You should disable remote access when working with immutable workloads.
#181
Answer: A✅ Correct❌ Incorrect
Which security advantage considers that CI/CD pipelines can track everything, down to individual character changes in source files tied to the person submitting the change, with the entire application stack history?
#182
Answer: D✅ Correct❌ Incorrect
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
#183
Answer: B✅ Correct❌ Incorrect
The hub and spoke architecture uses internal identity providers or sources connected directly to cloud providers.
#184
Answer: A✅ Correct❌ Incorrect
Who is responsible for the proper rights management and configuration of exposed controls in the management plane?
#185
Answer: C✅ Correct❌ Incorrect
How can cloud providers support a secure use of virtualization for cloud consumers?
#186
Answer: A✅ Correct❌ Incorrect
Which SDP component terminates network traffic and enforces communication policies?
#187
Answer: C✅ Correct❌ Incorrect
ENISA: Which is a potential security benefit of cloud computing?
#188
Answer: A✅ Correct❌ Incorrect
The Software Defined Perimeter (SDP) includes which components?
#189
Answer: A✅ Correct❌ Incorrect
Which cloud security model type provides generalized templates for helping implement cloud security?
#190
Answer: D✅ Correct❌ Incorrect
Select the statement below which best describes the relationship between identities and attributes
#191
Answer: C✅ Correct❌ Incorrect
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 `" Policy GRM 07 `" Policy Enforcement GRM 08 `" Policy Impact on Risk Assessments GRM 09 `" Policy Reviews GRM 10 `" Risk Assessments GRM 11
`" Risk Management Framework
#192
Answer: B✅ Correct❌ Incorrect
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
#193
Answer: A✅ Correct❌ Incorrect
Containers are highly portable code execution environments.
#194
Answer: B✅ Correct❌ Incorrect
Which statement best describes the Data Security Lifecycle?
#195
Answer: B✅ Correct❌ Incorrect
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
#196
Answer: E✅ Correct❌ Incorrect
In the Software-as-a-service relationship, who is responsible for the majority of the security?
#197
Answer: D✅ Correct❌ Incorrect
Which attack surfaces, if any, does virtualization technology introduce?
#198
Answer: D✅ Correct❌ Incorrect
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
#199
Answer: B✅ Correct❌ Incorrect
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
#200
Answer: B✅ Correct❌ Incorrect
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
#201
Answer: E✅ Correct❌ Incorrect
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
#202
Answer: B✅ Correct❌ Incorrect
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
#203
Answer: A✅ Correct❌ Incorrect
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
#204
Answer: E✅ Correct❌ Incorrect
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
#205
Answer: A✅ Correct❌ Incorrect
The containment phase of the incident response lifecycle requires taking systems offline.
#206
Answer: B✅ Correct❌ Incorrect
What are the primary security responsibilities of the cloud provider in compute virtualizations?