All assets require the same continuity in the cloud.
#32
Answer: A✅ Correct❌ Incorrect
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
#33
Answer: E✅ Correct❌ Incorrect
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
#34
Answer: D✅ Correct❌ Incorrect
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
#35
Answer: B✅ Correct❌ Incorrect
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
#36
Answer: A✅ Correct❌ Incorrect
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
#37
Answer: B✅ Correct❌ Incorrect
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
#38
Answer: C✅ Correct❌ Incorrect
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
#39
Answer: A✅ Correct❌ Incorrect
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
#40
Answer: B✅ Correct❌ Incorrect
What are the NIST defined essential characteristics of cloud computing?
#41
Answer: D✅ Correct❌ Incorrect
Generally speaking, in the United States, a party is obligated to take reasonable steps to prevent the destruction or modification of data in its possession that it reasonably should know, is relevant to an anticipated litigation or government investigation.
#42
Answer: B✅ Correct❌ Incorrect
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
#43
Answer: A✅ Correct❌ Incorrect
Which of the following is NOT a common storage option with Infrastructure as a Service?
#44
Answer: D✅ Correct❌ Incorrect
What best describes the tradeoff of Infrastructure as a Service as compared to other cloud service models?
#45
Answer: C✅ Correct❌ Incorrect
What are the barriers to developing full confidence in security as a service (SecaaS)?
#46
Answer: E✅ Correct❌ Incorrect
CCM: A hypothetical company called: `Health4Sure` is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure's cloud service?
#47
Answer: B✅ Correct❌ Incorrect
Of the choices below which option allows for the most interoperability in security authentication in a cloud environment?
#48
Answer: B✅ Correct❌ Incorrect
The key concern of data backup and recovery schemes is:
#49
Answer: B✅ Correct❌ Incorrect
Which regulation affects data controllers with business in Japan?
#50
Answer: E✅ Correct❌ Incorrect
When configuring SDN firewalls, after adding all assets, what is typically the first configuration you must address?
#51
Answer: D✅ Correct❌ Incorrect
Identified issues, risks, and recommended remediations are included when determining compliance.
#52
Answer: A✅ Correct❌ Incorrect
Which common component of big data is focused on the mechanisms used to ingest large volumes of data, often of a streaming nature?
#53
Answer: D✅ Correct❌ Incorrect
Which statement best describes a data (information) dispersion fragmentation scheme?
#54
Answer: E✅ Correct❌ Incorrect
To increase network isolation, you should use SDN capabilities for multiple networks and cloud accounts or segments.
#55
Answer: B✅ Correct❌ Incorrect
Which component is a key part of software container systems?
#56
Answer: D✅ Correct❌ Incorrect
CCM: What is the role of the Scope Applicability column in the CCM?
#57
Answer: C✅ Correct❌ Incorrect
When considering business continuity and disaster recovery with a cloud provider, which layer of the logical stack includes code and message queues?
#58
Answer: A✅ Correct❌ Incorrect
What factor(s), if any, allows for more efficient and effective containment and recovery in a cloud environment than in a non-cloud environment.