Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which plane in a network architecture is responsible for controlling all administrative actions?

A.

Forwarding plane

B.

Management plane

C.

Data plane

D.

Application plane

What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?

A.

To automate the data encryption process across all cloud services

B.

To reduce the overall cost of cloud storage solutions

C.

To apply appropriate security controls based on asset sensitivity and importance

D.

To increase the speed of data retrieval within the cloud environment

What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?

A.

Network traffic rules for cloud environments

B.

A number of requirements to be implemented, based upon numerous standards and regulatory requirements

C.

Federal legal business requirements for all cloud operators

D.

A list of cloud configurations including traffic logic and efficient routes

E.

The command and control management hierarchy of typical cloud company

What does Zero Trust Network Access (ZTNA) primarily use to control access to applications?

A.

Geolocation data exclusively

B.

Username and password

C.

IP address and port number

D.

Identity, device, and contextual factors

In the context of incident response, which phase involves alerts validation to reduce false positives and estimates the incident's scope?

A.

Preparation

B.

Post-Incident Analysis

C.

Detection & Analysis

D.

Containment, Eradication, & Recovery

How does SASE enhance traffic management when compared to traditional network models?

A.

It solely focuses on user authentication improvements

B.

It replaces existing network protocols with new proprietary ones

C.

It filters traffic near user devices, reducing the need for backhauling

D.

It requires all traffic to be sent through central data centers

Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?

A.

Component credentials

B.

Immutable infrastructure

C.

Infrastructure as code

D.

Application integration

ENISA: An example high risk role for malicious insiders within a Cloud Provider includes

A.

Sales

B.

Marketing

C.

Legal counsel

D.

Auditors

E.

Accounting

Which practice minimizes human error in long-running cloud workloads’ security management?

A.

Increasing manual security audits frequency

B.

Converting all workloads to ephemeral

C.

Restricting access to workload configurations

D.

Implementing automated security and compliance checks

In a cloud computing incident, what should be the initial focus of analysis due to the ephemeral nature of resources and centralized control mechanisms?

A.

Management plane activity logs

B.

Network perimeter monitoring

C.

Endpoint protection status

D.

Physical hardware access