New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which Identity and Access Management (IAM) principle focuses on implementing multiple security layers to dilute access power, thereby averting a misuse or compromise?

A.

Continuous Monitoring

B.

Federation

C.

Segregation of Duties

D.

Principle of Least Privilege

Which of the following best describes the primary function of Cloud Detection and Response (CDR) in cybersecurity?

A.

Detect and respond to security threats in the cloud

B.

Manage cloud-based applications

C.

Provide cost management for cloud services

D.

Optimize cloud storage performance

In Identity and Access Management (IAM) containment, why is it crucial to understand if an attacker escalated their identity?

A.

It aids in determining the source IP of the attacker.

B.

Because it simplifies the recovery process and increases the response time.

C.

To prevent further unauthorized access and limit the management plane blast radius.

D.

To facilitate the eradication of malware.

What are the most important practices for reducing vulnerabilities in virtual machines (VMs) in a cloud environment?

A.

Disabling unnecessary VM services and using containers

B.

Encryption for data at rest and software bill of materials

C.

Using secure base images, patch and configuration management

D.

Network isolation and monitoring

Which of the following best describes the primary benefit of utilizing cloud telemetry sources in cybersecurity?

A.

They reduce the cost of cloud services.

B.

They provide visibility into cloud environments.

C.

They enhance physical security.

D.

They encrypt cloud data at rest.

Which of the following best describes the shared responsibility model in cloud security?

A.

Cloud providers handle physical infrastructure security while customers handle workload security.

B.

Cloud providers handle both infrastructure and workload security.

C.

Neither cloud providers nor customers are responsible for security.

D.

Customers handle both infrastructure and workload security.

What is an advantage of using Kubernetes for container orchestration?

A.

Limited deployment options

B.

Manual management of resources

C.

Automation of deployment and scaling

D.

Increased hardware dependency

What can be implemented to help with account granularity and limit

blast radius with laaS an PaaS?

A.

Configuring secondary authentication

B.

Establishing multiple accounts

C.

Maintaining tight control of the primary account holder credentials

D.

Implementing least privilege accounts

E.

Configuring role-based authentication

A company plans to shift its data processing tasks to the cloud. Which type of cloud workload best describes the use of software emulations of physical computers?

A.

Platform as a Service (PaaS)

B.

Serverless Functions (FaaS)

C.

Containers

D.

Virtual Machines (VMs)

Which Identity and Access Management (IAM) component verifies the identity of a user, process, or device, as a prerequisite to allowing access?

A.

Assertion

B.

Entitlement

C.

Authorization

D.

Authentication