Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following best describes a risk associated with insecure interfaces and APIs?

A.

Ensuring secure data encryption at rest

B.

Man-in-the-middle attacks

C.

Increase resource consumption on servers

D.

Data exposure to unauthorized users

What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?

A.

Enhancing data governance and compliance

B.

Simplifying cloud service integrations

C.

Increasing cloud data processing speed

D.

Reducing the cost of cloud storage

To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?

A.

Provider documentation

B.

Provider run audits and reports

C.

Third-party attestations

D.

Provider and consumer contracts

E.

EDiscovery tools

CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.

Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?

A.

The CCM columns are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered ad a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining controls. This approach will save time.

B.

The CCM domain controls are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered as a result of their compliance with HIPPA/HITECH Act. They could then assess the remaining controls thoroughly. This approach saves time while being able to assess the company’s overall security posture in an efficient manner.

C.

The CCM domains are not mapped to HIPAA/HITECH Act. Therefore Health4Sure should assess the security posture of their cloud service against each and every control in the CCM. This approach will allow a thorough assessment of the security posture.

CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?

A.

Service Provider or Tenant/Consumer

B.

Physical, Network, Compute, Storage, Application or Data

C.

SaaS, PaaS or IaaS

Which of the following is a common security issue associated with serverless computing environments?

A.

High operational costs

B.

Misconfigurations

C.

Limited scalability

D.

Complex deployment pipelines

What is the primary advantage of implementing Continuous Integration and Continuous Delivery/Deployment (CI/CD) pipelines in the context of cybersecurity?

A.

Replacing the need for security teams.

B.

Slowing down the development process for testing.

C.

Automating security checks and deployments.

D.

Enhancing code quality.

Which of the following best describes how cloud computing manages shared resources?

A.

Through virtualization, with administrators allocating resources based on SLAs

B.

Through abstraction and automation to distribute resources to customers

C.

By allocating physical systems to a single customer at a time

D.

Through manual configuration of resources for each user need

ENISA: “VM hopping” is:

A.

Improper management of VM instances, causing customer VMs to be commingled with other customer systems.

B.

Looping within virtualized routing systems.

C.

Lack of vulnerability management standards.

D.

Using a compromised VM to exploit a hypervisor, used to take control of other VMs.

E.

Instability in VM patch management causing VM routing errors.

Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?

A.

Hybrid cloud

B.

Public cloud

C.

Multi-cloud

D.

Private cloud