running applications on distinct virtual networks and only connecting networks as needed help?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
Network logs from cloud providers are typically flow records, not full packet captures.
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in
their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
How does cloud sprawl complicate security monitoring in an enterprise environment?
What is the primary goal of implementing DevOps in a software development lifecycle?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Which of the following best describes the primary purpose of cloud security frameworks?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
Which best practice is recommended when securing object repositories in a cloud environment?
How does network segmentation primarily contribute to limiting the impact of a security breach?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?