Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?

A.

Use strong multi-factor authentication

B.

Secure backup processes for key management systems

C.

Segregate keys from the provider hosting data

D.

Stipulate encryption in contract language

E.

Select cloud providers within the same country as customer

A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?

A.

An entitlement matrix

B.

A support table

C.

An entry log

D.

A validation process

E.

An access log

An organization deploys an AI application for fraud detection. Which threat is MOST likely to affect its AI model’s accuracy?

A.

Adversarial attacks

B.

DDoS attacks

C.

Third-party services

D.

Jailbreak attack

Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?

A.

Platform-as-a-service (PaaS)

B.

Desktop-as-a-service (DaaS)

C.

Infrastructure-as-a-service (IaaS)

D.

Identity-as-a-service (IDaaS)

E.

Software-as-a-service (SaaS)

In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?

A.

Public

B.

PaaS

C.

Private

D.

IaaS

E.

Hybrid

After an incident has been identified and classified, which activity is typically performed during the Containment, Eradication, and Recovery phase of incident response?

A.

Documenting lessons learned and finalizing reports

B.

Restoring systems to operational status while preventing recurrence

C.

Monitoring network traffic for anomalies

D.

Identifying and classifying security threats

CCM: The following list of controls belong to which domain of the CCM?

GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework

A.

Governance and Retention Management

B.

Governance and Risk Management

C.

Governing and Risk Metrics

Which of the following best describes a benefit of using VPNs for cloud connectivity?

A.

VPNs are more cost-effective than any other connectivity option.

B.

VPNs provide secure, encrypted connections between data centers and cloud deployments.

C.

VPNs eliminate the need for third-party authentication services.

D.

VPNs provide higher bandwidth than direct connections.

Which of the following best describes the purpose of cloud security control objectives?

A.

They are standards that cannot be modified to suit the unique needs of different cloud environments.

B.

They focus on the technical aspects of cloud security with less consideration on the broader organizational goals.

C.

They dictate specific implementation methods for securing cloud environments, tailored to individual cloud providers.

D.

They provide outcome-focused guidelines for desired controls, ensuring measurable and adaptable security measures

Cloud applications can use virtual networks and other structures, for hyper-segregated environments.

A.

False

B.

True