What must the monitoring scope cover in addition to the deployed assets?
#61
Answer: B✅ Correct❌ Incorrect
Regardless of the technology platform, container security includes properly securing the image repository.
#62
Answer: B✅ Correct❌ Incorrect
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
#63
Answer: A✅ Correct❌ Incorrect
ENISA: Which is not identified as a top security risk in ENISA research?
#64
Answer: A✅ Correct❌ Incorrect
What item below allows disparate directory services and independent security domains to be interconnected?
#65
Answer: E✅ Correct❌ Incorrect
CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
#66
Answer: C✅ Correct❌ Incorrect
What is the newer application development methodology and philosophy focused on automation of application development and deployment?
#67
Answer: C✅ Correct❌ Incorrect
Sending data to a provider's storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
#68
Answer: B✅ Correct❌ Incorrect
What is true of searching data across cloud environments?
#69
Answer: A✅ Correct❌ Incorrect
How does running applications on distinct virtual networks and only connecting networks as needed help?
#70
Answer: D✅ Correct❌ Incorrect
ENISA: As it relates to public cloud computing, in the European Data Protection law, the customer is considered to be the:
#71
Answer: A✅ Correct❌ Incorrect
Immutable workloads make it faster to roll out updated versions because applications must be designed to handle individual nodes going down.
#72
Answer: B✅ Correct❌ Incorrect
Which technique uses the management plane to detect various activities, such as file uploads or configuration changes?
#73
Answer: A✅ Correct❌ Incorrect
Which phase of the incident response lifecycle includes creating and validating alerts?
#74
Answer: C✅ Correct❌ Incorrect
ENISA: To mitigate credential compromise or theft, cloud provider can implement:
#75
Answer: E✅ Correct❌ Incorrect
While the cloud consumer is responsible for implementing the security controls, the cloud provider implements the security of the workload.
#76
Answer: B✅ Correct❌ Incorrect
Your cloud and on-premises infrastructures should always use the same network address ranges.
#77
Answer: A✅ Correct❌ Incorrect
Which of the following items is one of the major regulatory compliance problems associated with cloud environments?
#78
Answer: D✅ Correct❌ Incorrect
What are major factors to building and managing a secure management plane?
#79
Answer: A✅ Correct❌ Incorrect
Cloud storage will most often utilize the same types of data storage used in traditional data storage technologies.
#80
Answer: B✅ Correct❌ Incorrect
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
#81
Answer: A✅ Correct❌ Incorrect
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
#82
Answer: E✅ Correct❌ Incorrect
ENISA: A reason for risk concerns of a cloud provider being acquired is:
#83
Answer: E✅ Correct❌ Incorrect
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
#84
Answer: A✅ Correct❌ Incorrect
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
#85
Answer: E✅ Correct❌ Incorrect
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
#86
Answer: A✅ Correct❌ Incorrect
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
#87
Answer: A✅ Correct❌ Incorrect
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
#88
Answer: A✅ Correct❌ Incorrect
Which of the following items is NOT an example of Security as a Service (SecaaS)?
#89
Answer: C✅ Correct❌ Incorrect
How is encryption managed on multi-tenant storage?