A. Cloud sprawl reduces the number of assets, easing security efforts.
B. Cloud sprawl has no impact on security monitoring.
C. Cloud sprawl disperses assets, making it harder to monitor assets.
D. Cloud sprawl centralizes assets, simplifying security monitoring.
A. It enables version control and rapid deployment.
B. It removes the need for manual testing.
C. It ensures zero configuration drift by default.
D. It eliminates the need for cybersecurity measures.
A. A validation process
B. An entry log
C. An entitlement matrix
D. A support table
E. An access log
A. Rapid Elasticity
B. Third Party Service
C. Resource Pooling
D. Measured Service
E. Broad Network Access
A. It does not require a hardware stack
B. It is always a virtual machine
C. It is configured for specific, established tasks
D. It is a unit of processing that consumes memory
E. It must be containerized
A. Encryption solutions
B. Asset management and tracking
C. Physical destruction
D. Application logic
E. Access controls
A. Provisioning of VMs, networking and other resources
B. Manual configuration of security policies
C. Installation of operating systems
D. Monitoring application performance
A. Responsibilities are divided between the cloud provider and the customer based on the service type.
B. Shared responsibilities should be consistent across all services.
C. Responsibilities are the same across IaaS, PaaS, and SaaS in the shared model.
D. Based on the per-service SLAs for security.
A. Encrypting all objects in the repository
B. Encrypting only sensitive objects
C. Using access controls as the sole security measure
D. Encrypting the access paths only
A. The devices used to access data may have different ownership characteristics.
B. The devices used to access data use a variety of applications or clients and may have different security characteristics.
C. The device may affect data dispersion.
D. The devices used to access data have different storage formats.
E. The devices used to access data use a variety of operating systems and may have different programs installed on them.
A. Monitor and log workloads and configure the security settings
B. Maintain a secure virtualization infrastructure and configure the security settings
C. Enforce isolation and maintain a secure virtualization infrastructure
D. Enforce isolation and configure the security settings
E. Enforce isolation and monitor and log workloads
A. Scalability and redundancy
B. Improved software development methodologies
C. Cost efficiency and speed to market
D. Enhanced security and compliance
A. Limited resource allocation
B. Abstraction and automation
C. Segmented and segregated customer environments
D. Resource pooling
A. True
B. False
A. Object encryption Volume storage encryption
B. Client/application and file/folder encryption
C. Any encryption option that is available for volume storage, object storage, or PaaS
D. Provider-managed and (sometimes) proxy encryption
A. Increased cost due to redundant data storage practices
B. Complete data loss due to storage media degradation
C. Inherent encryption failures within all cloud storage solutions
D. Unauthorized access due to misconfigured security settings
A. Client/application encryption
B. Media encryption
C. Object encryption
D. Database encryption
E. Asymmetric encryption
A. To comply with data privacy regulations
B. To simplify application debugging processesB Primarily to reduce data storage costs
C. Logs may be lost during a scaling event