Loading questions...
Updated
How can web security as a service be deployed for a cloud consumer?
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
What of the following is NOT an essential characteristic of cloud computing?
Without virtualization, there is no cloud.
All assets require the same continuity in the cloud.
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Any given processor and memory will nearly always be running multiple workloads, often from different tenants.
In which deployment model should the governance strategy consider the minimum common set of controls comprised of the Cloud Service Provider contract and the organization's internal governance agreements?
What is known as the interface used to connect with the metastructure and configure the cloud environment?
Big data includes high volume, high variety, and high velocity.
What does it mean if the system or environment is built automatically from a template?
Which type of application security testing involves manual activity that is not necessarily integrated into automated testing?
Which meta-phase does the Cloud Security Alliance use to focus on the security and testing activities when moving code from an isolated development environment to production?
Even with immutable infrastructures, the production environment, should be actively monitored for changes and deviations from approved baselines.
ENISA: Licensing Risks refer to:
Which architecture for hybrid cloud connectivity allows you to connect multiple, different cloud networks to a data center using a single hybrid connection?
CCM: Which of the following statement about CSA's CCM and Security Guidance is False?
What are the barriers to developing full confidence in security as a service (SecaaS)?
CCM: A hypothetical company called: Health4Sure is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure's cloud service?
Of the choices below which option allows for the most interoperability in security authentication in a cloud environment?
The key concern of data backup and recovery schemes is:
Which regulation affects data controllers with business in Japan?
All cloud services utilize virtualization technologies.
Which of the following is NOT a cloud computing characteristic that impacts incidence response?