How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
An organization deploys an AI application for fraud detection. Which threat is MOST likely to affect its AI model’s accuracy?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
After an incident has been identified and classified, which activity is typically performed during the Containment, Eradication, and Recovery phase of incident response?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
Which of the following best describes a benefit of using VPNs for cloud connectivity?
Which of the following best describes the purpose of cloud security control objectives?
Cloud applications can use virtual networks and other structures, for hyper-segregated environments.