What is a challenge of application security in a cloud environment?
#151
Answer: B✅ Correct❌ Incorrect
If there are gaps in network logging data, what can you do?
#152
Answer: C✅ Correct❌ Incorrect
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed?
#153
Answer: E✅ Correct❌ Incorrect
Virtual appliances can become bottlenecks because they cannot fail open and must intercept all traffic.
#154
Answer: B✅ Correct❌ Incorrect
In the cloud provider and consumer relationship, which entity manages the virtual or abstracted infrastructure?
#155
Answer: C✅ Correct❌ Incorrect
In the case of Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) the responsibility to effectively manage the security of the application running in the cloud primarily belongs to who?
#156
Answer: A✅ Correct❌ Incorrect
At a minimum, how often should incident response testing occur?
#157
Answer: E✅ Correct❌ Incorrect
Why is a service type of network typically isolated on different hardware?
#158
Answer: C✅ Correct❌ Incorrect
CCM: A hypothetical company called "Security4Sure" provides a cloud based service to share confidential documents. The confidential documents are stored in their servers and are encrypted. How will Security4Sure ensure the protection of client data within their data center?
#159
Answer: B✅ Correct❌ Incorrect
ENISA: Which of the following is among the vulnerabilities contributing to a high risk ranking for Network Management?
#160
Answer: C✅ Correct❌ Incorrect
What is true of how the management plane is to be secured in the cloud?
#161
Answer: A✅ Correct❌ Incorrect
Which action is part of the containment phase of the incident response lifecycle?
#162
Answer: C✅ Correct❌ Incorrect
An important consideration when performing a remote vulnerability test of a cloud-based application is to
#163
Answer: A✅ Correct❌ Incorrect
What is the most important reason for knowing where the cloud service provider will host the data?
#164
Answer: A✅ Correct❌ Incorrect
Which components typically comprise Infrastructure-as-a-Service (IaaS) providers?
#165
Answer: A✅ Correct❌ Incorrect
What method can be utilized along with data fragmentation to enhance security?
#166
Answer: A✅ Correct❌ Incorrect
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
#167
Answer: E✅ Correct❌ Incorrect
Select the best definition of `compliance` from the options below.
#168
Answer: D✅ Correct❌ Incorrect
Who is responsible for the security of the physical infrastructure and virtualization platform?
#169
Answer: E✅ Correct❌ Incorrect
CCM: In the CCM tool, `Encryption and Key Management` is an example of which of the following?
#170
Answer: B✅ Correct❌ Incorrect
In volume storage, what method is often used to support resiliency and security?
#171
Answer: D✅ Correct❌ Incorrect
What is true of security as it relates to cloud network infrastructure?
#172
Answer: E✅ Correct❌ Incorrect
How can virtual machine communications bypass network security controls?
#173
Answer: A✅ Correct❌ Incorrect
ENISA: `VM hopping` is:
#174
Answer: D✅ Correct❌ Incorrect
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
#175
Answer: D✅ Correct❌ Incorrect
Which concept provides the abstraction needed for resource pools?
#176
Answer: A✅ Correct❌ Incorrect
Network logs from cloud providers are typically flow records, not full packet captures.
#177
Answer: B✅ Correct❌ Incorrect
Database Activity Monitoring and File Activity Monitoring are specifically recommended for what type of data migrations into the cloud?
#178
Answer: B✅ Correct❌ Incorrect
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
#179
Answer: E✅ Correct❌ Incorrect
Which security advantage considers that anything that goes into production is created by the CI/CD pipeline on approved code and configuration templates?