Installing security software designed for physical servers onto a virtualized server can result in severe degradation in performance.
#1
Answer: B✅ Correct❌ Incorrect
CCM: A hypothetical company called "lnfrastructure4Sure" provides Infrastructure as a Service (IaaS) to its clients. A customer wants to review Infrastructure4Sure's hypervisor security implementation measures. Which of the following measures should Infrastructure4Sure implement?
#2
Answer: E✅ Correct❌ Incorrect
Which governance domain deals with evaluating how cloud computing affects compliance with internal security policies and various legal requirements, such as regulatory and legislative?
#3
Answer: C✅ Correct❌ Incorrect
Which of the following cloud deployment models represents a composition of two or more clouds that remain unique identities but are bound together by standardized or proprietary technology that enables data and application portability?
#4
Answer: B✅ Correct❌ Incorrect
What are six phases of the Data Security Lifecycle?
#5
Answer: A✅ Correct❌ Incorrect
Prominent recommended standards to enable federation of identity in cloud environments include:
#6
Answer: D✅ Correct❌ Incorrect
How can you reduce the blast radius if an attacker compromises one system?
#7
Answer: B✅ Correct❌ Incorrect
What are the three valid options for protecting data as it moves to and within the cloud?
#8
Answer: A✅ Correct❌ Incorrect
To what extent does the CSA Guidance document suffice for legal advice in setting up relationships with cloud service providers?
#9
Answer: B✅ Correct❌ Incorrect
ENISA: A key area of controls for cloud provider network architecture is
#10
Answer: D✅ Correct❌ Incorrect
Which meta-phase does the Cloud Security Alliance use to focus on the security and testing activities when moving code from an isolated development environment to production?
#11
Answer: C✅ Correct❌ Incorrect
Even with immutable infrastructures, the production environment, should be actively monitored for changes and deviations from approved baselines.
#12
Answer: B✅ Correct❌ Incorrect
ENISA: Licensing Risks refer to:
#13
Answer: D✅ Correct❌ Incorrect
Which architecture for hybrid cloud connectivity allows you to connect multiple, different cloud networks to a data center using a single hybrid connection?
#14
Answer: D✅ Correct❌ Incorrect
CCM: Which of the following statement about CSA's CCM and Security Guidance is False?
#15
Answer: B✅ Correct❌ Incorrect
A cloud deployment of two or more unique clouds is known as:
#16
Answer: D✅ Correct❌ Incorrect
ENISA: Which is not one of the five key legal issues common across all scenarios:
#17
Answer: C✅ Correct❌ Incorrect
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
#18
Answer: D✅ Correct❌ Incorrect
What are the primary security responsibilities of the cloud provider in the management infrastructure?
#19
Answer: A✅ Correct❌ Incorrect
What is true of a workload?
#20
Answer: A✅ Correct❌ Incorrect
Which type of application security testing should incorporate checks on API calls to the cloud service?
#21
Answer: D✅ Correct❌ Incorrect
Which facet is focused on protecting the management plane components, such as web and API servers, from attacks?
#22
Answer: D✅ Correct❌ Incorrect
What is it called when a customer's information and/or processes are compromised by the actions of another customer in a multi-tenancy environment?
#23
Answer: E✅ Correct❌ Incorrect
What are the three main aspects for data security controls?
#24
Answer: E✅ Correct❌ Incorrect
Which SDP component is used for authentication and authorization?
#25
Answer: B✅ Correct❌ Incorrect
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
#26
Answer: E✅ Correct❌ Incorrect
What is known as the interface used to connect with the metastructure and configure the cloud environment?
#27
Answer: B✅ Correct❌ Incorrect
Big data includes high volume, high variety, and high velocity.
#28
Answer: B✅ Correct❌ Incorrect
What does it mean if the system or environment is built automatically from a template?
#29
Answer: C✅ Correct❌ Incorrect
Which type of application security testing involves manual activity that is not necessarily integrated into automated testing?