Use elastic servers when possible and move workloads to new instances.
#121
Answer: B✅ Correct❌ Incorrect
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
#122
Answer: C✅ Correct❌ Incorrect
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
#123
Answer: B✅ Correct❌ Incorrect
Which data security control is the LEAST likely to be assigned to an IaaS provider?
#124
Answer: A✅ Correct❌ Incorrect
How does virtualized storage help avoid data loss if a drive fails?
#125
Answer: A✅ Correct❌ Incorrect
Which statement best describes the impact of Cloud Computing on business continuity management?
#126
Answer: D✅ Correct❌ Incorrect
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
#127
Answer: D✅ Correct❌ Incorrect
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
#128
Answer: D✅ Correct❌ Incorrect
What is true of companies considering a cloud computing business relationship?
#129
Answer: C✅ Correct❌ Incorrect
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
#130
Answer: B✅ Correct❌ Incorrect
What is a potential concern of using Security-as-a-Service (SecaaS)?
#131
Answer: A✅ Correct❌ Incorrect
How should an SDLC be modified to address application security in a Cloud Computing environment?
#132
Answer: B✅ Correct❌ Incorrect
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
#133
Answer: C✅ Correct❌ Incorrect
Which opportunity helps reduce common application security issues?
#134
Answer: D✅ Correct❌ Incorrect
What is the most significant security difference between traditional infrastructure and cloud computing?
#135
Answer: A✅ Correct❌ Incorrect
What makes single cloud assets less resilient compared with a traditional infrastructure?
#136
Answer: A✅ Correct❌ Incorrect
ENISA: In Infrastructure as a Service (IaaS), who is responsible for guest systems monitoring?
#137
Answer: A✅ Correct❌ Incorrect
What are the components of an encryption system?
#138
Answer: D✅ Correct❌ Incorrect
What is the main data source for detection and analysis of an incident?
#139
Answer: A✅ Correct❌ Incorrect
Which cloud storage technology would include a content delivery network (CON), files stored in SaaS, and caching?
#140
Answer: C✅ Correct❌ Incorrect
What is a benefit of application security in a cloud environment?
#141
Answer: E✅ Correct❌ Incorrect
You have a business relationship with a cloud provider for all sales management functionality. Through the APIs and SDKs, you have customized the interface and some functionality, but the back end service is done through the cloud provider. In this relationship, which service is completed by the cloud provider?
#142
Answer: B✅ Correct❌ Incorrect
Absent other evidence, such as tampering or hacking, documents should not be considered more or less admissible or credible because they were created or stored in the cloud.
#143
Answer: A✅ Correct❌ Incorrect
What are the encryption options available for SaaS consumers?
#144
Answer: A✅ Correct❌ Incorrect
When the application components communicate directly with the cloud service, the management plane and metastructure might fall within the application security scope.
#145
Answer: A✅ Correct❌ Incorrect
How can you monitor and filter data in a virtual network when traffic might not cross the physical network?
#146
Answer: E✅ Correct❌ Incorrect
Which concept is defined as the unique expression of an entity within a given namespace?
#147
Answer: E✅ Correct❌ Incorrect
What is a method used to decouple the network control plane from the data plane?
#148
Answer: D✅ Correct❌ Incorrect
For cloud consumers to be able to properly configure and manage their network security, what must cloud providers do?
#149
Answer: A✅ Correct❌ Incorrect
What is true of Software Defined Network firewalls?