Which of the following is NOT a cloud computing characteristic that impacts incidence response?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
Which term describes any situation where the cloud consumer does
not manage any of the underlying hardware or virtual machines?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
Who is responsible for the security of the physical infrastructure and virtualization platform?
Which statement best describes why it is important to know how data is being accessed?
Which cloud security model type provides generalized templates for helping implement cloud security?
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
How does running applications on distinct virtual networks and only connecting networks as needed help?
Which of the following items is NOT an example of Security as a Service (SecaaS)?
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
Which of the following best describes the primary purpose of cloud security frameworks?
In the Incident Response Lifecycle, which phase involves identifying potential security events and examining them for validity?
What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
How does cloud sprawl complicate security monitoring in an enterprise environment?
Which of the following is a common security issue associated with serverless computing environments?
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
Which best practice is recommended when securing object repositories in a cloud environment?
What tool allows teams to easily locate and integrate with approved cloud services?
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?
Which of the following best describes compliance in the context of cybersecurity?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
What is the primary goal of implementing DevOps in a software development lifecycle?