Which of the following is the BEST tool to perform cloud security control audits?
Which of the following cloud service models creates a cloud version of a contract template?
Which of the following is the MOST important audit scope document when conducting a review of a cloud service provider?
"Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls." Which of the following types of controls BEST matches this control description?
Which of the following helps an organization to identify control gaps and shortcomings in the context of cloud computing?
In the context of Infrastructure as a Service (laaS), a vulnerability assessment will scan virtual machines to identify vulnerabilities in:
Which of the following key stakeholders should be identified FIRST when an organization is designing a cloud compliance program?
A contract containing the phrase "You automatically consent to these terms by using or logging into the service to which they pertain" is establishing a contract of:
As Infrastructure as a Service (laaS) cloud service providers often do not allow the cloud service customers to perform on-premise audits, the BEST approach for the auditor should be to:
Which of the following types of risk is associated specifically with the use of multi-cloud environments in an organization?