Certificate of Cloud Security Knowledge (v5.0) Questions and Answers
In the context of cloud security, what is the primary benefit of implementing Identity and Access Management (IAM) with attributes and user context for access decisions?
Why is early integration of pre-deployment testing crucial in a cybersecurity project?
Which areas should be initially prioritized for hybrid cloud security?
How does the variability in Identity and Access Management (IAM) systems across cloud providers impact a multi-cloud strategy?
How does network segmentation primarily contribute to limiting the impact of a security breach?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
What primary purpose does object storage encryption serve in cloud services?
Which of the following best describes the responsibility for security in a cloud environment?
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
What is the primary purpose of the CSA Security, Trust, Assurance, and Risk (STAR) Registry?
Which of the following best describes compliance in the context of cybersecurity?
What is the primary purpose of secrets management in cloud environments?
Which of the following is the MOST common cause of cloud-native security breaches?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
Which aspect is most important for effective cloud governance?
How does SASE enhance traffic management when compared to traditional network models?
Which approach creates a secure network, invisible to unauthorized users?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
How does artificial intelligence pose both opportunities and risks in cloud security?
How does centralized logging simplify security monitoring and compliance?
Which principle reduces security risk by granting users only the permissions essential for their role?
What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
What goal is most directly achieved by implementing controls and policies that aim to provide a complete view of data use and exposure in a cloud environment?
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
What is a key consideration when implementing AI workloads to ensure they adhere to security best practices?
Which aspect of cloud architecture ensures that a system can handle growing amounts of work efficiently?
How does running applications on distinct virtual networks and only connecting networks as needed help?
Why is a service type of network typically isolated on different hardware?
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
How should an SDLC be modified to address application security in a Cloud Computing environment?
Select the best definition of “compliance” from the options below.
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
What is true of searching data across cloud environments?
ENISA: “VM hopping” is:
What is resource pooling?
Which of the following statements best describes an identity
federation?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
Who is responsible for the security of the physical infrastructure and virtualization platform?
Select the statement below which best describes the relationship between identities and attributes
What should every cloud customer set up with its cloud service provider (CSP) that can be utilized in the event of an incident?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
Which statement best describes the impact of Cloud Computing on business continuity management?
How can web security as a service be deployed for a cloud consumer?
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
What is a core tenant of risk management?
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
CCM: The following list of controls belong to which domain of the CCM?
GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
Which cloud security model type provides generalized templates for helping implement cloud security?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?