New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?

A.

Infrastructure

B.

Datastructure

C.

Infostructure

D.

Applistructure

E.

Metastructure

Which aspects are most important for ensuring security in a hybrid cloud environment?

A.

Use of encryption for all data at rest

B.

Implementation of robust IAM and network security practices

C.

Regular software updates and patch management

D.

Deployment of multi-factor authentication only

Which of the following items is NOT an example of Security as a Service (SecaaS)?

A.

Spam filtering

B.

Authentication

C.

Provisioning

D.

Web filtering

E.

Intrusion detection

Why is it important for Cloud Service Providers (CSPs) to document security controls?

A.

It allows CSPs to reduce operational costs and increase security efficiency

B.

It ensures transparency and accountability for security measures

C.

It reduces the frequency for regular independent audits

D.

It helps CSPs enhance their marketing strategies and relationship with policymakers

When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.

A.

False

B.

True

How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?

A.

Use strong multi-factor authentication

B.

Secure backup processes for key management systems

C.

Segregate keys from the provider hosting data

D.

Stipulate encryption in contract language

E.

Select cloud providers within the same country as customer

When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?

A.

The metrics defining the service level required to achieve regulatory objectives.

B.

The duration of time that a security violation can occur before the client begins assessing regulatory fines.

C.

The cost per incident for security breaches of regulated information.

D.

The regulations that are pertinent to the contract and how to circumvent them.

E.

The type of security software which meets regulations and the number of licenses that will be needed.

What key activities are part of the preparation phase in incident response planning?

A.

Implementing encryption and access controls

B.

Establishing a response process, training, communication plans, and infrastructure evaluations

C.

Creating incident reports and post-incident reviews

D.

Developing malware analysis procedures and penetration testing

Which component is primarily responsible for filtering and monitoring HTTP/S traffic to and from a web application?

A.

Anti-virus Software

B.

Load Balancer

C.

Web Application Firewall

D.

Intrusion Detection System

The Software Defined Perimeter (SDP) includes which components?

A.

Client, Controller, and Gateway

B.

Client, Controller, Firewall, and Gateway

C.

Client, Firewall, and Gateway

D.

Controller, Firewall, and Gateway

E.

Client, Controller, and Firewall